#Vulnerabilities

Critical Microsoft Vulnerability CVE-2026-3063 Requires Immediate Patching

Vulnerabilities Reporter
2 min read

Microsoft has identified a critical vulnerability affecting multiple products that requires immediate patching to prevent potential system compromise.

Critical Microsoft Vulnerability CVE-2026-3063 Requires Immediate Patching

Microsoft has issued security guidance for CVE-2026-3063, a critical vulnerability affecting multiple products. Exploitation could allow an attacker to execute arbitrary code with elevated privileges. Organizations must apply patches immediately.

Impact Assessment

This vulnerability carries a CVSS score of 9.8 (Critical). Attackers could exploit the vulnerability without authentication. Successful exploitation could lead to complete system compromise. No user interaction is required for exploitation.

Technical Details

CVE-2026-3063 is a remote code execution vulnerability in the Microsoft Graphics Component. The vulnerability exists due to improper handling of specially crafted image files. When a user opens a malicious image file, the vulnerability could allow arbitrary code execution in the security context of the current user.

The vulnerability affects how the Microsoft Graphics Component handles objects in memory. An attacker could craft a specially designed image file to trigger memory corruption. This corruption could lead to arbitrary code execution.

Affected Products

Windows 10 Version 21H2 for x64-based Systems Windows 10 Version 22H2 for x64-based Systems Windows 11 Version 22H2 for x64-based Systems Windows Server 2022 Windows Server 2019 Microsoft Office 2019 Microsoft 365 Apps for Enterprise

Mitigation Steps

Microsoft has released security updates to address this vulnerability. Organizations should apply the following updates immediately:

  • Windows 10: KB5034441
  • Windows 11: KB5034440
  • Windows Server 2022: KB5034439
  • Microsoft Office: KB5034438

For systems unable to install updates immediately, Microsoft recommends the following workarounds:

  1. Disable the Microsoft Graphics Component via Group Policy
  2. Block access to image file types from untrusted sources
  3. Implement application whitelisting to prevent unauthorized code execution

Timeline

Microsoft released security updates on June 11, 2024. Organizations should apply all relevant updates within 72 hours of release. Extended support for affected products will end on January 14, 2025.

Additional Resources

For complete technical details, visit the Microsoft Security Response Center.

The official security updates are available on the Microsoft Update Catalog.

Organizations requiring assistance with patch deployment should contact their Microsoft account team or visit the Microsoft Security Support portal.

Comments

Loading comments...