LIVE NEWS
  • ‘Have to be very careful’: Special ops head calls for combat AI ‘reality check’
  • Women’s body temperature rises from age 18 to 42 but we don’t know why
  • Canada is using its borders to police Palestine solidarity | Israel-Palestine conflict
  • Millionaire Businessman Reveals Where The Real Crypto Value Is, And It’s Not Bitcoin
  • Microsoft Warns of Two Actively Exploited Defender Vulnerabilities
  • Spencer Pratt uses AI slop and edgy humor in LA mayor’s race : NPR
  • Outrage over Israel’s Ben-Gvir flotilla abuse video: What we know | Israel-Palestine conflict News
  • Walmart sticks to annual targets as fuel shock dents American spending
Prime Reports
  • Home
  • Popular Now
  • Crypto
  • Cybersecurity
  • Economy
  • Geopolitics
  • Global Markets
  • Politics
  • See More
    • Artificial Intelligence
    • Climate Risks
    • Defense
    • Healthcare Innovation
    • Science
    • Technology
    • World
Prime Reports
  • Home
  • Popular Now
  • Crypto
  • Cybersecurity
  • Economy
  • Geopolitics
  • Global Markets
  • Politics
  • Artificial Intelligence
  • Climate Risks
  • Defense
  • Healthcare Innovation
  • Science
  • Technology
  • World
Home»Cybersecurity»Microsoft Warns of Two Actively Exploited Defender Vulnerabilities
Cybersecurity

Microsoft Warns of Two Actively Exploited Defender Vulnerabilities

primereportsBy primereportsMay 21, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Microsoft Warns of Two Actively Exploited Defender Vulnerabilities
Share
Facebook Twitter LinkedIn Pinterest Email


Ravie LakshmananMay 21, 2026Endpoint Security / Vulnerability

Microsoft Warns of Two Actively Exploited Defender Vulnerabilities

Microsoft has disclosed that a privilege escalation and a denial-of-service flaw in Defender has come under active exploitation in the wild.

The former, tracked as CVE-2026-41091, is rated 7.8 on the CVSS scoring system. Successful exploitation of the flaw could allow an attacker to gain SYSTEM privileges.

“Improper link resolution before file access (‘link following’) in Microsoft Defender allows an authorized attacker to elevate privileges locally,” Microsoft said in an advisory.

The second vulnerability under exploitation is CVE-2026-45498 (CVSS score: 4.0), a denial-of-service bug impacting Defender. The two vulnerabilities have been addressed in Microsoft Defender Antimalware Platform versions 1.1.26040.8 and 4.18.26040.7, respectively.

Cybersecurity

The tech giant noted that systems that have disabled Microsoft Defender are not susceptible to the vulnerability, adding that no action is required to install the update since it automatically updates malware definitions and the Microsoft Malware Protection Engine for optimal protection.

Microsoft credited five different parties with discovering and reporting the flaw, including Sibusiso, Diffract, Andrew C. Dorman (aka ACD421), Damir Moldovanov, and an anonymous researcher.

To ensure the latest version of the Microsoft Malware Protection Platform and definition updates are being actively downloaded and installed, users are recommended to follow the steps below:

  • Open the Windows Security program.
  • In the navigation pane, select Virus & threat protection.
  • Then click on Protection Updates in the Virus & threat protection section updates.
  • Select Check for updates.
  • In the navigation pane, select Settings, and then select About.
  • Examine the Antimalware ClientVersion number.

There are currently no details on how the vulnerabilities are being exploited in the wild. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added both of them to its Known Exploited Vulnerabilities (KEV) catalog, requiring Federal Civilian Executive Branch (FCEB) agencies to apply the fixes by June 3, 2026.

Last week, Microsoft also disclosed that a cross-site scripting flaw impacting on-premise versions of Exchange Server (CVE-2026-42897, CVSS score: 8.1) has been weaponized in real-world attacks.

Cybersecurity

Also added to the KEV catalog on Wednesday are four other Microsoft flaws from 2008, 2009, and 2010 –

  • CVE-2010-0806 – Microsoft Internet Explorer contains a use-after-free vulnerability that could allow remote attackers to execute arbitrary code.
  • CVE-2010-0249 – Microsoft Internet Explorer contains a use-after-free vulnerability that could allow remote attackers to execute arbitrary code.
  • CVE-2009-1537 – Microsoft DirectX contains a NULL byte overwrite vulnerability in the QuickTime Movie Parser Filter in quartz.dll in DirectShow, which could allow remote attackers to execute arbitrary code via a crafted QuickTime media file.
  • CVE-2008-4250 – Microsoft Windows contains a buffer overflow vulnerability in the Windows Server Service that allows remote attackers to execute arbitrary code via a crafted RPC request.

Another vulnerability that finds a mention in the list is CVE-2009-3459, a heap-based buffer overflow vulnerability in Adobe Acrobat and Reader that could allow remote attackers to execute arbitrary code via a crafted PDF file that triggers memory corruption.

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleSpencer Pratt uses AI slop and edgy humor in LA mayor’s race : NPR
Next Article Millionaire Businessman Reveals Where The Real Crypto Value Is, And It’s Not Bitcoin
primereports
  • Website

Related Posts

Cybersecurity

CISA Admin Leaked AWS GovCloud Keys on Github – Krebs on Security

May 20, 2026
Cybersecurity

Quantum Bridge Raises $8 Million for Quantum-Safe Key Distribution Solution

May 20, 2026
Cybersecurity

FBI: $388 million lost in crypto ATM scams in 2026

May 20, 2026
Add A Comment
Leave A Reply Cancel Reply

Top Posts

Global Resources Outlook 2024 | UNEP

December 6, 20258 Views

The D Brief: DHS shutdown likely; US troops leave al-Tanf; CNO’s plea to industry; Crowded robot-boat market; And a bit more.

February 14, 20265 Views

German Chancellor Merz faces difficult mission to Israel – DW – 12/06/2025

December 6, 20254 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Latest Reviews

Subscribe to Updates

Get the latest tech news from FooBar about tech, design and biz.

PrimeReports.org
Independent global news, analysis & insights.

PrimeReports.org brings you in-depth coverage of geopolitics, markets, technology and risk – with context that helps you understand what really matters.

Editorially independent · Opinions are those of the authors and not investment advice.
Facebook X (Twitter) LinkedIn YouTube
Key Sections
  • World
  • Geopolitics
  • Popular Now
  • Artificial Intelligence
  • Cybersecurity
  • Crypto
All Categories
  • Artificial Intelligence
  • Climate Risks
  • Crypto
  • Cybersecurity
  • Defense
  • Economy
  • Geopolitics
  • Global Markets
  • Healthcare Innovation
  • Politics
  • Popular Now
  • Science
  • Technology
  • World
  • About Us
  • Contact Us
  • Privacy Policy
  • Terms & Conditions
  • Disclaimer
  • Cookie Policy
  • DMCA / Copyright Notice
  • Editorial Policy

Sign up for Prime Reports Briefing – essential stories and analysis in your inbox.

By subscribing you agree to our Privacy Policy. You can opt out anytime.
Latest Stories
  • ‘Have to be very careful’: Special ops head calls for combat AI ‘reality check’
  • Women’s body temperature rises from age 18 to 42 but we don’t know why
  • Canada is using its borders to police Palestine solidarity | Israel-Palestine conflict
© 2026 PrimeReports.org. All rights reserved.
Privacy Terms Contact

Type above and press Enter to search. Press Esc to cancel.