Microsoft has identified a critical remote code execution vulnerability affecting multiple products that requires immediate attention and patching.
Microsoft has issued a critical security advisory for CVE-2026-7355, a remote code execution vulnerability affecting multiple Windows products. The vulnerability carries a CVSS score of 9.8 (Critical) and could allow an attacker to execute arbitrary code with elevated privileges on vulnerable systems.
Affected Products:
- Windows 10 (Version 21H2 and later)
- Windows 11 (All versions)
- Windows Server 2022
- Windows Server 2019
- Microsoft Office 2021
- Microsoft 365 Apps for Enterprise
The vulnerability exists in the way the Microsoft Windows Graphics Component handles objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, the attacker could take control of the affected system.
Exploitation of this vulnerability could allow an attacker to install programs, view, change, or delete data, or create new accounts with full user rights. Attackers could then install additional malware, steal data, or use compromised systems as launch points for additional attacks against other systems.
Microsoft has released security updates to address this vulnerability. Organizations should apply these updates as soon as possible. For systems that cannot be updated immediately, Microsoft has provided guidance on mitigating factors that could reduce the likelihood of exploitation.
Mitigation Steps:
Apply the security updates immediately:
For systems that cannot be patched immediately:
- Implement network segmentation to limit exposure
- Restrict access to affected systems
- Enable Windows Defender Antivirus with real-time protection
- Configure Microsoft Defender Exploit Guard to mitigate potential exploits
Monitor for suspicious activity:
- Review Windows Event Logs for unusual authentication attempts
- Monitor for unexpected process execution
- Check for unauthorized system modifications
Timeline:
- Vulnerability discovered: March 2026
- Security advisory published: May 12, 2026
- Updates released: May 14, 2026
- Next scheduled security update: June 8, 2026
Organizations with enterprise-wide deployment tools should test updates in a non-production environment before deployment. Home users should enable automatic Windows updates to ensure timely protection.
The Microsoft Security Response Center (MSRC) has confirmed that they are not aware of any active exploitation of this vulnerability at the time of release. However, given the severity, organizations should treat this as a priority security issue.
For additional information, refer to the official Microsoft Security Advisory and the MSRC Blog.
Comments
Please log in or register to join the discussion