2026-04-14
microsoft
Authentication Bypass
Microsoft
Windows 10 Version 1607
Windows 10 Version 1809
Windows 10 Version 21H2
Windows 10 Version 22H2
Windows 11 Version 22H3
Windows 11 Version 23H2
Windows 11 Version 24H2
Windows 11 Version 25H2
Windows 11 Version 26H1
Windows Server 2016
Windows Server 2016 Server Core Installation
Windows Server 2019
Windows Server 2019 Server Core Installation
Windows Server 2022
Windows Server 2022 23H2 Edition Server Core Installation
Windows Server 2025
Windows Server 2025 Server Core Installation
6.2
CVSS 3.1
Temporal: 5.4
Share
CVSS VectorNVD
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Attack Vector
Local
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
None
Availability
None
Lifecycle Timeline
1
Analysis Generated
Apr 14, 2026 - 19:42 vuln.today
DescriptionNVD
Improper authentication in Windows Active Directory allows an unauthorized attacker to perform spoofing locally.
AnalysisAI
Improper authentication in Windows Active Directory enables local spoofing attacks on unauthenticated users, allowing attackers with local access to bypass authentication mechanisms and gain unauthorized access to sensitive information. This vulnerability affects multiple Windows 10 and Windows 11 versions as well as Windows Server 2016 through 2025. …
Sign in for full analysis, threat intelligence, and remediation guidance.
Share
External POC / Exploit Code
Leaving vuln.today
Destination URL
POC code from unknown sources may be malicious, contain backdoors, or be fake.
Always review and test exploit code in a safe, isolated environment (VM/sandbox).
Verify the source reputation and cross-reference with known databases (Exploit-DB, GitHub Security).
EUVD-2026-22497