CVE-2026-26111
HIGH
8,0
Source: [email protected]
Attack Vector: network
Attack Complexity: low
Privileges Required: low
User Interaction: required
Scope: unchanged
Confidentiality: high
Integrity: high
Availability: high
Description
AI Translation Available
Integer overflow or wraparound in Windows Routing and Remote Access Service (RRAS) allows an authorized attacker to execute code over a network.
EPSS (Exploit Prediction Scoring System)
Trend Analysis
EPSS (Exploit Prediction Scoring System)
Prevede la probabilità di sfruttamento basata su intelligence sulle minacce e sulle caratteristiche della vulnerabilità.
EPSS Score
0,0006
Percentile
0,2th
Updated
EPSS Score Trend (Last 6 Days)
122
Heap-based Buffer Overflow
DraftCommon Consequences
Security Scopes Affected:
Availability
Integrity
Confidentiality
Access Control
Other
Potential Impacts:
Dos: Crash, Exit, Or Restart
Dos: Resource Consumption (Cpu)
Dos: Resource Consumption (Memory)
Execute Unauthorized Code Or Commands
Bypass Protection Mechanism
Modify Memory
Other
Applicable Platforms
Languages:
C, C++, Memory-Unsafe
190
Integer Overflow or Wraparound
StableCommon Consequences
Security Scopes Affected:
Availability
Integrity
Confidentiality
Access Control
Other
Potential Impacts:
Dos: Crash, Exit, Or Restart
Dos: Resource Consumption (Memory)
Dos: Instability
Modify Memory
Execute Unauthorized Code Or Commands
Bypass Protection Mechanism
Alter Execution Logic
Dos: Resource Consumption (Cpu)
Applicable Platforms
Languages:
C, Not Language-Specific
Operating System
Windows Server 2025 by Microsoft
Version Range Affected
To
10.0.26100.32522
(exclusive)
CPE Identifier
View Detailed Analysis
cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:-:*:x64:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System
Windows Server 2019 by Microsoft
Version Range Affected
To
10.0.17763.8511
(exclusive)
CPE Identifier
View Detailed Analysis
cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:-:*:x64:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System
Windows Server 2016 by Microsoft
Version Range Affected
To
10.0.14393.8957
(exclusive)
CPE Identifier
View Detailed Analysis
cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:-:*:x64:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System
Windows Server 2022 by Microsoft
Version Range Affected
To
10.0.20348.4893
(exclusive)
CPE Identifier
View Detailed Analysis
cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:-:*:x64:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System
Windows Server 2012 by Microsoft
CPE Identifier
View Detailed Analysis
cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System
Windows Server 2012 by Microsoft
Version Range Affected
To
6.2.9200.25973
(exclusive)
CPE Identifier
View Detailed Analysis
cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:standard:*:x64:*
Common Platform Enumeration - Standardized vulnerability identification
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26111