CVE-2026-41091
Undergoing Analysis Undergoing Analysis - In Progress
Microsoft Defender Link Following Local Privilege Escalation

Publication date: 2026-05-20

Last updated on: 2026-05-20

Assigner: Microsoft Corporation

Description
Improper link resolution before file access ('link following') in Microsoft Defender allows an authorized attacker to elevate privileges locally.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-05-20
Last Modified
2026-05-20
Generated
2026-05-20
AI Q&A
2026-05-20
EPSS Evaluated
N/A
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
microsoft malware_protection_engine From 1.1.26030.3008 (inc) to 1.1.26040.8 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-59 The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability involves improper link resolution before file access, also known as 'link following', in Microsoft Defender. It allows an authorized attacker to elevate their privileges locally by exploiting how links are resolved before accessing files.


How can this vulnerability impact me? :

The impact of this vulnerability is an elevation of privilege, meaning an authorized attacker can gain higher-level permissions on the affected system. This can lead to full control over the system, compromising confidentiality, integrity, and availability.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart