Microsoft Confirms Active Exploitation of Two Critical Defender Vulnerabilities Impacting Enterprise Security

Published:

spot_img

Microsoft Confirms Active Exploitation of Two Critical Defender Vulnerabilities Impacting Enterprise Security

Microsoft has acknowledged the active exploitation of two significant security vulnerabilities within its Defender security ecosystem: CVE-2026-41091 and CVE-2026-45498. Both vulnerabilities have been evaluated using the Common Vulnerability Scoring System (CVSS), raising alarms due to confirmed exploitation in real-world scenarios and their potential impact on enterprise systems.

Overview of the Vulnerabilities

The first vulnerability, CVE-2026-41091 (CVSS 7.8), is categorized as a privilege escalation flaw affecting Microsoft Defender. If successfully exploited, this vulnerability could enable a local attacker to gain SYSTEM-level privileges. The root cause of this issue lies in improper link resolution prior to file access, a problem commonly referred to as a “link following” issue.

In its advisory, Microsoft stated, “Improper link resolution before file access (‘link following’) in Microsoft Defender allows an authorized attacker to elevate privileges locally.”

The second vulnerability, CVE-2026-45498 (CVSS 4.0), is identified as a denial-of-service flaw impacting Microsoft Defender. Although it is rated lower in severity, it has also been confirmed as actively exploited in conjunction with CVE-2026-41091 in real-world environments.

Both vulnerabilities have been addressed in updated releases of the Microsoft Defender Antimalware Platform, specifically in versions 1.1.26040.8 and 4.18.26040.7.

Context and Implications

The vulnerabilities CVE-2026-41091 and CVE-2026-45498 have drawn attention due to their overlap with previously discussed issues, notably those labeled RedSun and UnDefend, which were disclosed by the threat research group Chaotic Eclipse, also known as Nightmare-Eclipse. Although Microsoft has not explicitly confirmed a direct link, the similarities in behavior warrant scrutiny.

Security researchers from Huntress have reported active exploitation of both vulnerabilities in the wild. Their findings also indicate exploitation activities related to BlueHammer (CVE-2026-33825), suggesting a broader campaign targeting Microsoft Defender components and adjacent security mechanisms.

Additional Security Findings

In addition to the two vulnerabilities, Microsoft has patched another flaw during the same Defender update cycle: CVE-2026-45584 (CVSS 8.1). This vulnerability is classified as a heap-based buffer overflow that could permit remote code execution if exploited. Unlike CVE-2026-41091 and CVE-2026-45498, there is currently no evidence that CVE-2026-45584 has been actively exploited.

Microsoft has clarified that systems with disabled Defender are not affected by these vulnerabilities. Furthermore, the company has indicated that most users will not need to take manual action, as updates are delivered automatically through malware definition updates and the Microsoft Malware Protection Engine.

Security Guidance and Recommendations

To verify protection status against CVE-2026-41091 and CVE-2026-45498, Microsoft recommends that users check their Defender configuration via the Windows Security interface. The suggested steps include navigating to Virus & threat protection, checking for protection updates, and verifying the Antimalware Client Version.

Microsoft has credited five researchers for identifying CVE-2026-41091: Sibusiso, Diffract, Andrew C. Dorman (also known as ACD421), Damir Moldovanov, and an anonymous contributor.

CISA’s Response and Broader Context

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added both CVE-2026-41091 and CVE-2026-45498 to its Known Exploited Vulnerabilities (KEV) catalog. Federal Civilian Executive Branch (FCEB) agencies are mandated to apply mitigations by June 3, 2026, underscoring the urgency of addressing CVSS-rated threats that are already being exploited.

This addition marks the third Microsoft vulnerability flagged as actively exploited within a single week, highlighting a concentrated wave of CVE-based attacks targeting Microsoft products.

Legacy Vulnerabilities

CISA’s KEV catalog update also included several older but still relevant vulnerabilities:

  • CVE-2010-0806: Internet Explorer use-after-free flaw enabling remote code execution.
  • CVE-2010-0249: Another Internet Explorer use-after-free vulnerability allowing arbitrary code execution.
  • CVE-2009-1537: DirectX issue in QuickTime Movie Parser Filter via crafted media files.
  • CVE-2008-4250: Windows Server Service buffer overflow via crafted RPC request.
  • CVE-2009-3459: Adobe Acrobat and Reader heap-based buffer overflow via malicious PDF files.

These legacy issues illustrate that the exploitation of older software remains relevant in today’s threat landscape, particularly when combined with newer vulnerabilities like CVE-2026-41091 and CVE-2026-45498, both evaluated using CVSS metrics.

Source: thecyberexpress.com

Keep reading for the latest cybersecurity developments, threat intelligence and breaking updates from across the Middle East.

spot_img

Related articles

Recent articles

Iranian Hackers Breach US Gas Stations, CISA Launches KEV Nomination Form, and Industrial Router Exploitation Surges

Iranian Hackers Breach US Gas Stations, CISA Launches KEV Nomination Form, and Industrial Router Exploitation Surges Recent developments in cybersecurity have underscored the persistent vulnerabilities...

Saudi Telecom Company Dominates Middle East’s C2 Infrastructure with 72% of Active Servers

Saudi Telecom Company Dominates Middle East's C2 Infrastructure with 72% of Active Servers Recent research has unveiled a significant concentration of command-and-control (C2) infrastructure in...

Megalodon Cyberattack Compromises 5,561 GitHub Repositories with Malicious CI/CD Workflows

Megalodon Cyberattack Compromises 5,561 GitHub Repositories with Malicious CI/CD Workflows A recent automated cyber campaign, dubbed Megalodon, has alarmingly pushed 5,718 malicious commits across 5,561...

Vulnerability Exploitation Surges to 31%, Overtaking Stolen Credentials as Leading Cybersecurity Breach Method

Vulnerability Exploitation Surges to 31%, Overtaking Stolen Credentials as Leading Cybersecurity Breach Method Vulnerability exploitation has emerged as the predominant cause of cybersecurity breaches for...