CVE-2026-41089 – Windows Netlogon Remote Code Execution Vulnerability
“A vulnerable domain controller can turn one crafted network request into a direct path toward enterprise compromise.”
A critical remote code execution vulnerability exists in Windows Netlogon due to a stack-based buffer overflow. An unauthenticated attacker could send a specially crafted network request to a Windows server acting as a domain controller, causing Netlogon to improperly process the request and potentially execute attacker-controlled code.
CVSS Score: 9.8
SEVERITY: Critical
THREAT:
This vulnerability could allow an unauthenticated attacker to remotely execute code on an affected domain controller. Successful exploitation may lead to domain-level compromise, credential theft, malware deployment, lateral movement, and major disruption of authentication services.
EXPLOITS:
At the time of publication, Microsoft reports that the vulnerability was not publicly disclosed and was not exploited. Exploit Code Maturity is listed as Unproven, and exploitation is assessed as Less Likely.
TECHNICAL SUMMARY:
CVE-2026-41089 is caused by a stack-based buffer overflow in Windows Netlogon. The vulnerability occurs when Netlogon improperly handles a specially crafted network request sent to a Windows server acting as a domain controller. Because the attack vector is network-based and requires no privileges or user interaction, successful exploitation could allow remote code execution on a highly sensitive authentication system.
EXPLOITABILITY:
Affected software is Windows Netlogon on Windows servers acting as domain controllers. Exploitation requires sending a specially crafted network request to the vulnerable domain controller. No sign-in, prior access, or user interaction is required.
BUSINESS IMPACT:
Domain controllers are core identity infrastructure. A successful exploit could compromise authentication, expose credentials, enable broad lateral movement, and disrupt access to business-critical systems. This could lead to ransomware deployment, data theft, and widespread operational outage.
WORKAROUND:
No mitigations or workarounds are listed. Apply the official Microsoft security update as quickly as possible.
URGENCY:
This vulnerability requires urgent action because it is Critical, has a CVSS score of 9.8, targets domain controllers, and requires no authentication or user interaction. Even though exploitation is assessed as Less Likely, the potential impact is severe.
Key Details
- Affected Product
- Microsoft Windows Server 2012
- Attack Vector
- Network
- Attack Complexity
- Low
- Privileges Required
- None
- User Interaction
- None
- CWE Classification
- CWE-121