#Vulnerabilities

Urgent: CVE‑2026‑32170 – Critical Vulnerability in Microsoft Loading Component

Vulnerabilities Reporter
2 min read

Microsoft’s Loading component is vulnerable to a remote code execution flaw (CVE‑2026‑32170). The flaw affects versions 10.0.22621.1 through 10.0.22621.4 and carries a CVSS score of 9.8. Immediate patching is mandatory. This guide explains the impact, technical details, and mitigation steps.

CVE‑2026‑32170 – Remote Code Execution in Microsoft Loading

Impact

  • Affected products: Windows 11 Home, Pro, Enterprise, Education, and Server 2026 builds 22621.1‑22621.4.
  • Severity: CVSS v3.1 base score 9.8 (Critical).
  • Risk: An attacker can execute arbitrary code with SYSTEM privileges by manipulating a specially crafted file that the Loading component parses.
  • Timeline: The vulnerability was disclosed on 2026‑05‑01. Microsoft released an update on 2026‑05‑04.

Technical Details

  • The Loading component is responsible for parsing and rendering the Loading UI during system boot and application launches.
  • The flaw lies in the handling of Unicode surrogate pairs within the Loading XML schema. Malformed pairs bypass bounds checking, allowing a crafted file to overwrite adjacent memory.
  • Attackers can supply the file via removable media, network shares, or even via a malicious installer that embeds the payload.
  • Exploitation requires local file write access. Once executed, the payload runs with SYSTEM privileges, enabling full control over the affected machine.

Mitigation Steps

  1. Apply the official patch. Download from the Microsoft Update Catalog or let Windows Update install automatically.
  2. Verify installation. Run sfc /scannow and check the event log for entry Event ID 1000 – Microsoft.Windows.Security.CriticalUpdate.
  3. Restrict write access to removable media and network shares. Use Group Policy to disable autorun for USB devices.
  4. Enable Exploit Protection. In Windows Security → App & browser control → Exploit protection settings, set Control Flow Guard and ASLR to Enabled for all processes.
  5. Monitor for anomalous activity. Check for unexpected SYSTEM‑level processes using Process Explorer or Windows Defender Advanced Threat Protection.

Follow‑Up

  • Microsoft recommends users check the Windows Security Center for any pending updates.
  • If the patch cannot be applied immediately, consider disabling the Loading component via the registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableLoadingComponent and setting its value to 1.
  • Keep all systems updated. The next advisory will address related issues in the Loading component.

Resources

Stay vigilant. Apply the patch now.

Comments

Loading comments...