Microsoft has released a security update addressing CVE-2026-34990, a critical vulnerability affecting multiple Windows versions. Users should apply patches immediately to prevent potential exploitation.
Microsoft Releases Critical Security Update for CVE-2026-34990
Microsoft has issued an emergency security update to address CVE-2026-34990, a critical vulnerability that could allow remote code execution on affected Windows systems. The flaw affects Windows 10 version 1809 and later, Windows Server 2019 and newer, and all Windows 11 releases.
The vulnerability exists in the Windows Remote Procedure Call (RPC) service, where improper input validation could enable attackers to execute arbitrary code with system privileges. Microsoft rates this as a 9.8 out of 10 on the CVSS scale, indicating severe risk.
Affected Products
- Windows 10 version 1809 through 22H2
- Windows 11 version 21H2 and 22H2
- Windows Server 2019 and 2022
- Windows Server version 20H2 and 21H2
- Windows IoT Core version 20H2
Mitigation Steps
Microsoft recommends immediate action:
- Apply security updates immediately through Windows Update
- For enterprise environments, deploy via WSUS or Configuration Manager
- Verify patch installation by checking for KB4512534
- Restart systems after installation to complete the process
Timeline
- April 12, 2026: Microsoft notified of vulnerability
- April 13, 2026: Initial investigation completed
- April 14, 2026: Patch development finalized
- April 15, 2026: Emergency update released
Technical Details
The vulnerability stems from a buffer overflow in the RPC runtime library. When processing specially crafted RPC requests, the system fails to validate input length, allowing attackers to overwrite adjacent memory. This could lead to arbitrary code execution with SYSTEM privileges.
Microsoft has confirmed limited in-the-wild exploitation attempts targeting unpatched systems. The company urges all users to update regardless of perceived risk level.
Additional Resources
Organizations unable to immediately apply patches should consider network segmentation and monitoring for unusual RPC traffic patterns as temporary mitigations.
Comments
Please log in or register to join the discussion