Home
MEDIUM: 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C 10.0.14393.0 (custom) before 10.0.14393.9140
affected
10.0.17763.0 (custom) before 10.0.17763.8755
affected
10.0.19044.0 (custom) before 10.0.19044.7291
affected
10.0.19045.0 (custom) before 10.0.19045.7291
affected
10.0.22631.0 (custom) before 10.0.22631.7079
affected
10.0.22631.0 (custom) before 10.0.22631.7079
affected
10.0.26100.0 (custom) before 10.0.26100.8457
affected
10.0.26200.0 (custom) before 10.0.26200.8457
affected
10.0.28000.0 (custom) before 10.0.28000.2113
affected
6.2.9200.0 (custom) before 6.2.9200.26079
affected
6.2.9200.0 (custom) before 6.2.9200.26079
affected
6.3.9600.0 (custom) before 6.3.9600.23181
affected
6.3.9600.0 (custom) before 6.3.9600.23181
affected
10.0.14393.0 (custom) before 10.0.14393.9140
affected
10.0.14393.0 (custom) before 10.0.14393.9140
affected
10.0.17763.0 (custom) before 10.0.17763.8755
affected
10.0.17763.0 (custom) before 10.0.17763.8755
affected
10.0.20348.0 (custom) before 10.0.20348.5139
affected
10.0.25398.0 (custom) before 10.0.25398.2330
affected
10.0.26100.0 (custom) before 10.0.26100.32860
affected
10.0.26100.0 (custom) before 10.0.26100.32860
affected
Description
Authentication bypass using an alternate path or channel in Windows TCP/IP allows an authorized attacker to bypass a security feature over a network.
Problem types
CWE-288: Authentication Bypass Using an Alternate Path or Channel
Product status
References
msrc.microsoft.com/update-guide/vulnerability/CVE-2026-35422 (Windows TCP/IP Driver Security Feature Bypass Vulnerability)