Source: Microsoft patches two zero-day flaws in Defender | CSO Online
Author: unknown
URL: https://www.csoonline.com/article/4175970/microsoft-patches-two-zero-day-flaws-in-defender.html
ONE SENTENCE SUMMARY:
Microsoft patched two exploited Microsoft Defender zero-days enabling privilege escalation or protection disruption, urging updates to specific engine/platform versions.
MAIN POINTS:
- Emergency fixes address two zero-day flaws in Microsoft Defender malware protection components.
- Local attackers can obtain SYSTEM privileges or break antimalware service functionality.
- Either outcome helps malware evade detection and increases attacker control.
- CISA added CVE-2026-41091 and CVE-2026-45498 to the KEV catalog.
- Inclusion in KEV indicates exploitation was observed in the wild.
- Researchers link issues to RedSun and UnDefend GitHub exploits by “Nightmare Eclipse.”
- CVE-2026-41091 resides in mpengine.dll within the Microsoft Malware Protection Engine.
- Improper link resolution before file access underlies CVE-2026-41091; CVSS 7.8 high severity.
- CVE-2026-45498 affects MsMpEng.exe, central to real-time monitoring with kernel drivers.
- Recommended minimum versions: MPE 1.1.26040.8+ and platform 4.18.26040.7+.
TAKEAWAYS:
- Rapid patching is critical because active exploitation against endpoints has been detected.
- Verifying component versions matters since platform binaries update less frequently than signatures.
- Endpoint fleets using Defender or related products share exposure due to common code components.
- Local privilege escalation plus defense disruption creates a powerful combination for malware operations.
- Deploying the engine update also remediates an additional RCE, CVE-2026-45584.