CVE-2026-32179

CRITICAL
2026-04-16 https://github.com/microsoft/msquic GHSA-gvvw-8j96-8g5r
9.8
CVSS 3.1
Share

CVSS VectorNVD

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

1
Analysis Generated
Apr 16, 2026 - 01:20 vuln.today

DescriptionNVD

Summary

Improper input validation in Microsoft QUIC allows an unauthorized attacker to elevate privileges over a network.

Details

Improper Input Validation Integer Underflow (Wrap or Wraparound) when decoding ACK frame. #### Patches

  • Fix underflow in ACK frame parsing - 1e6e999b

Impact

An attacker who successfully exploited this vulnerability could gain elevated privileges.

MSRC CVE Info

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32179

AnalysisAI

Integer underflow in Microsoft QUIC's ACK frame parser enables remote unauthenticated privilege escalation. The vulnerability (CWE-191: integer wrap-around) affects Microsoft's native QUIC library implementations (both OpenSSL and SChannel variants) distributed via NuGet packages. …

Sign in for full analysis, threat intelligence, and remediation guidance.

RemediationAI

Within 24 hours: Identify all applications and services using Microsoft QUIC NuGet packages (both OpenSSL and SChannel variants) via dependency scanning; notify development and infrastructure teams. Within 7 days: Update all Microsoft QUIC NuGet packages to versions containing commit 1e6e999b or later; validate updates in staging environments. …

Sign in for detailed remediation steps.

Share

CVE-2026-32179 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy