[CIVN-2026-0256] Multiple Vulnerabilities in Microsoft Products

By Published On: May 21, 2026

—–BEGIN PGP SIGNED MESSAGE—–

Hash: SHA256


Multiple Vulnerabilities in Microsoft Products


Indian – Computer Emergency Response Team (https://www.cert-in.org.in)


Severity Rating: HIGH


Software Affected


Windows 10: Versions 1607, 1809, 21H2, and 22H2.

Windows 11: Versions 23H2, 24H2, and 25H2.

Windows Server: 2012, 2012 R2, 2016, 2019, 2022, 2022 (23H2 Edition), and 2025.

Microsoft Office (various supported versions).

Microsoft SharePoint Server.

Microsoft Edge (Chromium-based).

Overview


Multiple vulnerabilities have been reported in Microsoft products which could allow an attacker to execute arbitrary code, elevate privileges, disclose sensitive information, bypass security features, or cause denial of service on the affected systems.


Target Audience:

All organizations and individuals using affected Microsoft products.


Risk Assessment:

 High risk due to the potential for remote code execution, privilege escalation, information disclosure, security feature bypass, and denial of service.


Impact Assessment:

Potential for arbitrary code execution, elevation of privileges, unauthorized access to sensitive information, bypass of security protections, and disruption of system availability.


Description


Multiple vulnerabilities exist in Microsoft products due to improper input validation, memory corruption issues, and insufficient restriction of operations within the bounds of a memory buffer, improper access control mechanisms, and improper handling of objects in memory.


An attacker could exploit these vulnerabilities either remotely or locally depending on the attack vector. In some cases, exploitation may require user interaction such as opening a specially crafted file, accessing a malicious webpage, or interacting with crafted content, while other vulnerabilities may be exploited without authentication.


Successful exploitation of these vulnerabilities could allow an attacker to execute arbitrary code in the context of the current user, elevate privileges, disclose sensitive information, bypass security protections, or cause denial of service conditions on the affected systems.


Solution


Apply appropriate updates as mentioned as mentioned by the Vendor:

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-42834


https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-45584


https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-41091


https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-45498


https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-45585



Vendor Information


Microsoft

https://www.microsoft.com/en-in/


References


 

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-42834

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-45584

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-41091

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-45498

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-45585


CVE Name

CVE-2026-42834

CVE-2026-45584

CVE-2026-41091

CVE-2026-45498

CVE-2026-45585




– —


Thanks and Regards,

CERT-In


Incident Response Help Desk

e-mail: incident@cert-in.org.in

Phone: +91-11-22902657

Toll Free Number: 1800-11-4949

Toll Free Fax : 1800-11-6969

Web: http://www.cert-in.org.in

PGP Fingerprint: A768 083E 4475 5725 B81A A379 2156 C0C0 B620 D0B4

PGP Key information:

https://www.cert-in.org.in/s2cMainServlet?pageid=CONTACTUS


Postal address:

Indian Computer Emergency Response Team (CERT-In)

Ministry of Electronics and Information Technology

Government of India

Electronics Niketan

6, C.G.O. Complex

New Delhi-110 003

—–BEGIN PGP SIGNATURE—–


iQIzBAEBCAAdFiEE6r4Iam/Ey0c/KakL3jCgcSdcys8FAmoPIDYACgkQ3jCgcSdc

ys9f1RAAiQEeO1ij/wLqvSHfNhsx3N6/5fXW2o5tnQQuiFWaNazG0jVlpdqPuo5j

h5xSbHvJvjpigIS1oqX1dqIkHhgRQx9g3D0mjPqU0FcCDMZYkuz8ISe4Tfac4/yB

6fbyJNk9Vby7ndOKDd105nnNBLZsmYHtLFQbtNr/3uPb+AdwYYTV/F/PG9zBaNWw

lUicCn/BAWTRobfQVinaYdwrIdQRU6hTIKYOlYzW4flvlkdv2SrOYIPVdBslzIlM

oLDwhEKiVEqKErgjCiLEsPoNKjrdMpmG8y6mMcGfTK4gRMZ4J7J04fPbHyuKCyEJ

UPbeG/hAYs3CNMd6J50rLZI6x7c8Iq6ABKiHvlh8dXAnS2U0n8tlCOwn4wdmkdZF

cAoC81tXpYz+9X1ywkYU8I3nCJr64B4tyDwmHUEmma/hfiaZB7J/ZucoDOXkeciA

X84H9NEutgD2Ctqkn/jyamQKUv8Dpwd8ae/9XsQk8BpRn9yUZiYERLz5Fex1mPwO

Sf08sY09X1WmIBXOEqfAtkxc1Q8ONMZtqKrZ2uiGdKREkWqpSq93lmj16XXwneVI

3I6Jq85tySIWUC8UxugnKbO6f1oKvJOPxV+xiW/UZPlP8T+dbV46v3q2+ZSo8eQl

XnFJxrGaGaThXKT+qaMRApybWDDWHQ7AVqU9xBGlnyEztvbwVb8=

=3Z62

—–END PGP SIGNATURE—–

Share this article