ctipilot.ch

Microsoft Defender Antivirus local DoS — exploited alongside CVE-2026-41091 in combined out-of-band engine update 4.18.26040.7

cve · CVE-2026-45498

Coverage timeline
1
first 2026-05-22 → last 2026-05-22
Briefs
1
1 distinct
Sources cited
135
55 hosts
Sections touched
0
Co-occurring entities
6
see Related entities below

Story timeline

  1. 2026-05-22CTI Daily Brief — 2026-05-22

Source distribution

  • attack.mitre.org21 (16%)
  • microsoft.com11 (8%)
  • msrc.microsoft.com10 (7%)
  • thehackernews.com9 (7%)
  • bleepingcomputer.com8 (6%)
  • github.com5 (4%)
  • helpnetsecurity.com4 (3%)
  • security-hub.ncsc.admin.ch4 (3%)
  • other63 (47%)

Related entities

External references

NVD · cve.org · CISA KEV

All cited sources (135)

Items in briefs about Microsoft Defender Antivirus local DoS — exploited alongside CVE-2026-41091 in combined out-of-band engine update 4.18.26040.7 (1)

UPDATE: Microsoft Defender CVE-2026-41091 + CVE-2026-45498 — both CVEs confirmed exploited, out-of-band engine update 4.18.26040.7 confirmed as fix

From CTI Daily Brief — 2026-05-22 · published 2026-05-22 · view item permalink →

UPDATE (originally covered 2026-05-20): Both Microsoft Defender vulnerabilities confirmed as actively exploited in the wild in a combined out-of-band engine update (The Hacker News, 2026-05-21). CVE-2026-41091 (CVSS 7.8, CWE-59 improper link resolution / link following in MsMpEng.exe) allows an authorized local standard-user to abuse Defender's privileged process's symbolic-link resolution during file-system operations to elevate to NT AUTHORITY\SYSTEM (T1068 Exploitation for Privilege Escalation). CVE-2026-45498 (CVSS 4.0, local DoS) was exploited alongside CVE-2026-41091 in observed attacks. Fixed: CVE-2026-41091 (LPE) requires Defender Antimalware Engine >= 1.1.26040.8; CVE-2026-45498 (DoS) requires Antimalware Platform >= 4.18.26040.7. Verify both via Get-MpComputerStatus | Select AMEngineVersion, AMProductVersion — environments with delayed WSUS/Intune update rings must confirm the engine version, not only the platform version, to confirm the LPE patch is applied. Environments with delayed auto-update channels (WSUS/Intune with manual approval) or air-gapped Defender deployments are at risk. Hunt signal: Sysmon EID 1 for SYSTEM-level process spawns from MsMpEng.exe as parent.