CVE-2026-41091 - Microsoft Defender Link Following Vulnerability
CVE-2026-41091 is a link following vulnerability in Microsoft Defender that allows an authorized attacker to escalate privileges locally.
CVE-2026-41091 is a link following vulnerability affecting Microsoft Defender. This vulnerability allows an authorized local attacker to escalate their privileges on a vulnerable system. Exploitation of this vulnerability could allow an attacker to perform actions with elevated permissions, potentially leading to system compromise. Microsoft has released mitigations to address this vulnerability, and defenders should apply them promptly. This vulnerability is listed in the CISA Known Exploited Vulnerabilities (KEV) catalog, highlighting its importance for defenders to address.
Attack Chain
- An attacker gains initial authorized access to a system with a vulnerable version of Microsoft Defender.
- The attacker crafts a malicious link or file path.
- Microsoft Defender attempts to access the crafted link.
- Due to the link following vulnerability, Defender inadvertently accesses a resource outside of its intended scope, such as a privileged file or directory.
- The attacker leverages this access to manipulate system settings or execute commands with elevated privileges.
- The attacker escalates their privileges on the system.
- The attacker gains control over the system.
Impact
Successful exploitation of CVE-2026-41091 allows an authorized local attacker to escalate privileges on a vulnerable system running Microsoft Defender. This privilege escalation could lead to unauthorized access to sensitive data, modification of system configurations, or the execution of arbitrary code with elevated permissions. If successfully exploited, an attacker can gain full control over the affected system.
Recommendation
- Apply mitigations provided by Microsoft to address CVE-2026-41091 on all systems running Microsoft Defender.
- Follow applicable BOD 22-01 guidance for cloud services utilizing Microsoft Defender.
- If mitigations are unavailable, consider discontinuing use of the product.
Detection coverage 2
Detect CVE-2026-41091 Exploitation Attempt - Suspicious File Access by Defender
mediumDetects CVE-2026-41091 exploitation attempt — Monitors for Microsoft Defender accessing files in unusual locations, potentially indicating a link following vulnerability exploitation.
Detect CVE-2026-41091 Exploitation Attempt - Defender Writing to Suspicious Locations
mediumDetects CVE-2026-41091 exploitation attempt — Monitors for Microsoft Defender writing files to unusual or protected locations.
Detection queries are available on the platform. Get full rules →