Microsoft Issues Security Patches for Exploited Defender Vulnerabilities
Microsoft warns of new Defender zero-days exploited in attacks

Image: Bleepingcomputer
Microsoft has released security patches for two critical vulnerabilities in its Defender software, tracked as CVE-2026-41091 and CVE-2026-45498, which have been actively exploited. Users are advised to ensure their systems are updated as the U.S. Cybersecurity and Infrastructure Security Agency mandates federal agencies to secure their Windows systems against these threats.
- 01CVE-2026-41091 allows attackers to gain SYSTEM privileges through a privilege escalation flaw in the Microsoft Malware Protection Engine.
- 02CVE-2026-45498 can trigger denial-of-service states on unpatched Windows devices running Microsoft Defender Antimalware Platform.
- 03Microsoft's updates include Malware Protection Engine versions 1.1.26040.8 and 4.18.26040.7 to address the vulnerabilities.
- 04The U.S. Cybersecurity and Infrastructure Security Agency has added these vulnerabilities to its Known Exploited Vulnerabilities Catalog.
- 05Federal agencies must secure their Windows systems against these vulnerabilities within two weeks, as per Binding Operational Directive 22-01.
Advertisement
In-Article Ad
On Wednesday, Microsoft rolled out security patches for two critical vulnerabilities in its Defender software, identified as CVE-2026-41091 and CVE-2026-45498, which are being actively exploited in cyberattacks. The first vulnerability, CVE-2026-41091, is a privilege escalation flaw in the Microsoft Malware Protection Engine, allowing attackers to gain SYSTEM privileges. The second flaw, CVE-2026-45498, affects the Microsoft Defender Antimalware Platform and can lead to denial-of-service (DoS) states on unpatched Windows devices. Microsoft has released updated versions of its Malware Protection Engine to address these issues, stating that users should not need to take additional actions to secure their systems as updates are automatically managed. However, users are encouraged to verify that their systems are updated correctly. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has also mandated that federal agencies secure their Windows systems against these vulnerabilities within two weeks, highlighting the significant risks they pose. CISA has included these vulnerabilities in its Known Exploited Vulnerabilities Catalog, urging agencies to apply necessary mitigations.
Advertisement
In-Article Ad
The vulnerabilities pose significant risks to users' systems, potentially leading to unauthorized access and service disruptions.
Advertisement
In-Article Ad
Reader Poll
Do you regularly update your antivirus software?
Connecting to poll...
More about Microsoft
Read the original article
Visit the source for the complete story.







