Description
Use after free in Windows TCP/IP allows an unauthorized attacker to execute code over a network.
Published: 2026-05-12
Score: 8.1 High
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

A use‑after‑free flaw in the Windows TCP/IP stack can be triggered by a crafted network packet. The vulnerability permits an unauthorized attacker to execute arbitrary code on the affected system, potentially giving full control over the machine. The weakness is classified as CWE‑416, and its CVSS score of 8.1 indicates high severity for confidentiality, integrity, and availability.

Affected Systems

Microsoft Windows 10 (builds 1809, 21H2, 22H2), Windows 11 (builds 22H3, 23H2, 24H2, 25H2, 26H1) and Windows Server 2019, 2022, 2025, 23H2 edition are impacted. The application layer may be on x86, x64 or arm64 platforms, depending on the specific release, as listed in the CPE data.

Risk and Exploitability

The patch is not listed in the CISA KEV catalog and, as of the current data, no EPSS score is available. The CVSS score of 8.1 reflects the high risk and indicates that the flaw is exploitable remotely over TCP/IP without authentication. Attackers can send malicious packets over the network to trigger the use‑after‑free, which could lead to complete system takeover. Regular monitoring for suspicious inbound traffic and applying the vendor patch are recommended to reduce exposure.

Generated by OpenCVE AI on May 12, 2026 at 19:19 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the Microsoft security update for CVE‑2026‑40415 as published on the official Microsoft update guide.
  • If the patch cannot be applied immediately, mitigate by blocking or limiting inbound traffic on the affected TCP/IP ports using firewall rules.
  • Deploy network segmentation and monitoring to detect anomalous traffic patterns that could exploit the use‑after‑free issue.

Generated by OpenCVE AI on May 12, 2026 at 19:19 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 12 May 2026 17:30:00 +0000

Type Values Removed Values Added
Description Use after free in Windows TCP/IP allows an unauthorized attacker to execute code over a network.
Title Windows TCP/IP Remote Code Execution Vulnerability
First Time appeared Microsoft
Microsoft windows 10 1809
Microsoft windows 10 21h2
Microsoft windows 10 22h2
Microsoft windows 11 23h2
Microsoft windows 11 24h2
Microsoft windows 11 25h2
Microsoft windows 11 26h1
Microsoft windows Server 2019
Microsoft windows Server 2022
Microsoft windows Server 2025
Microsoft windows Server 23h2
Weaknesses CWE-416
CPEs cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*
cpe:2.3:o:microsoft:windows_10_21H2:*:*:*:*:*:*:x86:*
cpe:2.3:o:microsoft:windows_10_22H2:*:*:*:*:*:*:x64:*
cpe:2.3:o:microsoft:windows_11_23H2:*:*:*:*:*:*:arm64:*
cpe:2.3:o:microsoft:windows_11_23H2:*:*:*:*:*:*:x64:*
cpe:2.3:o:microsoft:windows_11_24H2:*:*:*:*:*:*:arm64:*
cpe:2.3:o:microsoft:windows_11_25H2:*:*:*:*:*:*:arm64:*
cpe:2.3:o:microsoft:windows_11_26H1:*:*:*:*:*:*:x64:*
cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_23h2:*:*:*:*:*:*:*:*
Vendors & Products Microsoft
Microsoft windows 10 1809
Microsoft windows 10 21h2
Microsoft windows 10 22h2
Microsoft windows 11 23h2
Microsoft windows 11 24h2
Microsoft windows 11 25h2
Microsoft windows 11 26h1
Microsoft windows Server 2019
Microsoft windows Server 2022
Microsoft windows Server 2025
Microsoft windows Server 23h2
References
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C'}


Subscriptions

Microsoft Windows 10 1809 Windows 10 21h2 Windows 10 22h2 Windows 11 23h2 Windows 11 24h2 Windows 11 25h2 Windows 11 26h1 Windows Server 2019 Windows Server 2022 Windows Server 2025 Windows Server 23h2
cve-icon MITRE

Status: PUBLISHED

Assigner: microsoft

Published:

Updated: 2026-05-13T03:56:19.097Z

Reserved: 2026-04-13T00:27:50.798Z

Link: CVE-2026-40415

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-12T18:17:19.537

Modified: 2026-05-12T18:17:19.537

Link: CVE-2026-40415

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-12T19:30:23Z

Weaknesses