CVE-2026-41091
Undergoing Analysis
Undergoing Analysis - In Progress
Microsoft Defender Link Following Local Privilege Escalation
Publication date: 2026-05-20
Last updated on: 2026-05-20
Assigner: Microsoft Corporation
Description
Description
Improper link resolution before file access ('link following') in Microsoft Defender allows an authorized attacker to elevate privileges locally.
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| microsoft | malware_protection_engine | From 1.1.26030.3008 (inc) to 1.1.26040.8 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-59 | The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability involves improper link resolution before file access, also known as 'link following', in Microsoft Defender. It allows an authorized attacker to elevate their privileges locally by exploiting how links are resolved before accessing files.
How can this vulnerability impact me? :
The impact of this vulnerability is an elevation of privilege, meaning an authorized attacker can gain higher-level permissions on the affected system. This can lead to full control over the system, compromising confidentiality, integrity, and availability.
Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70