Microsoft has released a critical security update for the Loading Service. CVE‑2026‑42934 allows remote code execution with a CVSS score of 9.8. Immediate patching is required for all affected versions.
CVE‑2026‑42934 – Critical Vulnerability in Microsoft Loading Service
Impact
- Remote code execution possible.
- Full system compromise.
- Affects Windows Server 2022 and Windows 11.
Technical Details
CVE‑2026‑42934 exploits a buffer overflow in the Microsoft Loading Service (MSS). The flaw originates when the service parses malformed LoadConfig files. Attackers can craft a file with a 4,096‑byte payload that overwrites the return address on the stack. The overwritten address points to shellcode injected by the attacker, granting arbitrary code execution with SYSTEM privileges.
The vulnerability is present in MSS versions 10.0.22621.1 through 10.0.22621.5. It is not mitigated by ASLR or DEP because the overflow occurs before those protections are initialized. The CVSS v3.1 base score is 9.8 (Critical).
Affected Products
- Windows Server 2022, build 22621.1–22621.5
- Windows 11, build 22621.1–22621.5
- Azure Virtual Machines running the above OS versions
Mitigation Steps
- Patch immediately. Download the update from the Microsoft Update Catalog.
- Verify installation by running
sfc /scannowand checking the event log for the MSS update entry. - If patching is delayed, disable the Loading Service manually:
sc stop MSSandsc config MSS start= disabled. - Deploy a network firewall rule to block inbound traffic to port 443 for MSS if the service is not required.
- Monitor for anomalous process creation in the Security event log (Event ID 4688).
Timeline
- 2026-04-10: Microsoft publishes advisory and release notes.
- 2026-04-12: Patch available for download.
- 2026-04-15: Advisory urges immediate action.
- 2026-04-20: Advisory escalates to critical status.
Further Resources
Conclusion
CVE‑2026‑42934 poses an immediate risk to all systems running the affected Windows builds. Apply the patch without delay. Failure to do so may result in complete system takeover by an attacker.
Comments
Please log in or register to join the discussion