#Vulnerabilities

Microsoft Releases Critical Security Update for CVE-2026-28364 Vulnerability

Vulnerabilities Reporter
2 min read

Microsoft has issued a security update addressing CVE-2026-28364, a critical vulnerability affecting multiple Windows versions that could allow remote code execution.

Microsoft Patches Critical Windows Vulnerability CVE-2026-28364

Microsoft has released a critical security update to address CVE-2026-28364, a severe vulnerability affecting Windows operating systems that could allow attackers to execute arbitrary code remotely.

Vulnerability Details

The vulnerability exists in the Windows kernel component, where improper validation of user-supplied data could lead to memory corruption. An attacker who successfully exploits this flaw could run arbitrary code in kernel mode, potentially taking complete control of the affected system.

Affected Products

According to Microsoft's security bulletin, the following Windows versions are affected:

  • Windows 10 (all versions)
  • Windows 11 (all versions)
  • Windows Server 2019
  • Windows Server 2022
  • Windows Server 2025

Severity and Risk

Microsoft has assigned this vulnerability a CVSS score of 9.8 out of 10, classifying it as Critical. The high severity stems from:

  • Remote code execution potential
  • No user interaction required
  • Ability to achieve system-level privileges
  • No authentication needed for exploitation

Mitigation Steps

Immediate Actions Required:

  1. Install the security update immediately via Windows Update
  2. Verify installation of KB5028364 (or later)
  3. Restart systems after installation
  4. For enterprise environments, test updates in non-production systems first

Workarounds (if immediate patching isn't possible):

  • Disable unnecessary network services
  • Restrict inbound connections on affected systems
  • Implement network segmentation for vulnerable systems

Timeline

Microsoft released the security update on March 11, 2026, as part of its monthly Patch Tuesday updates. The company stated that the vulnerability was responsibly disclosed and that no evidence of active exploitation was found in the wild at the time of disclosure.

Additional Resources

Recommendations

Security professionals recommend prioritizing the deployment of this update, particularly for:

  • Internet-facing servers
  • Domain controllers
  • Systems with sensitive data
  • Critical infrastructure

Organizations should also review their patch management processes to ensure timely deployment of critical security updates in the future.

Note: This article will be updated as more information becomes available from Microsoft and security researchers.

Comments

Loading comments...