MSRC compact vulnerability detail

CVE-2026-41089 · Windows Netlogon Remote Code Execution Vulnerability

Stack-based buffer overflow in Windows Netlogon allows an unauthorized attacker to execute code over a network.

Severity
Critical
Impact
Remote Code Execution
CVSS
9.8 base · 8.5 temporal
Release
2026-05-12
Signals
Windows Netlogon Remote Code Execution Exploited: No Publicly disclosed: No Exploitability: Exploitation Less Likely
CWE
Patch Diff
Loading module diff metadata...
Resolved binary override
Use this when the MSRC module name cannot be mapped automatically or the resolved binary looks wrong.
Old version New version
Description
Stack-based buffer overflow in Windows Netlogon allows an unauthorized attacker to execute code over a network.
FAQ / Articles
Windows Netlogon Remote Code Execution Vulnerability
Stack-based buffer overflow in Windows Netlogon allows an unauthorized attacker to execute code over a network.
FAQ
How could an attacker exploit this vulnerability? An attacker could send a specially crafted network request to a Windows server that is acting as a domain controller. If successful, this could cause the Netlogon service to improperly handle the request, potentially allowing the attacker to run code on the affected system without needing to sign in or have prior access.