Description
Null pointer dereference in Windows TCP/IP allows an unauthorized attacker to deny service over an adjacent network.
Published: 2026-05-12
Score: 7.4 High
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

A null pointer dereference in the Windows TCP/IP stack allows an attacker who can reach the target from an adjacent network to trigger a denial of service. The flaw does not require authentication and can be exploited by sending specially crafted packets that cause the kernel networking code to attempt to read a null pointer, resulting in a system crash or forced reboot. The vulnerability is classified as CWE‑476 and leads to loss of availability for the affected host.

Affected Systems

Affected Windows operating systems include Windows 10 builds 1607, 1809, 21H2 and 22H2; Windows 11 builds 23H2, 24H2, 25H2, 22H3 and 26H1; and Windows Server editions 2012 (standard and Server Core), 2012 R2 (standard and Server Core), 2016, 2019, 2022, 2025 and the 23H2 Edition (Server Core). All listed builds are impacted when the network interfaces are reachable from an external or adjacent network.

Risk and Exploitability

The CVSS score of 7.4 categorizes this as a high‑severity vulnerability. Because the EPSS score is unavailable and the issue is not listed in the CISA KEV catalog, there is no publicly confirmed exploitation data, but the attack vector is presumed to be local‑network or adjacent‑network based on the description. An attacker does not need authentication; the flaw can be triggered by an unauthenticated user who can send traffic to the vulnerable TCP/IP stack, keying in on the null pointer dereference to cause a crash. The resulting denial of service can incapacitate critical services or render the host unreachable, impacting availability across the affected systems.

Generated by OpenCVE AI on May 12, 2026 at 19:56 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Download and install the Microsoft update for CVE‑2026‑40413 from the Microsoft Security Response Center and apply it to all affected Windows 10, 11 and Server editions.
  • Ensure the update is distributed to Server Core installations via WSUS or manual installation to cover all deployments.
  • Apply network segmentation or firewall rules to limit inbound traffic to the TCP/IP stack from untrusted adjacent networks, thereby reducing the attack surface until the patch is applied.

Generated by OpenCVE AI on May 12, 2026 at 19:56 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 12 May 2026 17:30:00 +0000

Type Values Removed Values Added
Description Null pointer dereference in Windows TCP/IP allows an unauthorized attacker to deny service over an adjacent network.
Title Windows TCP/IP Denial of Service Vulnerability
First Time appeared Microsoft
Microsoft windows 10 1607
Microsoft windows 10 1809
Microsoft windows 10 21h2
Microsoft windows 10 22h2
Microsoft windows 11 23h2
Microsoft windows 11 24h2
Microsoft windows 11 25h2
Microsoft windows 11 26h1
Microsoft windows Server 2012
Microsoft windows Server 2012 R2
Microsoft windows Server 2016
Microsoft windows Server 2019
Microsoft windows Server 2022
Microsoft windows Server 2025
Microsoft windows Server 23h2
Weaknesses CWE-476
CPEs cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*
cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*
cpe:2.3:o:microsoft:windows_10_21H2:*:*:*:*:*:*:x64:*
cpe:2.3:o:microsoft:windows_10_22H2:*:*:*:*:*:*:x64:*
cpe:2.3:o:microsoft:windows_11_23H2:*:*:*:*:*:*:arm64:*
cpe:2.3:o:microsoft:windows_11_23H2:*:*:*:*:*:*:x64:*
cpe:2.3:o:microsoft:windows_11_24H2:*:*:*:*:*:*:arm64:*
cpe:2.3:o:microsoft:windows_11_25H2:*:*:*:*:*:*:arm64:*
cpe:2.3:o:microsoft:windows_11_26H1:*:*:*:*:*:*:x64:*
cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*
cpe:2.3:o:microsoft:windows_server_2012_R2:*:*:*:*:*:*:x64:*
cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_23h2:*:*:*:*:*:*:*:*
Vendors & Products Microsoft
Microsoft windows 10 1607
Microsoft windows 10 1809
Microsoft windows 10 21h2
Microsoft windows 10 22h2
Microsoft windows 11 23h2
Microsoft windows 11 24h2
Microsoft windows 11 25h2
Microsoft windows 11 26h1
Microsoft windows Server 2012
Microsoft windows Server 2012 R2
Microsoft windows Server 2016
Microsoft windows Server 2019
Microsoft windows Server 2022
Microsoft windows Server 2025
Microsoft windows Server 23h2
References
Metrics cvssV3_1

{'score': 7.4, 'vector': 'CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C'}


Subscriptions

Microsoft Windows 10 1607 Windows 10 1809 Windows 10 21h2 Windows 10 22h2 Windows 11 23h2 Windows 11 24h2 Windows 11 25h2 Windows 11 26h1 Windows Server 2012 Windows Server 2012 R2 Windows Server 2016 Windows Server 2019 Windows Server 2022 Windows Server 2025 Windows Server 23h2
cve-icon MITRE

Status: PUBLISHED

Assigner: microsoft

Published:

Updated: 2026-05-12T17:54:24.497Z

Reserved: 2026-04-13T00:27:50.798Z

Link: CVE-2026-40413

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-12T18:17:19.167

Modified: 2026-05-12T18:17:19.167

Link: CVE-2026-40413

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-12T20:00:13Z

Weaknesses