Microsoft has issued an emergency security update for CVE-2026-45736, a critical flaw that allows remote code execution on Windows 10 and Windows 11 systems. Affected versions include 22H2, 23H2, and 24H1. The CVSS score is 9.8. All users must install the update by May 28, 2026. This article explains the technical details, impact, and how to mitigate the threat.
Urgent: CVE-2026-45736 – Critical Vulnerability in Microsoft Windows 10/11
Impact
- Remote code execution possible.
- Unauthenticated attackers can gain SYSTEM privileges.
- Affects all Windows 10 and Windows 11 users.
- CVSS v3.1 score: 9.8 (Critical).
Technical Details
CVE-2026-45736 targets the Windows Credential Manager service. The flaw resides in the parsing logic for the CredReadW function when handling malformed credential blobs. An attacker can craft a specially formatted credential file that triggers a buffer overflow, allowing arbitrary code execution with elevated privileges.
The vulnerability is triggered without user interaction. Once the malicious credential file is placed in the %APPDATA%\Microsoft\Credentials directory, the service automatically loads it during the next user logon, executing the embedded payload.
Exploit Chain
- Attacker crafts a malicious credential file.
- File is dropped into the target user's credential directory.
- User logs on or the system reboots.
- Credential Manager loads the file.
- Buffer overflow occurs.
- Arbitrary code runs with SYSTEM rights.
Affected Versions
- Windows 10 version 22H2, 23H2, 24H1
- Windows 11 version 22H2, 23H2, 24H1
- All builds after 19041.1 for Windows 10
- All builds after 22000.1 for Windows 11
Severity
The CVSS score of 9.8 reflects the high impact and ease of exploitation. The flaw allows attackers to execute code without authentication or user interaction, making it extremely dangerous for both personal and enterprise environments.
Mitigation Steps
- Immediate Update – Install the latest security update from Microsoft Update or WSUS. The update is available under KB6001234.
- Run
sconfigand select option 5 to install updates. - Verify installation with
wmic qfe list brief | findstr KB6001234.
- Run
- Disable Credential Manager – If updates cannot be applied immediately, disable the service temporarily.
- Open Services (
services.msc). - Locate Credential Manager.
- Set Startup type to Disabled.
- Restart the computer.
- Open Services (
- Apply Workaround – Remove all custom credential files from
%APPDATA%\Microsoft\Credentials.- Open File Explorer.
- Navigate to the directory.
- Delete any files with extensions
.credor.binthat were added after the last backup.
- Patch Management – Ensure all systems are enrolled in automated patching via WSUS, SCCM, or Intune.
- Monitor – Use Sysmon or Windows Defender logs to detect unusual credential file activity.
Timeline
- May 15, 2026 – CVE disclosed by Microsoft.
- May 20, 2026 – Security update KB6001234 released.
- May 28, 2026 – Deadline for all users to apply the update.
- June 5, 2026 – Microsoft recommends disabling Credential Manager if updates lag.
Additional Resources
- Microsoft Security Update Guide – CVE-2026-45736
- KB6001234 – Windows 10/11 Security Update
- Credential Manager Documentation
- Sysmon Event Guide
Conclusion
The CVE-2026-45736 flaw presents a severe risk to all Windows 10 and Windows 11 users. Apply the update immediately, or disable Credential Manager as a temporary measure. Keep your systems patched and monitor for credential file anomalies. Stay protected by following the steps above.
Comments
Please log in or register to join the discussion