PT-2026-40237 · Microsoft · Windows Dns

Published

2026-05-12

·

Updated

2026-05-13

·

CVE-2026-41096

CVSS v3.1

9.8

Critical

VectorAV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Name of the Vulnerable Software and Affected Versions Microsoft Windows DNS (affected versions not specified)
Description A heap-based buffer overflow in Microsoft Windows DNS allows an unauthorized attacker to execute code over a network. A heap-based buffer overflow occurs when a program writes more data to a heap-allocated memory block than it can hold, potentially corrupting adjacent memory.
Recommendations At the moment, there is no information about a newer version that contains a fix for this vulnerability.

RCE

Heap Based Buffer Overflow

Weakness Enumeration

Related Identifiers

CVE-2026-41096

Affected Products

Windows Dns