Microsoft Defender privilege escalation and denial-of-service vulnerabilities exploited in the wild
Summary
Hide ▲
Show ▼
Microsoft disclosed two actively exploited zero-day vulnerabilities in Microsoft Defender: CVE-2026-41091, a local privilege escalation flaw allowing attackers to gain SYSTEM privileges via improper link resolution, and CVE-2026-45498, a denial-of-service issue impacting Defender functionality. Both flaws were patched in Microsoft Defender Antimalware Platform versions 1.1.26040.8 and 4.18.26040.7, with updates automatically applied through malware definitions and the Microsoft Malware Protection Engine. Microsoft credited five researchers for disclosing the vulnerabilities and confirmed that systems with Defender disabled remain non-exploitable. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added both CVEs to its Known Exploited Vulnerabilities catalog on May 20, 2026, with a federal patch deadline of June 3, 2026. The article also references additional vulnerabilities added to the KEV catalog, including legacy flaws (e.g., CVE-2008-4250, CVE-2009-1537) and a recently weaponized Exchange Server XSS flaw (CVE-2026-42897, CVSS 8.1).
Timeline
-
21.05.2026 12:52 2 articles · 2h ago
Microsoft Defender zero-days (CVE-2026-41091, CVE-2026-45498) added to CISA KEV catalog; patches released
Microsoft disclosed two actively exploited vulnerabilities in Microsoft Defender: CVE-2026-41091 (local privilege escalation to SYSTEM via improper link resolution, CVSS 7.8) and CVE-2026-45498 (DoS flaw, CVSS 4.0). The flaws were addressed in Microsoft Defender Antimalware Platform versions 1.1.26040.8 and 4.18.26040.7 respectively, with updates automatically applied via malware definitions and the Microsoft Malware Protection Engine. Microsoft credited five researchers—Sibusiso, Diffract, Andrew C. Dorman (ACD421), Damir Moldovanov, and an anonymous researcher—for discovering and reporting the flaws. CISA added both CVEs to the KEV catalog on May 20, 2026, mandating Federal Civilian Executive Branch agencies to patch by June 3, 2026. The article also notes systems with Defender disabled are not susceptible to exploitation.
Show sources
- Microsoft Patches Exploited UnDefend and RedSun Defender Zero-Days — www.securityweek.com — 21.05.2026 12:52
- Microsoft Warns of Two Actively Exploited Defender Vulnerabilities — thehackernews.com — 21.05.2026 13:55
Information Snippets
-
CVE-2026-41091 is a local privilege escalation vulnerability in Microsoft Defender due to improper link resolution before file access, allowing attackers to escalate privileges to SYSTEM.
First reported: 21.05.2026 12:522 sources, 2 articlesShow sources
- Microsoft Patches Exploited UnDefend and RedSun Defender Zero-Days — www.securityweek.com — 21.05.2026 12:52
- Microsoft Warns of Two Actively Exploited Defender Vulnerabilities — thehackernews.com — 21.05.2026 13:55
-
CVE-2026-45498 is a denial-of-service (DoS) flaw in Microsoft Defender that disrupts antimalware operations.
First reported: 21.05.2026 12:522 sources, 2 articlesShow sources
- Microsoft Patches Exploited UnDefend and RedSun Defender Zero-Days — www.securityweek.com — 21.05.2026 12:52
- Microsoft Warns of Two Actively Exploited Defender Vulnerabilities — thehackernews.com — 21.05.2026 13:55
-
Both vulnerabilities were exploited in the wild and publicly disclosed, with active in-the-wild exploitation detected by Microsoft.
First reported: 21.05.2026 12:521 source, 1 articleShow sources
- Microsoft Patches Exploited UnDefend and RedSun Defender Zero-Days — www.securityweek.com — 21.05.2026 12:52
-
Patches were released in Microsoft Defender Antimalware Platform version 4.18.26040.7 to address both flaws.
First reported: 21.05.2026 12:522 sources, 2 articlesShow sources
- Microsoft Patches Exploited UnDefend and RedSun Defender Zero-Days — www.securityweek.com — 21.05.2026 12:52
- Microsoft Warns of Two Actively Exploited Defender Vulnerabilities — thehackernews.com — 21.05.2026 13:55
-
Systems with Microsoft Defender disabled remain non-exploitable despite Defender files persisting on disk.
First reported: 21.05.2026 12:521 source, 1 articleShow sources
- Microsoft Patches Exploited UnDefend and RedSun Defender Zero-Days — www.securityweek.com — 21.05.2026 12:52
-
Both CVEs were added to CISA’s Known Exploited Vulnerabilities (KEV) catalog on May 20, 2026, with a federal patch deadline of June 3, 2026.
First reported: 21.05.2026 12:522 sources, 2 articlesShow sources
- Microsoft Patches Exploited UnDefend and RedSun Defender Zero-Days — www.securityweek.com — 21.05.2026 12:52
- Microsoft Warns of Two Actively Exploited Defender Vulnerabilities — thehackernews.com — 21.05.2026 13:55
-
CVE-2026-41091 and CVE-2026-45498 are variants of the BlueHammer exploit, specifically the RedSun and UnDefend variants disclosed publicly by researcher Chaos Eclipse.
First reported: 21.05.2026 12:521 source, 1 articleShow sources
- Microsoft Patches Exploited UnDefend and RedSun Defender Zero-Days — www.securityweek.com — 21.05.2026 12:52
-
CISA added six additional vulnerabilities to the KEV catalog alongside the Defender flaws, including CVE-2008-4250, CVE-2009-1537, CVE-2009-3459, CVE-2010-0249, and CVE-2010-0806, all with historical exploitation evidence.
First reported: 21.05.2026 12:521 source, 1 articleShow sources
- Microsoft Patches Exploited UnDefend and RedSun Defender Zero-Days — www.securityweek.com — 21.05.2026 12:52
-
CVE-2026-41091 is rated CVSS 7.8 and allows local privilege escalation to SYSTEM via improper link resolution ('link following') in Microsoft Defender
First reported: 21.05.2026 13:551 source, 1 articleShow sources
- Microsoft Warns of Two Actively Exploited Defender Vulnerabilities — thehackernews.com — 21.05.2026 13:55
-
CVE-2026-45498 is rated CVSS 4.0 and is a DoS flaw impacting Defender, addressed in Microsoft Defender Antimalware Platform versions 1.1.26040.8 and 4.18.26040.7 respectively
First reported: 21.05.2026 13:551 source, 1 articleShow sources
- Microsoft Warns of Two Actively Exploited Defender Vulnerabilities — thehackernews.com — 21.05.2026 13:55
-
Microsoft credited five researchers—Sibusiso, Diffract, Andrew C. Dorman (ACD421), Damir Moldovanov, and an anonymous researcher—for discovering and reporting the flaws
First reported: 21.05.2026 13:551 source, 1 articleShow sources
- Microsoft Warns of Two Actively Exploited Defender Vulnerabilities — thehackernews.com — 21.05.2026 13:55
-
CISA added both Defender vulnerabilities to its KEV catalog on May 20, 2026, requiring Federal Civilian Executive Branch agencies to apply fixes by June 3, 2026
First reported: 21.05.2026 13:551 source, 1 articleShow sources
- Microsoft Warns of Two Actively Exploited Defender Vulnerabilities — thehackernews.com — 21.05.2026 13:55
-
Microsoft also noted systems with Defender disabled are not susceptible to exploitation, and updates are automatically applied via malware definitions and the Microsoft Malware Protection Engine
First reported: 21.05.2026 13:551 source, 1 articleShow sources
- Microsoft Warns of Two Actively Exploited Defender Vulnerabilities — thehackernews.com — 21.05.2026 13:55
-
The article mentions additional KEV additions on May 20, 2026, including four Microsoft flaws from 2008, 2009, and 2010—CVE-2010-0806, CVE-2010-0249, CVE-2009-1537, and CVE-2008-4250—as well as CVE-2009-3459 in Adobe Acrobat and Reader
First reported: 21.05.2026 13:551 source, 1 articleShow sources
- Microsoft Warns of Two Actively Exploited Defender Vulnerabilities — thehackernews.com — 21.05.2026 13:55
Similar Happenings
Microsoft Defender privilege escalation and DoS vulnerabilities exploited in attacks
Microsoft disclosed and patched two zero-day vulnerabilities in Windows Defender components that are being actively exploited in the wild. CVE-2026-41091 is a privilege escalation flaw in the Microsoft Malware Protection Engine affecting versions 1.1.26030.3008 and earlier, enabling attackers to gain SYSTEM privileges via improper link resolution (link following). CVE-2026-45498 is a denial-of-service (DoS) vulnerability in the Defender Antimalware Platform versions 4.18.26030.3011 and earlier, allowing threat actors to trigger DoS states on unpatched Windows devices. The flaws impact Windows Defender Antimalware Platform, System Center Endpoint Protection, and related security tools. Microsoft released updated engine versions 1.1.26040.8 and 4.18.26040.7 to remediate the issues, with automatic updates enabled by default in most configurations. CISA added both vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog and mandated Federal Civilian Executive Branch (FCEB) agencies to patch within two weeks under BOD 22-01.
Critical RCE and EoP vulnerabilities in Microsoft products addressed in May Patch Tuesday
Microsoft’s May 2026 Patch Tuesday addressed 138 CVEs, including 30 Critical-rated vulnerabilities, across its product portfolio, with 16 flaws discovered using the AI-driven MDASH system. Key flaws include CVE-2026-41089 (Windows Netlogon stack-based buffer overflow, CVSS 9.8), CVE-2026-41096 (Windows DNS client RCE, CVSS 9.8), and CVE-2026-42898 (Microsoft Dynamics 365 RCE), alongside newly disclosed issues such as CVE-2026-33824 (double-free in ikeext.dll, CVSS 9.8) and CVE-2026-33827 (race condition in tcpip.sys, CVSS 8.1). The update also includes non-CVE changes requiring organizations to rotate Windows Secure Boot certificates to 2023 versions by June 26, 2026, to prevent boot-level security failures. Microsoft emphasized the growing role of AI in vulnerability discovery, noting that AI-assisted approaches like MDASH are expected to scale Patch Tuesday releases in the coming months. Earlier phases confirmed 120 CVEs addressed, 17 classified as Critical, and 16 discovered via the MDASH system, with specific focus on CVE-2026-41089, CVE-2026-41096, and CVE-2026-42898 as high-impact RCE and EoP flaws.
Microsoft Defender zero-day exploits RedSun, BlueHammer, and UnDefend actively abused in the wild
Microsoft Defender is being actively abused in the wild using three proof-of-concept exploits—RedSun, BlueHammer (CVE-2026-33825), and UnDefend—released by researcher "Nightmare-Eclipse" after alleged poor responses from Microsoft Security Response Center (MSRC). RedSun and BlueHammer enable SYSTEM-level privilege escalation on fully patched Windows 10, 11, and Server 2019+ systems with Defender enabled, while UnDefend degrades Defender’s threat detection capabilities without triggering alerts. Attackers are staging binaries in low-noise directories and manually enumerating privileges before exploitation, reflecting targeted hands-on intrusions. Microsoft patched BlueHammer in April updates but has not addressed RedSun or UnDefend, which operate via separate flaws in Defender’s privileged file handling workflows.