Skip to content
Threat Feed
critical advisory

CVE-2026-34329 Heap-Based Buffer Overflow in Windows Message Queuing

CVE-2026-34329 is a heap-based buffer overflow in Windows Message Queuing, enabling an unauthenticated attacker on an adjacent network to achieve remote code execution.

CVE-2026-34329 is a critical vulnerability affecting Windows Message Queuing (MSMQ). This heap-based buffer overflow allows an unauthorized attacker on an adjacent network to execute arbitrary code. The vulnerability stems from improper memory handling within the MSMQ service when processing specially crafted messages. Successful exploitation could lead to a complete compromise of the affected system, allowing attackers to install programs, view, change, or delete data, or create new accounts with full user rights. The vulnerability poses a significant threat to organizations relying on MSMQ for inter-application communication, particularly in environments where network segmentation is weak or non-existent. Microsoft has released a security update to address this vulnerability, and patching is strongly advised.

Attack Chain

  1. Attacker identifies a target system on an adjacent network running the vulnerable Windows Message Queuing service.
  2. Attacker crafts a malicious MSMQ message designed to trigger a heap-based buffer overflow.
  3. The malicious message is sent to the target system via the MSMQ protocol.
  4. The MSMQ service on the target system receives the message and attempts to process it.
  5. Due to the buffer overflow, the crafted message overwrites adjacent memory on the heap.
  6. The overwritten memory contains executable code or pointers, which are modified by the attacker’s payload.
  7. The MSMQ service attempts to execute the corrupted code, leading to code execution in the context of the MSMQ service.
  8. The attacker gains control of the system and can perform actions such as installing malware, creating new user accounts, or exfiltrating data.

Impact

Successful exploitation of CVE-2026-34329 allows for remote code execution, potentially leading to complete system compromise. An attacker can gain unauthorized access to sensitive data, disrupt critical services, and establish a persistent foothold within the network. The vulnerability affects systems running Windows Message Queuing, potentially impacting organizations across various sectors that rely on this technology for inter-application communication. Given the high CVSS score of 8.8, the potential impact is considered critical.

Recommendation

  • Apply the security update released by Microsoft to patch CVE-2026-34329 immediately.
  • Disable Windows Message Queuing if it is not required.
  • Monitor network traffic for suspicious MSMQ activity using the provided Sigma rule Detect CVE-2026-34329 Exploitation Attempt - Malicious MSMQ Message.
  • Review and enforce network segmentation policies to limit the attack surface and prevent lateral movement.
  • Enable Sysmon process creation logging to improve visibility into potential exploitation attempts (required by Sigma rules).
  • Monitor process creations for suspicious processes spawned by the mqsvc.exe process using the provided Sigma rule Detect Suspicious Process Creation from MSMQ Service.

Detection coverage 2

Detect CVE-2026-34329 Exploitation Attempt - Malicious MSMQ Message

high

Detects CVE-2026-34329 exploitation attempt by monitoring for suspicious patterns in MSMQ network traffic.

sigma tactics: initial_access techniques: T1190 sources: network_connection, windows

Detect Suspicious Process Creation from MSMQ Service

high

Detects suspicious process creations spawned by the MSMQ service (mqsvc.exe) indicating potential exploitation.

sigma tactics: execution techniques: T1059.001 sources: process_creation, windows

Detection queries are available on the platform. Get full rules →