Microsoft addresses critical vulnerability affecting multiple products, urges immediate action.
Microsoft Releases Security Updates for Critical Remote Code Execution Vulnerability CVE-2026-43331
Microsoft has released security updates to address a critical remote code execution vulnerability affecting multiple products. The vulnerability, tracked as CVE-2026-43331, carries a CVSS score of 9.8 and is being actively exploited in the wild. Organizations must apply patches immediately to prevent compromise.
Affected Products
The vulnerability impacts the following Microsoft products:
- Windows 11 (version 22H2 and later)
- Windows Server 2022
- Microsoft Edge (Chromium-based)
- Visual Studio 2022
- .NET Framework 4.8
Technical Details
CVE-2026-43331 is a memory corruption vulnerability in the Microsoft Graphics Component. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. Users whose accounts are configured to have fewer user rights could be less impacted than users who operate with administrative user rights.
The vulnerability exists when the Microsoft Graphics Component improperly handles objects in memory. An attacker could exploit this vulnerability by convincing a user to open a specially crafted document or view a maliciously crafted website. This vulnerability could also be exploited through compromised websites or advertisements.
Mitigation
Microsoft recommends the following immediate actions:
- Apply the security updates immediately
- Enable the Enhanced Mitigation Experience Toolkit (EMET)
- Configure Microsoft Edge to block untrusted sites
- Implement network segmentation
The security updates are available through the Microsoft Security Response Center and the Windows Update service.
Timeline
- Discovery: January 15, 2026
- Disclosed: January 25, 2026
- Patch Released: February 8, 2026
- Exploitation Detected: February 10, 2026
- Required Action: Apply patches within 7 days
Organizations that cannot immediately apply patches should implement the following compensating controls:
- Block TCP port 445 at the network perimeter
- Disable the Microsoft Graphics Component via Group Policy
- Implement application control policies
For complete technical details, refer to the Microsoft Security Advisory.
Additional Resources
Organizations experiencing issues with the updates should contact Microsoft Support through the Microsoft Support portal.
Comments
Please log in or register to join the discussion