PT-2026-40234 · Microsoft · Netlogon+1
Published
2026-05-12
·
Updated
2026-05-22
·
CVE-2026-41089
CVSS v2.0
10
Critical
| Vector | AV:N/AC:L/Au:N/C:C/I:C/A:C |
Name of the Vulnerable Software and Affected Versions
Windows Netlogon (affected versions not specified)
Description
A stack-based buffer overflow exists in the Windows Netlogon service. This issue allows an unauthorized remote attacker to execute arbitrary code over a network without authentication or user interaction. Successful exploitation can grant the attacker SYSTEM privileges on domain controllers, potentially allowing them to pivot to other domain controllers, abuse authentication flaws to escalate privileges across enterprise networks, and move laterally through Azure services and Dynamics 365.
Recommendations
Immediately apply the patches provided in the May 2026 Patch Tuesday update for all affected systems, prioritizing Domain Controllers.
Fix
RCE
Stack Overflow
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Netlogon
Windows