Microsoft warns of new Defender zero-days exploited in attacks

Brajeshwar1 pts0 comments

Microsoft warns of new Defender zero-days exploited in attacks

Home<br>News<br>Security<br>Microsoft warns of new Defender zero-days exploited in attacks

Microsoft warns of new Defender zero-days exploited in attacks

By Sergiu Gatlan

May 21, 2026

03:49 AM

On Wednesday, Microsoft started rolling out security patches for two Defender vulnerabilities that have been exploited in zero-day attacks.

The first one, tracked as CVE-2026-41091, is a privilege escalation security flaw affecting Microsoft Malware Protection Engine 1.1.26030.3008 and earlier, which provides the scanning, detection, and cleaning capabilities for Microsoft antivirus and antispyware software.

This flaw stems from an improper link resolution before file access (link following) weakness, which allows attackers to gain SYSTEM privileges.

A second vulnerability (CVE-2026-45498) affects systems running the Microsoft Defender Antimalware Platform 4.18.26030.3011 and earlier, a collection of security tools also used by Microsoft's System Center Endpoint Protection, System Center 2012 R2 Endpoint Protection, System Center 2012 Endpoint Protection, and Security Essentials.

According to Microsoft, successful exploitation enables threat actors to trigger denial-of-service (DoS) states on unpatched Windows devices.

Microsoft has released Malware Protection Engine versions 1.1.26040.8 and 4.18.26040.7, respectively, to address the two security flaws, and added that customers shouldn't have to take any action to secure their systems because "the default configuration in Microsoft antimalware software helps ensure that malware definitions and the Windows Defender Antimalware Platform are kept up to date automatically."

However, users should still check whether Windows Defender Antimalware Platform updates and malware definitions are configured to install automatically and verify if the update was installed by going through the following steps:

Open the Windows Security program. For example, type "Security" in the Search bar, then select the Windows Security program.

In the navigation pane, select Virus & threat protection.

Then click Protection Updates in the Virus & threat protection section.

Select Check for updates .

In the navigation pane, select Settings , and then select About .

Examine the Antimalware ClientVersion number. The update was successfully installed if the Malware Protection Platform version number or the signature package version number matches or exceeds the version number that you are trying to verify as installed.

Yesterday, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) also ordered government agencies to secure their Windows systems against these two Microsoft Defender zero-day vulnerabilities, warning that they're actively exploited in the wild.

CISA added them to its Known Exploited Vulnerabilities (KEV) Catalog and ordered Federal Civilian Executive Branch (FCEB) agencies to secure their Windows endpoints and servers within two weeks, by June 3, as mandated by Binding Operational Directive (BOD) 22-01.

"This type of vulnerability is a frequent attack vector for malicious cyber actors and poses significant risks to the federal enterprise," the U.S. cybersecurity agency warned.

"Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable."

On Tuesday, also shared mitigations for YellowKey, a recently disclosed Windows BitLocker zero-day flaw that allows attackers to access protected drives.

The Validation Gap: Automated Pentesting Answers One Question. You Need Six.

Automated pentesting tools deliver real value, but they were built to answer one question: can an attacker move through the network? They were not built to test whether your controls block threats, your detection rules fire, or your cloud configs hold.<br>This guide covers the 6 surfaces you actually need to validate.

Download Now

Related Articles:

CISA orders feds to patch BlueHammer flaw exploited as zero-day<br>Recently leaked Windows zero-days now exploited in attacks<br>Palo Alto Networks firewall zero-day exploited for nearly a month<br>CISA says &lsquo;Copy Fail&rsquo; flaw now exploited to root Linux systems<br>CISA orders feds to patch Windows flaw exploited as zero-day

Actively Exploited

CISA

Denial of Service

Microsoft Defender

Privilege Escalation

Zero-Day

Sergiu Gatlan

Sergiu is a news reporter who has covered the latest cybersecurity and technology developments for over a decade. Email or Twitter DMs for tips.

Previous Article

Next Article

Post a Comment Community Rules

You need to login in order to post a comment

Not a member yet? Register Now

You may also like:

Upcoming Webinar

Popular Stories

GitHub confirms breach of 3,800 repos via malicious VSCode extension

Microsoft confirms Windows 11 security update install issues

Exploit released for new PinTheft Arch Linux root escalation flaw

Sponsor...

microsoft exploited zero security windows defender

Related Articles