Home

Description

Stack-based buffer overflow in Windows Netlogon allows an unauthorized attacker to execute code over a network.

PUBLISHED Reserved 2026-04-16 | Published 2026-05-12 | Updated 2026-05-20 | Assigner microsoft




CRITICAL: 9.8CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

Problem types

CWE-121: Stack-based Buffer Overflow

Product status

6.2.9200.0 (custom) before 6.2.9200.26079
affected

6.2.9200.0 (custom) before 6.2.9200.26079
affected

6.3.9600.0 (custom) before 6.3.9600.23181
affected

6.3.9600.0 (custom) before 6.3.9600.23181
affected

10.0.14393.0 (custom) before 10.0.14393.9140
affected

10.0.14393.0 (custom) before 10.0.14393.9140
affected

10.0.17763.0 (custom) before 10.0.17763.8755
affected

10.0.17763.0 (custom) before 10.0.17763.8755
affected

10.0.20348.0 (custom) before 10.0.20348.5139
affected

10.0.25398.0 (custom) before 10.0.25398.2330
affected

10.0.26100.0 (custom) before 10.0.26100.32860
affected

10.0.26100.0 (custom) before 10.0.26100.32860
affected

References

msrc.microsoft.com/update-guide/vulnerability/CVE-2026-41089 (Windows Netlogon Remote Code Execution Vulnerability) vendor-advisory patch

cve.org (CVE-2026-41089)

nvd.nist.gov (CVE-2026-41089)

Download JSON