CVSS VectorNVD
CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Lifecycle Timeline
1DescriptionNVD
Improper input validation in Windows Active Directory allows an authorized attacker to execute code over an adjacent network.
AnalysisAI
Remote code execution in Windows Active Directory Domain Services affects all supported Windows Server versions (2012 R2 through 2025) when an authenticated attacker with low privileges on an adjacent network sends specially crafted requests to domain controllers. The vulnerability stems from improper input validation (CWE-20) and enables complete system compromise with high impact to confidentiality, integrity, and availability. …
Sign in for full analysis, threat intelligence, and remediation guidance.
RemediationAI
Within 24 hours: Inventory all domain controllers and document current Windows Server versions in production. Within 7 days: Deploy vendor-released patch to all domain controllers, prioritizing those in Tier 0 environments first; coordinate with change management to schedule patching windows with minimal business disruption. …
Sign in for detailed remediation steps.
Share
External POC / Exploit Code
Leaving vuln.today
EUVD-2026-22645
GHSA-495g-jr6v-pch8