<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2026-45584 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-45584/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 20 May 2026 13:19:27 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-45584/feed.xml" rel="self" type="application/rss+xml"/><item><title>CVE-2026-45584 - Microsoft Defender Heap-based Buffer Overflow RCE</title><link>https://feed.craftedsignal.io/briefs/2026-05-cve-2026-45584-defender-rce/</link><pubDate>Wed, 20 May 2026 13:19:27 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-cve-2026-45584-defender-rce/</guid><description>CVE-2026-45584 is a heap-based buffer overflow vulnerability in Microsoft Defender that allows an unauthorized attacker to execute arbitrary code over a network.</description><content:encoded><![CDATA[<p>CVE-2026-45584 is a critical vulnerability affecting Microsoft Defender. This heap-based buffer overflow allows an unauthorized attacker to execute arbitrary code on a vulnerable system over a network. The vulnerability was published on May 20, 2026. Successful exploitation could lead to a complete compromise of the affected system, potentially allowing the attacker to steal sensitive data, install malware, or disrupt critical services. Defenders need to ensure Microsoft Defender is up to date to mitigate this risk.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker sends a specially crafted network packet to the targeted system.</li>
<li>Microsoft Defender processes the malicious packet.</li>
<li>The packet triggers a heap-based buffer overflow within Defender&rsquo;s processing logic.</li>
<li>The overflow allows the attacker to overwrite adjacent memory regions on the heap.</li>
<li>The attacker carefully crafts the overflow data to inject malicious code into the process.</li>
<li>The injected code is designed to execute with the privileges of the Microsoft Defender service.</li>
<li>The attacker&rsquo;s code executes, granting control over the system.</li>
<li>The attacker can now perform actions such as installing malware, exfiltrating data, or establishing persistence.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-45584 allows a remote, unauthenticated attacker to execute arbitrary code on a system running Microsoft Defender. This could lead to complete system compromise, data theft, malware installation, and denial of service. Given the widespread use of Microsoft Defender, a successful attack could have a significant impact across many organizations.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the security update released by Microsoft to address CVE-2026-45584 on all systems running Microsoft Defender immediately.</li>
<li>Monitor network traffic for suspicious patterns indicative of exploitation attempts targeting this vulnerability.</li>
<li>Deploy the Sigma rules provided in this brief to your SIEM to detect potential exploitation activity.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2026-45584</category><category>heap-overflow</category><category>rce</category><category>microsoft-defender</category></item></channel></rss>