Description
Improper control of generation of code ('code injection') in Microsoft Defender for Linux allows an unauthorized attacker to execute code over an adjacent network.
Published: 2026-02-10
Score: 8.8 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Patch
AI Analysis

Impact

This vulnerability is a code injection flaw in Microsoft Defender for Endpoint for Linux that allows an attacker to run arbitrary code on an affected host. The flaw arises from improper validation when generating code, giving the attacker the ability to execute unauthorized commands and compromise confidentiality, integrity, and availability of the system. The weakness is identified as CWE‑94.

Affected Systems

Microsoft Defender for Endpoint for Linux is affected, but the specific impacted releases or version ranges are not listed in the advisory. Potential victims are Linux systems that have installed the Defender for Endpoint extension and have not applied the latest update from Microsoft.

Risk and Exploitability

The CVSS base score of 8.8 denotes a high severity and indicates that remote code execution is possible. The EPSS score indicates the likelihood of exploitation is very low (< 1%), and the vulnerability does not appear in the CISA KEV catalog at present. Attackers are inferred to need network access to the victim host, likely through adjacent network connections that expose the Defender for Endpoint service. The vulnerability can be exercised by sending specially crafted input that triggers the code generation mechanism, leading to execution in the context of the service.

Generated by OpenCVE AI on April 15, 2026 at 16:27 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update Microsoft Defender for Endpoint for Linux to the latest released patch that addresses the code injection issue (see the Microsoft security advisory).
  • Limit the Defender for Endpoint service to local traffic only by configuring firewall rules or binding it to localhost, thereby reducing the attack surface exposed over the network.
  • Enable monitoring of process creation and system calls on the host to detect abnormal code execution that could indicate exploitation.

Generated by OpenCVE AI on April 15, 2026 at 16:27 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 26 Feb 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 11 Feb 2026 22:00:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:microsoft:defender_for_endpoint:-:*:*:*:*:linux:*:*

Tue, 10 Feb 2026 18:15:00 +0000

Type Values Removed Values Added
Description Improper control of generation of code ('code injection') in Microsoft Defender for Linux allows an unauthorized attacker to execute code over an adjacent network.
Title Microsoft Defender for Endpoint Linux Extension Remote Code Execution Vulnerability
First Time appeared Microsoft
Microsoft defender For Endpoint
Weaknesses CWE-94
CPEs cpe:2.3:a:microsoft:defender_for_endpoint:*:*:*:*:*:*:*:*
Vendors & Products Microsoft
Microsoft defender For Endpoint
References
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C'}


Subscriptions

Microsoft Defender For Endpoint
cve-icon MITRE

Status: PUBLISHED

Assigner: microsoft

Published:

Updated: 2026-04-10T13:21:20.277Z

Reserved: 2025-12-30T18:10:54.848Z

Link: CVE-2026-21537

cve-icon Vulnrichment

Updated: 2026-02-25T15:43:10.379Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-10T18:16:35.970

Modified: 2026-02-11T21:50:25.840

Link: CVE-2026-21537

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-15T17:45:10Z

Weaknesses