Microsoft has confirmed that two vulnerabilities in its Defender security software are currently being exploited in the wild, prompting urgent security updates for all affected Windows systems.
Key Points
- Microsoft Defender is currently facing active exploitation of a privilege escalation flaw (CVE-2026-41091) and a denial-of-service bug (CVE-2026-45498).
- The privilege escalation vulnerability allows attackers to gain SYSTEM-level access, while a separate heap-based buffer overflow (CVE-2026-45584) poses a remote code execution risk.
- Patches are included in Microsoft Defender Antimalware Platform versions 1.1.26040.8 and 4.18.26040.7, which deploy automatically to most systems.
- The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added the two exploited flaws to its Known Exploited Vulnerabilities catalog, mandating fixes by June 3, 2026.
- Users can verify their protection status by checking the Antimalware Client Version number within the Windows Security program settings.