On May 21, 2026, Microsoft disclosed that two vulnerabilities in Microsoft Defender are under active exploitation. The most critical of these is CVE-2026-41091, a local privilege escalation (LPE) flaw that can be used by an attacker who has already gained initial low-privilege access to a system to elevate their permissions to NT AUTHORITY\SYSTEM, achieving complete control. A second vulnerability, CVE-2026-45498, allows for a denial-of-service (DoS) attack against the Defender engine, potentially leaving a system unprotected. A third remote code execution (RCE) flaw, CVE-2026-45584, was also patched. Given that these vulnerabilities affect a core security component of Windows and are being actively used in attacks, immediate verification of patching is critical for all Windows users and administrators.
CVE-2026-41091: This is a local privilege escalation vulnerability. It exists because the Microsoft Malware Protection Engine does not properly resolve symbolic links before file access. An attacker with low-level user permissions can create a malicious symbolic link. When the Defender engine (running as SYSTEM) attempts to access a file via this link, it can be tricked into performing actions on a file of the attacker's choosing with SYSTEM privileges. This allows the attacker to overwrite critical system files or execute code with the highest level of privilege on the system.
CVE-2026-45498: This is a denial-of-service vulnerability. An attacker could craft a specific file that, when scanned by the Microsoft Defender engine, causes it to crash or hang. This would effectively disable the antivirus protection on the system, allowing the attacker to proceed with subsequent stages of an attack without being detected by Defender.
CVE-2026-45584: A remote code execution vulnerability was also patched, though it is not reported as actively exploited. Details are limited, but such a flaw could potentially allow an attacker to execute code by sending a specially crafted file to a system where it would be scanned by Defender.
The vulnerabilities reside in the Microsoft Malware Protection Engine. Version 1.26030.3008 and prior are affected. Microsoft has addressed these flaws in engine version 1.1.26040.8 and later. The Malware Protection Engine typically updates automatically without user intervention, but administrators should verify that the update has been successfully applied across their environments.
Microsoft has confirmed that both CVE-2026-41091 and CVE-2026-45498 are being actively exploited in the wild. This means that threat actors have developed working exploits and are using them in real-world attacks. This significantly increases the urgency of patching. Attackers are likely incorporating the LPE exploit into their post-compromise toolkits to gain full control after an initial foothold is established via phishing or other means.
The impact of CVE-2026-41091 is critical. A privilege escalation to SYSTEM is often the key step that allows an attacker to move from a minor compromise to a full-blown breach. With SYSTEM privileges, an attacker can dump credentials, disable security tools, install persistent backdoors, and move laterally across the network. The DoS vulnerability, CVE-2026-45498, is also significant as it can be used as a precursor to other attacks, effectively blinding the primary security sensor on an endpoint.
The following patterns may help identify vulnerable or compromised systems:
(Get-MpComputerStatus).AMEngineVersion can be used. Any system not running version 1.1.26040.8 or later should be considered vulnerable.MsMpEng.exe process could indicate attempted exploitation of the DoS vulnerability.MsMpEng.exe process to sensitive system directories. This could indicate exploitation of the LPE vulnerability.MsMpEng.exe. While this process is highly privileged, its normal behavior is predictable. Any deviation, such as spawning cmd.exe or writing to C:\Windows\System32, should be investigated.MsMpEng.exe). This can help identify systems where DoS attacks have been attempted."%ProgramFiles%\Windows Defender\MpCmdRun.exe" -SignatureUpdate.The most critical mitigation is to ensure that the Microsoft Malware Protection Engine is updated to version 1.1.26040.8 or later.
Audit and monitor endpoints to verify the patch has been applied and to hunt for signs of post-exploitation activity.
While this vulnerability bypasses standard protections, practicing least privilege can limit an attacker's initial access, preventing them from reaching a point where they can exploit this LPE flaw.
The primary and most urgent countermeasure for the actively exploited Defender vulnerabilities is to ensure the software update has been applied. Since the Microsoft Malware Protection Engine is designed to update automatically and silently, the key action for security teams is verification, not just deployment. Use endpoint management systems (e.g., SCCM, Intune) or scripting (e.g., PowerShell) to remotely query the engine version across all assets. The target version is 1.1.26040.8 or higher. Create a specific dashboard or report that tracks compliance for this update. For air-gapped or disconnected systems, develop a procedure to manually apply the update. Given the active exploitation of a core security product, this update should be treated with the highest priority, and any system that fails to update automatically requires immediate manual intervention.
As a defense-in-depth measure against the privilege escalation (CVE-2026-41091), security teams should use their EDR to scrutinize the behavior of the MsMpEng.exe process. An attacker exploiting this vulnerability will cause this trusted process to perform malicious actions. Create high-priority alerts for any instance of MsMpEng.exe spawning unexpected child processes, particularly cmd.exe, powershell.exe, rundll32.exe, or any living-off-the-land binaries (LOLBins). Additionally, monitor for MsMpEng.exe writing files to unusual locations, such as user profiles or temporary directories, as this could be part of the exploit chain. This behavioral-based detection can serve as a critical safety net to catch exploitation attempts on systems that have not yet been patched or where the exploit is part of a larger attack chain.
Microsoft discloses active exploitation of CVE-2026-41091 and CVE-2026-45498 and releases a patch.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats
Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.
Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.
Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.
Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.
Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.