Microsoft Defender LPE exploited in the wild (CVE-2026-41091)
CVE-2026-41091
CVE-2026-41091: Microsoft Defender link following bug grants local privilege escalation (CVSS 7.8). Actively exploited. Install the latest Defender security update.
Actively exploited in the wild - CVE-2026-41091 is a high-severity local privilege escalation in Microsoft Defender that allows an authorized attacker to gain elevated privileges on the system. No user interaction is required for exploitation.
Overview
CVE-2026-41091 is an improper link resolution before file access vulnerability in Microsoft Defender, commonly known as a “link following” or “symlink” flaw. The vulnerability is classified as HIGH severity with a CVSS score of 7.8.
The attack vector is LOCAL, meaning the attacker must already have low-privileged access to the target system. The attack complexity is LOW, and no user interaction is required for successful exploitation.
Impact
Successful exploitation of CVE-2026-41091 allows an attacker with existing low-privileged access to elevate their privileges on the affected system. This makes it a critical stepping stone in multi-stage attacks, where an attacker first gains initial access and then uses this vulnerability to move laterally or gain administrative control.
Because this vulnerability is confirmed on the CISA Known Exploited Vulnerabilities (KEV) catalog and actively exploited in the wild, organizations should treat this as an immediate and credible threat to their Windows environments.
Remediation
Microsoft has released security updates to address CVE-2026-41091.
- Immediate action: Apply the latest Microsoft Defender security update and any associated Windows security patches as soon as possible.
- Verify update status: Ensure that automatic updates for Microsoft Defender and Windows security are enabled in your environment.
- Monitor for exploitation: Review Windows security event logs for unusual privilege escalation attempts or file operations involving Defender processes.
Security Insight
CVE-2026-41091 represents a growing trend of attackers targeting trusted security software like Defender to bypass protections rather than exploiting operating system kernel bugs directly. This vulnerability mirrors the pattern seen with CVE-2024-21305, a similar Kaspersky symlink flaw, and underscores that no security tool is immune to privilege escalation bugs. Threat actors like those linked to APT28 DNS hijacking campaigns and Storm-1175 routinely chain such local exploits with initial access vectors, as seen in campaigns using compromised SOHO routers to deploy remote access tools.
Further Reading
Never miss a critical vulnerability
Get real-time security alerts delivered to your preferred platform.
Related Advisories
A link following vulnerability has been reported to affect several QNAP operating system versions. The remote attackers can then exploit the vulnerability to traverse the file system to unintended loc...
Microsoft Defender Denial of Service Vulnerability...
Improper neutralization of input during web page generation ('cross-site scripting') in Microsoft Exchange Server allows an unauthorized attacker to perform spoofing over a network....
Balbooa Joomla Forms Builder 2.0.6 contains an unauthenticated SQL injection vulnerability in the form submission handler that allows remote attackers to execute arbitrary SQL queries. Attackers can s...