Home

Description

Authentication bypass using an alternate path or channel in Windows TCP/IP allows an authorized attacker to bypass a security feature over a network.

PUBLISHED Reserved 2026-04-02 | Published 2026-05-12 | Updated 2026-05-20 | Assigner microsoft




MEDIUM: 6.5CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C

Problem types

CWE-288: Authentication Bypass Using an Alternate Path or Channel

Product status

10.0.14393.0 (custom) before 10.0.14393.9140
affected

10.0.17763.0 (custom) before 10.0.17763.8755
affected

10.0.19044.0 (custom) before 10.0.19044.7291
affected

10.0.19045.0 (custom) before 10.0.19045.7291
affected

10.0.22631.0 (custom) before 10.0.22631.7079
affected

10.0.22631.0 (custom) before 10.0.22631.7079
affected

10.0.26100.0 (custom) before 10.0.26100.8457
affected

10.0.26200.0 (custom) before 10.0.26200.8457
affected

10.0.28000.0 (custom) before 10.0.28000.2113
affected

6.2.9200.0 (custom) before 6.2.9200.26079
affected

6.2.9200.0 (custom) before 6.2.9200.26079
affected

6.3.9600.0 (custom) before 6.3.9600.23181
affected

6.3.9600.0 (custom) before 6.3.9600.23181
affected

10.0.14393.0 (custom) before 10.0.14393.9140
affected

10.0.14393.0 (custom) before 10.0.14393.9140
affected

10.0.17763.0 (custom) before 10.0.17763.8755
affected

10.0.17763.0 (custom) before 10.0.17763.8755
affected

10.0.20348.0 (custom) before 10.0.20348.5139
affected

10.0.25398.0 (custom) before 10.0.25398.2330
affected

10.0.26100.0 (custom) before 10.0.26100.32860
affected

10.0.26100.0 (custom) before 10.0.26100.32860
affected

References

msrc.microsoft.com/update-guide/vulnerability/CVE-2026-35422 (Windows TCP/IP Driver Security Feature Bypass Vulnerability) vendor-advisory patch

cve.org (CVE-2026-35422)

nvd.nist.gov (CVE-2026-35422)

Download JSON