
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2025-26686 is a Critical Remote Code Execution (RCE) vulnerability discovered in Windows TCP/IP component, disclosed on April 8, 2025. The vulnerability stems from sensitive data storage in improperly locked memory in Windows TCP/IP, which allows an unauthorized attacker to execute code over a network. Microsoft has assigned this vulnerability a CVSS 3.1 base score of 7.5 (NVD, Talos).
The vulnerability exists due to improperly locked memory handling in Windows TCP/IP. The exploitation path involves an attacker waiting for a user to initiate a connection and send a DHCPv6 request, to which the attacker would reply with a DHCPv6 response containing a fake IPv6 address. Successful exploitation requires the attacker to win a race condition and make several preparations in the target environment beforehand. Due to this complexity, Microsoft has determined that exploitation is 'Less likely' (Talos).
If successfully exploited, this vulnerability allows an unauthorized attacker to execute arbitrary code over a network through the Windows TCP/IP component. The severity of this vulnerability is reflected in its Critical rating and CVSS 3.1 base score of 7.5 (ZDI).
Microsoft has released security updates to address this vulnerability as part of their April 2025 Patch Tuesday updates. Organizations are advised to apply the security updates to affected systems (MSRC).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."