MSRC compact vulnerability detail

CVE-2026-35423 · Windows 11 Telnet Client Information Disclosure Vulnerability

Out-of-bounds read in Telnet Client allows an unauthorized attacker to disclose information over a network.

Severity
Important
Impact
Information Disclosure
CVSS
5.4 base · 4.7 temporal
Release
2026-05-12
Signals
Telnet Client Information Disclosure Exploited: No Publicly disclosed: No Exploitability: Exploitation Unlikely
CWE
Patch Diff
Loading module diff metadata...
Resolved binary override
Use this when the MSRC module name cannot be mapped automatically or the resolved binary looks wrong.
Old version New version
Description
Out-of-bounds read in Telnet Client allows an unauthorized attacker to disclose information over a network.
FAQ / Articles
Telnet Client Information Disclosure Vulnerability
Out-of-bounds read in Telnet Client allows an unauthorized attacker to disclose information over a network.
FAQ
According to the CVSS metrics, successful exploitation of this vulnerability could lead to some loss of confidentiality (C:L), no loss to integrity (I:N) and lead to some loss of availability (A:L). What is the impact of this vulnerability? Successful exploitation of this vulnerability could allow an attacker to access limited sensitive information from system memory and may cause intermittent interruptions or reduced performance in the affected application. However, it would not allow the attacker to modify data.
FAQ
What type of information could be disclosed by this vulnerability? An attacker could potentially read limited portions of memory from the affected system, which may include sensitive information being processed by the Telnet client at the time of the connection.
FAQ
According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? For this vulnerability to be exploited, a user would need to initiate a Telnet connection to a malicious or compromised server, allowing specially crafted authentication responses to be processed by the Telnet client. Successful exploitation requires a user to take an action before the vulnerability can be triggered.