Microsoft has identified a critical security vulnerability affecting multiple products that requires immediate patching to prevent potential exploitation.
Microsoft has released security guidance for CVE-2026-23446, a critical vulnerability affecting multiple Microsoft products. The vulnerability allows for remote code execution, giving attackers the ability to run arbitrary code on affected systems with system-level privileges.
Affected Products:
- Microsoft Windows 10 (Version 1809 and later)
- Microsoft Windows 11 (All versions)
- Microsoft Server 2022
- Microsoft Office 2019 and Microsoft 365 Apps
CVSS Score: 9.8 (Critical)
The vulnerability exists in the way the Microsoft Windows Graphics Component handles objects in memory. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker could take control of the affected system.
Microsoft has released security updates to address this vulnerability. Organizations should apply these updates immediately.
Mitigation Steps:
- Apply the latest security updates released as part of Microsoft's February 2026 Security Update.
- If immediate patching is not possible, implement the following workarounds:
- Disable the affected graphics component via Group Policy
- Implement network segmentation to limit exposure
- Deploy application control policies to block unauthorized code execution
Timeline:
- Vulnerability discovered: December 2025
- Security release: February 11, 2026
- Exploitation observed in the wild: February 2026
For more information, visit Microsoft's Security Update Guide: Microsoft Security Update Guide
Organizations experiencing issues with the updates should contact Microsoft Support through the Microsoft Security Response Center.
This is a critical security issue requiring immediate attention. Organizations should prioritize patching these systems as soon as possible to prevent potential exploitation.
Comments
Please log in or register to join the discussion