PT-2026-40234 · Microsoft · Netlogon+1

Published

2026-05-12

·

Updated

2026-05-22

·

CVE-2026-41089

CVSS v2.0

10

Critical

VectorAV:N/AC:L/Au:N/C:C/I:C/A:C
Name of the Vulnerable Software and Affected Versions Windows Netlogon (affected versions not specified)
Description A stack-based buffer overflow exists in the Windows Netlogon service. This issue allows an unauthorized remote attacker to execute arbitrary code over a network without authentication or user interaction. Successful exploitation can grant the attacker SYSTEM privileges on domain controllers, potentially allowing them to pivot to other domain controllers, abuse authentication flaws to escalate privileges across enterprise networks, and move laterally through Azure services and Dynamics 365.
Recommendations Immediately apply the patches provided in the May 2026 Patch Tuesday update for all affected systems, prioritizing Domain Controllers.

Fix

RCE

Stack Overflow

Weakness Enumeration

Related Identifiers

BDU:2026-06756
CVE-2026-41089

Affected Products

Netlogon
Windows