CVE-2026-41089 PUBLISHED

Windows Netlogon Remote Code Execution Vulnerability

Assigner: microsoft
Reserved: 16.04.2026 Published: 12.05.2026 Updated: 13.05.2026

Stack-based buffer overflow in Windows Netlogon allows an unauthorized attacker to execute code over a network.

Metrics

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
CVSS Score: 9.8

Product Status

Vendor Microsoft
Product Windows Server 2012
Versions
  • affected from 6.2.9200.0 to 6.2.9200.26079 (excl.)
Vendor Microsoft
Product Windows Server 2012 (Server Core installation)
Versions
  • affected from 6.2.9200.0 to 6.2.9200.26079 (excl.)
Vendor Microsoft
Product Windows Server 2012 R2
Versions
  • affected from 6.3.9600.0 to 6.3.9600.23181 (excl.)
Vendor Microsoft
Product Windows Server 2012 R2 (Server Core installation)
Versions
  • affected from 6.3.9600.0 to 6.3.9600.23181 (excl.)
Vendor Microsoft
Product Windows Server 2016
Versions
  • affected from 10.0.14393.0 to 10.0.14393.9140 (excl.)
Vendor Microsoft
Product Windows Server 2016 (Server Core installation)
Versions
  • affected from 10.0.14393.0 to 10.0.14393.9140 (excl.)
Vendor Microsoft
Product Windows Server 2019
Versions
  • affected from 10.0.17763.0 to 10.0.17763.8755 (excl.)
Vendor Microsoft
Product Windows Server 2019 (Server Core installation)
Versions
  • affected from 10.0.17763.0 to 10.0.17763.8755 (excl.)
Vendor Microsoft
Product Windows Server 2022
Versions
  • affected from 10.0.20348.0 to 10.0.20348.5139 (excl.)
Vendor Microsoft
Product Windows Server 2022, 23H2 Edition (Server Core installation)
Versions
  • affected from 10.0.25398.0 to 10.0.25398.2330 (excl.)
Vendor Microsoft
Product Windows Server 2025
Versions
  • affected from 10.0.26100.0 to 10.0.26100.32860 (excl.)
Vendor Microsoft
Product Windows Server 2025 (Server Core installation)
Versions
  • affected from 10.0.26100.0 to 10.0.26100.32860 (excl.)

References

Problem Types