Home

Description

Heap-based buffer overflow in Microsoft Windows DNS allows an unauthorized attacker to execute code over a network.

PUBLISHED Reserved 2026-04-16 | Published 2026-05-12 | Updated 2026-05-20 | Assigner microsoft




CRITICAL: 9.8CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

Problem types

CWE-122: Heap-based Buffer Overflow

Product status

10.0.22631.0 (custom) before 10.0.22631.7079
affected

10.0.22631.0 (custom) before 10.0.22631.7079
affected

10.0.26100.0 (custom) before 10.0.26100.8457
affected

10.0.26200.0 (custom) before 10.0.26200.8457
affected

10.0.28000.0 (custom) before 10.0.28000.2113
affected

10.0.25398.0 (custom) before 10.0.25398.2330
affected

10.0.26100.0 (custom) before 10.0.26100.32860
affected

10.0.26100.0 (custom) before 10.0.26100.32860
affected

References

msrc.microsoft.com/update-guide/vulnerability/CVE-2026-41096 (Windows DNS Client Remote Code Execution Vulnerability) vendor-advisory patch

cve.org (CVE-2026-41096)

nvd.nist.gov (CVE-2026-41096)

Download JSON