#Vulnerabilities

Critical Remote Code Execution Flaw (CVE‑2026‑44608) Affects Microsoft Windows 10/11 and Server 2022

Vulnerabilities Reporter
3 min read

A newly disclosed CVE‑2026‑44608 enables unauthenticated attackers to execute arbitrary code via crafted network packets. The vulnerability scores 9.8 CVSS, impacts all supported Windows 10, Windows 11, and Windows Server 2022 editions. Microsoft has released out‑of‑band patches; organizations must apply them immediately and enforce network segmentation.

Critical Remote Code Execution Flaw (CVE‑2026‑44608) Impacts All Current Windows Releases

Impact: Unauthenticated remote code execution (RCE) on Windows 10, Windows 11, and Windows Server 2022.
CVSS v3.1 Base Score: 9.8 (Critical).
Published: 2026‑04‑30.
Patch Release: 2026‑05‑02 (out‑of‑band).
Reference: Microsoft Security Update Guide


What happened?

Microsoft's networking stack contains a flaw in the handling of specially crafted SMBv3 packets.
When a malicious actor sends a packet with a malformed TreeConnect request, the kernel fails to validate a length field, leading to a buffer overflow.
The overflow overwrites adjacent function pointers, granting the attacker full system privileges.

The vulnerability is wormable: an exploited host can automatically scan and infect other vulnerable machines on the same subnet without user interaction.


Who is affected?

Product Versions Affected Build Range
Windows 10 22H2, 21H2, 20H2 19044.0 – 19044.3086
Windows 11 22H2, 23H2 22621.0 – 22621.1702
Windows Server 2022 All releases 20348.0 – 20348.1500

All editions (Home, Pro, Enterprise, Education) are vulnerable.
The flaw is present in both 64‑bit and 32‑bit builds.


Why does it matter?

  • Remote exploitation: No authentication required.
  • Privilege escalation: Code runs as SYSTEM, the highest Windows privilege.
  • Worm potential: Successful compromise can propagate laterally across corporate LANs.
  • Data breach risk: Attackers can install ransomware, exfiltrate data, or create back‑doors.

A single compromised endpoint can jeopardize an entire network, especially in environments where SMB traffic is unrestricted.


Technical details (for defenders)

  1. Vulnerability class: Heap‑based buffer overflow in SrvNetCreateTreeConnect (smb3.sys).
  2. Trigger: Malformed TreeConnect request with PathLength set to 0xFFFFFFFF.
  3. Exploit chain:
    • Attacker sends packet to TCP port 445.
    • Kernel copies PathLength bytes without bounds check.
    • Overflow overwrites the Callback pointer in the TREE_CONNECT object.
    • Controlled shellcode executes with NT AUTHORITY\SYSTEM rights.
  4. Mitigations in the wild: Early detection signatures in IDS/IPS (Snort rule ET CURRENT_Microsoft SMB TreeConnect Overflow).
  5. Network scope: Works over both IPv4 and IPv6.
  6. Proof‑of‑Concept: Public PoC released on GitHub (see cve‑2026‑44608‑poc).

Immediate mitigation steps

  1. Apply the Microsoft patch released on 2026‑05‑02.
  2. Block SMB traffic at the perimeter if not required.
    • Add firewall rule: deny tcp any any eq 445 on edge devices.
  3. Enable SMB signing on all domain‑joined machines to make packet tampering harder.
  4. Deploy network‑level IDS signatures that detect the malformed TreeConnect pattern.
  5. Audit for lateral movement: scan for unexpected SMB connections from newly created SYSTEM processes.
  6. Isolate compromised hosts immediately; disconnect from the corporate LAN and perform forensic imaging.

Long‑term hardening recommendations

  • Adopt Zero Trust networking: Do not trust internal traffic by default; require mutual authentication for SMB.
  • Patch management automation: Ensure critical out‑of‑band updates are applied within 24 hours.
  • Application whitelisting: Use Windows Defender Application Control to restrict execution of unsigned binaries.
  • Regular vulnerability scanning: Include SMB protocol checks in quarterly scans.
  • User education: Remind staff that SMB shares should never be accessed over public Wi‑Fi.

Timeline

  • 2026‑04‑28: Vulnerability discovered by internal Microsoft Red Team.
  • 2026‑04‑30: CVE assigned and publicly disclosed.
  • 2026‑05‑01: Exploit code leaked on underground forums.
  • 2026‑05‑02: Out‑of‑band security update (KB5029389) released.
  • 2026‑05‑04: Major AV vendors publish detection signatures.
  • 2026‑05‑07: CISA adds CVE‑2026‑44608 to its Known Exploited Vulnerabilities (KEV) Catalog.

What to do now?

Do not wait.
Apply the patch within the next 12 hours.
If patching cannot be completed immediately, block port 445 at the network edge and monitor for the IDS signature.

Stay vigilant.
The window for exploitation is already open, and attackers are actively scanning for vulnerable hosts.

Comments

Loading comments...