Home
HIGH: 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C 10.0.14393.0 (custom) before 10.0.14393.8783
affected
10.0.17763.0 (custom) before 10.0.17763.8276
affected
10.0.19044.0 (custom) before 10.0.19044.6809
affected
10.0.19045.0 (custom) before 10.0.19045.6809
affected
10.0.22631.0 (custom) before 10.0.22631.6491
affected
10.0.22631.0 (custom) before 10.0.22631.6491
affected
10.0.26100.0 (custom) before 10.0.26100.7623
affected
10.0.26200.0 (custom) before 10.0.26200.7623
affected
6.2.9200.0 (custom) before 6.2.9200.25868
affected
6.2.9200.0 (custom) before 6.2.9200.25868
affected
6.3.9600.0 (custom) before 6.3.9600.22968
affected
6.3.9600.0 (custom) before 6.3.9600.22968
affected
10.0.14393.0 (custom) before 10.0.14393.8783
affected
10.0.14393.0 (custom) before 10.0.14393.8783
affected
10.0.17763.0 (custom) before 10.0.17763.8276
affected
10.0.17763.0 (custom) before 10.0.17763.8276
affected
10.0.20348.0 (custom) before 10.0.20348.4648
affected
10.0.25398.0 (custom) before 10.0.25398.2092
affected
10.0.26100.0 (custom) before 10.0.26100.32230
affected
10.0.26100.0 (custom) before 10.0.26100.32230
affected
Description
Improper input validation in Windows Server Update Service allows an unauthorized attacker to execute code over a network.
Problem types
CWE-20: Improper Input Validation
Product status
References
msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20856 (Windows Server Update Service (WSUS) Remote Code Execution Vulnerability)