MSRC compact vulnerability detail

CVE-2026-40415 · Windows TCP/IP Remote Code Execution Vulnerability

Use after free in Windows TCP/IP allows an unauthorized attacker to execute code over a network.

Severity
Important
Impact
Remote Code Execution
CVSS
8.1 base · 7.1 temporal
Release
2026-05-12
Signals
Windows TCP/IP Remote Code Execution Exploited: No Publicly disclosed: No Exploitability: Exploitation Unlikely
CWE
Patch Diff
Loading module diff metadata...
Resolved binary override
Use this when the MSRC module name cannot be mapped automatically or the resolved binary looks wrong.
Old version New version
Description
Use after free in Windows TCP/IP allows an unauthorized attacker to execute code over a network.
FAQ / Articles
Windows TCP/IP Remote Code Execution Vulnerability
Use after free in Windows TCP/IP allows an unauthorized attacker to execute code over a network.
FAQ
According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation requires the target system to be under sustained low-memory (memory pressure) conditions, which are not commonly present in normal operation. This makes the vulnerability difficult to reliably trigger, as the attacker must first induce or wait for a constrained memory state before exploitation becomes possible.
FAQ
How could an attacker exploit this vulnerability? An attacker could exploit this vulnerability by sending specially crafted malicious traffic to a vulnerable server.