CVE-2026-41096 – Windows DNS Client Remote Code Execution Vulnerability

CVSS 9.8 CRITICAL

“A malicious DNS response should never be enough to hand over control of a Windows system.”

A critical remote code execution vulnerability exists in the Windows DNS Client due to a heap-based buffer overflow. An unauthenticated attacker could exploit the vulnerability by sending a specially crafted DNS response to a vulnerable system, potentially causing memory corruption and remote code execution without user interaction.
CVSS Score: 9.8
SEVERITY: Critical
THREAT:
This vulnerability could allow remote attackers to execute arbitrary code on affected Windows systems through malicious DNS responses. Successful exploitation may lead to complete system compromise, malware deployment, credential theft, lateral movement, or disruption of enterprise operations.

EXPLOITS:
At the time of publication, Microsoft reports that the vulnerability was not publicly disclosed and was not exploited in the wild. Exploit Code Maturity is listed as Unproven, and exploitation is assessed as Unlikely.

TECHNICAL SUMMARY:
CVE-2026-41096 is caused by a heap-based buffer overflow in the Windows DNS Client. The vulnerability occurs when the DNS Client improperly processes specially crafted DNS responses, leading to memory corruption conditions. An attacker can exploit the flaw remotely over the network without authentication or user interaction. Under certain configurations, successful exploitation may allow execution of attacker-controlled code on the affected system.
The vulnerability affects confidentiality, integrity, and availability at a high level and carries a network attack vector with low attack complexity, making it particularly dangerous for enterprise environments.

EXPLOITABILITY:
Affected software is Microsoft Windows DNS Client. Exploitation requires an attacker to send a specially crafted DNS response to a vulnerable Windows system. No authentication or user interaction is required.

BUSINESS IMPACT:
Because DNS is a core networking service used across enterprise environments, exploitation could impact a large number of systems rapidly. Successful attacks may lead to widespread endpoint compromise, ransomware deployment, credential harvesting, and operational disruption across corporate networks.

WORKAROUND:
No workarounds or mitigations are listed in the provided information. Organizations should apply the official Microsoft security update as quickly as possible.

URGENCY:
This vulnerability requires immediate attention because it combines a Critical severity rating, network-based attack vector, no authentication requirements, no user interaction, and a CVSS score of 9.8. DNS-related vulnerabilities are especially dangerous because they target foundational network services that are broadly exposed across enterprise infrastructure.

Key Details

Affected Product
Microsoft Windows 11 23h2
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
CWE Classification
CWE-122
Patch this CVE on all your endpoints in under 5 minutes. First 200 endpoints are free forever, scale as needed.