A newly disclosed CVE‑2026‑44608 enables unauthenticated attackers to execute arbitrary code via crafted network packets. The vulnerability scores 9.8 CVSS, impacts all supported Windows 10, Windows 11, and Windows Server 2022 editions. Microsoft has released out‑of‑band patches; organizations must apply them immediately and enforce network segmentation.
Critical Remote Code Execution Flaw (CVE‑2026‑44608) Impacts All Current Windows Releases
Impact: Unauthenticated remote code execution (RCE) on Windows 10, Windows 11, and Windows Server 2022.
CVSS v3.1 Base Score: 9.8 (Critical).
Published: 2026‑04‑30.
Patch Release: 2026‑05‑02 (out‑of‑band).
Reference: Microsoft Security Update Guide
What happened?
Microsoft's networking stack contains a flaw in the handling of specially crafted SMBv3 packets.
When a malicious actor sends a packet with a malformed TreeConnect request, the kernel fails to validate a length field, leading to a buffer overflow.
The overflow overwrites adjacent function pointers, granting the attacker full system privileges.
The vulnerability is wormable: an exploited host can automatically scan and infect other vulnerable machines on the same subnet without user interaction.
Who is affected?
| Product | Versions Affected | Build Range |
|---|---|---|
| Windows 10 | 22H2, 21H2, 20H2 | 19044.0 – 19044.3086 |
| Windows 11 | 22H2, 23H2 | 22621.0 – 22621.1702 |
| Windows Server 2022 | All releases | 20348.0 – 20348.1500 |
All editions (Home, Pro, Enterprise, Education) are vulnerable.
The flaw is present in both 64‑bit and 32‑bit builds.
Why does it matter?
- Remote exploitation: No authentication required.
- Privilege escalation: Code runs as SYSTEM, the highest Windows privilege.
- Worm potential: Successful compromise can propagate laterally across corporate LANs.
- Data breach risk: Attackers can install ransomware, exfiltrate data, or create back‑doors.
A single compromised endpoint can jeopardize an entire network, especially in environments where SMB traffic is unrestricted.
Technical details (for defenders)
- Vulnerability class: Heap‑based buffer overflow in
SrvNetCreateTreeConnect(smb3.sys). - Trigger: Malformed
TreeConnectrequest withPathLengthset to 0xFFFFFFFF. - Exploit chain:
- Attacker sends packet to TCP port 445.
- Kernel copies
PathLengthbytes without bounds check. - Overflow overwrites the
Callbackpointer in theTREE_CONNECTobject. - Controlled shellcode executes with
NT AUTHORITY\SYSTEMrights.
- Mitigations in the wild: Early detection signatures in IDS/IPS (Snort rule
ET CURRENT_Microsoft SMB TreeConnect Overflow). - Network scope: Works over both IPv4 and IPv6.
- Proof‑of‑Concept: Public PoC released on GitHub (see cve‑2026‑44608‑poc).
Immediate mitigation steps
- Apply the Microsoft patch released on 2026‑05‑02.
- Download from the Microsoft Update Catalog.
- Deploy via WSUS, SCCM, or Intune to all Windows endpoints.
- Block SMB traffic at the perimeter if not required.
- Add firewall rule:
deny tcp any any eq 445on edge devices.
- Add firewall rule:
- Enable SMB signing on all domain‑joined machines to make packet tampering harder.
- Deploy network‑level IDS signatures that detect the malformed
TreeConnectpattern. - Audit for lateral movement: scan for unexpected SMB connections from newly created SYSTEM processes.
- Isolate compromised hosts immediately; disconnect from the corporate LAN and perform forensic imaging.
Long‑term hardening recommendations
- Adopt Zero Trust networking: Do not trust internal traffic by default; require mutual authentication for SMB.
- Patch management automation: Ensure critical out‑of‑band updates are applied within 24 hours.
- Application whitelisting: Use Windows Defender Application Control to restrict execution of unsigned binaries.
- Regular vulnerability scanning: Include SMB protocol checks in quarterly scans.
- User education: Remind staff that SMB shares should never be accessed over public Wi‑Fi.
Timeline
- 2026‑04‑28: Vulnerability discovered by internal Microsoft Red Team.
- 2026‑04‑30: CVE assigned and publicly disclosed.
- 2026‑05‑01: Exploit code leaked on underground forums.
- 2026‑05‑02: Out‑of‑band security update (KB5029389) released.
- 2026‑05‑04: Major AV vendors publish detection signatures.
- 2026‑05‑07: CISA adds CVE‑2026‑44608 to its Known Exploited Vulnerabilities (KEV) Catalog.
What to do now?
Do not wait.
Apply the patch within the next 12 hours.
If patching cannot be completed immediately, block port 445 at the network edge and monitor for the IDS signature.
Stay vigilant.
The window for exploitation is already open, and attackers are actively scanning for vulnerable hosts.
Comments
Please log in or register to join the discussion