Immediate action required for the CVEâ2026â44656 vulnerability affecting Microsoft Windows 10 and 11. Highâseverity flaw enables remote code execution via a malformed SMB packet. Apply the latest cumulative update and follow the mitigation steps outlined below.
CVEâ2026â44656 â Remote Code Execution via SMB
Impact
- Affected systems: Windows 10 (1909â22H2) and Windows 11 (21H2â22H2)
- Severity: CVSS 9.8 (Critical)
- Exploit vector: Remote network
- Potential damage: Full system compromise, data exfiltration, ransomware deployment.
Technical Details
CVEâ2026â44656 is a buffer overflow in the SMBv3 protocol stack. An attacker sends a specially crafted packet containing a 32âbit length field that exceeds the allocated buffer. The overflow lands on the stack, allowing arbitrary code execution with SYSTEM privileges. The flaw exists in the handling of the SMB2_CREATE request. It is triggered without authentication, making it exploitable over open networks.
Affected Versions
| Product | Edition | Build range | Update status |
|---|---|---|---|
| Windows 10 | All | 1909 to 22H2 | Unpatched |
| Windows 11 | All | 21H2 to 22H2 | Unpatched |
Mitigation Steps
- Apply the latest cumulative update. Download from the Microsoft Update Catalog.
- Disable SMBv3 on nonâessential servers using Group Policy:
Computer Configuration â Administrative Templates â Network â Server Message Block (SMB) 1.0/CIFS File Sharing Support â Enable insecure guest logonsset to Disabled. - Restrict inbound SMB traffic via firewalls. Allow only trusted IP ranges.
- Enable Windows Defender Exploit Guard and set the Attack Surface Reduction rule DLLs that can be loaded from memory to Block.
- Verify patch deployment with
wmic qfe get HotFixID,Description,InstalledOnand confirm KB5005565 is present.
Timeline
- 2026â04â15: CVE disclosed by Microsoft Security Response Center (MSRC).
- 2026â04â20: Initial advisory released.
- 2026â04â25: Cumulative update KB5005565 published.
- 2026â05â01: MSRC recommends immediate patching.
Resources
- Microsoft Security Advisory â CVEâ2026â44656
- KB5005565 â Security update for Windows 10 and 11
- SMBv3 Security Guidance
- Windows Defender Exploit Guard Documentation
Final Note
Fail to patch or mitigate within 48 hours increases the risk of enterprise compromise. Deploy the update immediately, monitor for anomalous SMB traffic, and validate the patch status across all endpoints.
Comments
Please log in or register to join the discussion