Summary
Improper link resolution before file access ('link following') in Microsoft Defender allows a local authorized attacker to elevate privileges on Windows systems. The flaw affects the antimalware platform and malware protection engine, where Defender follows an attacker-controlled link or junction during privileged file access. A low-privilege local user can abuse that file-access path to reach SYSTEM-level control, and the CVE is being actively exploited in the wild.
Why Fix Soon?
5/6Exploitation Details
Gain SYSTEM-level privileges on the local Windows host.
Privilege EscalationAffected Software
| Product | Affected Versions |
|---|---|
| Microsoft Defender | versions prior to 4.18.26040.7 |
| Microsoft Malware Protection Engine | versions prior to 1.1.26040.8 |
Windows antimalware platform and malware protection engine used by Microsoft Defender Antivirus to scan files, detect threats, and enforce endpoint protection on Windows systems.
Affected ComponentFile-access and link-resolution handling in the Defender antimalware scanning path.
File-access and link-resolution handling in the Defender antimalware scanning path.
Not available
Not available
Update Microsoft Defender Antivirus to platform version 4.18.26040.7 and Microsoft Malware Protection Engine to 1.1.26040.8 or later using the Microsoft security update path.
Update Microsoft Defender Antivirus to platform version 4.18.26040.7 and Microsoft Malware Protection Engine to 1.1.26040.8 or later using the Microsoft security update path.
No known threat actors
No detection rules available
NVD Data
Description Summary
CVSS Base Score
CVSS Vector (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)
Affected Software (CPE) (1)
- •cpe:2.3:a:microsoft:malware_protection_engine:*:*:*:*:*:*:*:*
Sources
| Source | Article |
|---|---|
| www.cisa.gov | Known Exploited Vulnerabilities Catalog |
| msrc.microsoft.com | CVE-2026-41091 |
| www.tenable.com | CVE-2026-41091 |
| dbugs.ptsecurity.com | CVE-2026-41091 — Link Following in Malware Protection Engine |
| www.cyber.gc.ca | Microsoft security advisory (AV26-489) |
| www.govcert.gov.hk | High Threat Security Alert (A26-05-33): Multiple Vulnerabilities in Microsoft Products |
| www.cert.ssi.gouv.fr | Multiples vulnérabilités dans les produits Microsoft |
| www.microsoft.com | Security intelligence updates for Microsoft Defender Antivirus and other Microsoft antimalware |
Priority History
Initial analysis