CVE-2026-33826

Improper input validation in Windows Active Directory allows an authorized attacker to execute code over an adjacent network.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*

History

17 Apr 2026, 19:19

Type Values Removed Values Added
References () https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33826 - () https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33826 - Vendor Advisory
First Time Microsoft windows Server 2022
Microsoft
Microsoft windows Server 2019
Microsoft windows Server 2016
Microsoft windows Server 2022 23h2
Microsoft windows Server 2025
Microsoft windows Server 2012
CPE cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*

14 Apr 2026, 18:17

Type Values Removed Values Added
New CVE

Information

Published : 2026-04-14 18:17

Updated : 2026-04-17 19:19


NVD link : CVE-2026-33826

Mitre link : CVE-2026-33826

CVE.ORG link : CVE-2026-33826


JSON object : View

Products Affected

microsoft

  • windows_server_2025
  • windows_server_2012
  • windows_server_2019
  • windows_server_2022
  • windows_server_2016
  • windows_server_2022_23h2
CWE
CWE-20

Improper Input Validation