CVSS VectorNVD

CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Adjacent
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

1
Analysis Generated
Apr 14, 2026 - 19:25 vuln.today

DescriptionNVD

Improper input validation in Windows Active Directory allows an authorized attacker to execute code over an adjacent network.

AnalysisAI

Remote code execution in Windows Active Directory Domain Services affects all supported Windows Server versions (2012 R2 through 2025) when an authenticated attacker with low privileges on an adjacent network sends specially crafted requests to domain controllers. The vulnerability stems from improper input validation (CWE-20) and enables complete system compromise with high impact to confidentiality, integrity, and availability. …

Sign in for full analysis, threat intelligence, and remediation guidance.

RemediationAI

Within 24 hours: Inventory all domain controllers and document current Windows Server versions in production. Within 7 days: Deploy vendor-released patch to all domain controllers, prioritizing those in Tier 0 environments first; coordinate with change management to schedule patching windows with minimal business disruption. …

Sign in for detailed remediation steps.

Share

EUVD-2026-22645 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy