Description
Out-of-bounds read in Windows HTTP.sys allows an unauthorized attacker to deny service over a network.
Published: 2026-04-14
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: Denial of Service via HTTP.sys
Action: Immediate Patch
AI Analysis

Impact

The vulnerability arises from an out‑of‑bounds read within the Windows HTTP.sys driver. An adversary who can send crafted HTTP requests can trigger a read past the bounds of allocated memory. The resulting fault causes the HTTP.sys component to crash, which in turn brings the web services that depend on it down. Because the fault occurs in a core networking stack, the impact is a denial of service rather than data compromise. This weakness corresponds to the OWL CWE‑125 class of out‑of‑bounds read defects.

Affected Systems

Affected are Microsoft Windows 11 operating systems with release versions 23H2, 24H2, 25H2, 22H3 and 26H1, as well as Windows Server 2022 and Windows Server 2025, including their Server Core editions. The flaw exists in the HTTP.sys component that handles HTTP traffic across these Windows releases.

Risk and Exploitability

The CVSS v3.1 score of 7.5 indicates a high severity level, while the lack of an EPSS rating prevents a precise probability estimate. The vulnerability is not listed in the CISA KEV catalog, suggesting no publicly known exploits at the time of publication. The attack vector is inferred to be remote, as the fault is triggered by network traffic received over HTTP; no elevated privileges or local access are required. Consequently, the risk to availability is significant, especially for services that rely heavily on HTTP.sys for processing requests.

Generated by OpenCVE AI on April 14, 2026 at 19:55 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the Microsoft security update that addresses CVE-2026‑33096 for the affected Windows releases.
  • Ensure the update is installed on all systems running Windows 11 or Windows Server 2022/2025, including Server Core installations.
  • Verify the patch installation by checking the Windows Update history or the relevant security bulletin for confirmation.
  • If a patch cannot be applied immediately, consider blocking external HTTP traffic to the affected endpoints or disabling the Web Server service until remediation is complete.
  • After applying the update, restart the affected services or the system to ensure HTTP.sys loads its patched code.

Generated by OpenCVE AI on April 14, 2026 at 19:55 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 17 Apr 2026 19:45:00 +0000

Type Values Removed Values Added
First Time appeared Microsoft windows Server 2022 23h2
CPEs cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:arm64:*
cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:x64:*
cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:arm64:*
cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:x64:*
cpe:2.3:o:microsoft:windows_11_25h2:*:*:*:*:*:*:arm64:*
cpe:2.3:o:microsoft:windows_11_25h2:*:*:*:*:*:*:x64:*
cpe:2.3:o:microsoft:windows_11_26h1:*:*:*:*:*:*:arm64:*
cpe:2.3:o:microsoft:windows_11_26h1:*:*:*:*:*:*:x64:*
cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*
Vendors & Products Microsoft windows Server 2022 23h2

Wed, 15 Apr 2026 21:00:00 +0000

Type Values Removed Values Added
First Time appeared Microsoft windows 11 22h3
Microsoft windows 11 23h2
Microsoft windows 11 24h2
Microsoft windows 11 25h2
Microsoft windows 11 26h1
Microsoft windows Server 2022, 23h2 Edition (server Core Installation)
Microsoft windows Server 2025 (server Core Installation)
Vendors & Products Microsoft windows 11 22h3
Microsoft windows 11 23h2
Microsoft windows 11 24h2
Microsoft windows 11 25h2
Microsoft windows 11 26h1
Microsoft windows Server 2022, 23h2 Edition (server Core Installation)
Microsoft windows Server 2025 (server Core Installation)

Wed, 15 Apr 2026 11:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 14 Apr 2026 17:30:00 +0000

Type Values Removed Values Added
Description Out-of-bounds read in Windows HTTP.sys allows an unauthorized attacker to deny service over a network.
Title HTTP.sys Denial of Service Vulnerability
First Time appeared Microsoft
Microsoft windows 11 23h2
Microsoft windows 11 24h2
Microsoft windows 11 25h2
Microsoft windows 11 26h1
Microsoft windows Server 2022
Microsoft windows Server 2025
Microsoft windows Server 23h2
Weaknesses CWE-125
CPEs cpe:2.3:o:microsoft:windows_11_23H2:*:*:*:*:*:*:arm64:*
cpe:2.3:o:microsoft:windows_11_23H2:*:*:*:*:*:*:x64:*
cpe:2.3:o:microsoft:windows_11_24H2:*:*:*:*:*:*:arm64:*
cpe:2.3:o:microsoft:windows_11_25H2:*:*:*:*:*:*:arm64:*
cpe:2.3:o:microsoft:windows_11_26H1:*:*:*:*:*:*:arm64:*
cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_23h2:*:*:*:*:*:*:*:*
Vendors & Products Microsoft
Microsoft windows 11 23h2
Microsoft windows 11 24h2
Microsoft windows 11 25h2
Microsoft windows 11 26h1
Microsoft windows Server 2022
Microsoft windows Server 2025
Microsoft windows Server 23h2
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C'}


Subscriptions

Microsoft Windows 11 22h3 Windows 11 23h2 Windows 11 23h2 Windows 11 24h2 Windows 11 24h2 Windows 11 25h2 Windows 11 25h2 Windows 11 26h1 Windows 11 26h1 Windows Server 2022 Windows Server 2022, 23h2 Edition (server Core Installation) Windows Server 2022 23h2 Windows Server 2025 Windows Server 2025 (server Core Installation) Windows Server 23h2
cve-icon MITRE

Status: PUBLISHED

Assigner: microsoft

Published:

Updated: 2026-04-30T14:41:41.184Z

Reserved: 2026-03-17T20:15:23.718Z

Link: CVE-2026-33096

cve-icon Vulnrichment

Updated: 2026-04-15T10:42:56.226Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-14T18:17:31.593

Modified: 2026-04-17T19:32:17.283

Link: CVE-2026-33096

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-15T20:45:06Z

Weaknesses