Security Alert: Critical Flaws Found in Microsoft Defender
Microsoft and the United States’ chief cyber agency have issued a warning regarding active exploitation of two zero-day vulnerabilities within Microsoft Defender. As the default security platform for millions of personal and business computers, these flaws represent a significant target for potential attackers.
The vulnerabilities, identified as CVE-2026-41091 and CVE-2026-45498, highlight the ongoing cat-and-mouse game between security researchers and malicious actors in the digital ecosystem.
Understanding the Vulnerabilities
The first flaw, CVE-2026-41091, is classified as a High Severity elevation of privilege vulnerability with a CVSS score of 7.8. According to Microsoft’s Executive Summary, the issue stems from “improper link resolution before file access (‘link following’) in Microsoft Defender.” This could allow an authorized attacker to elevate their privileges locally on an affected system.
The second flaw, CVE-2026-45498, is a Medium Severity denial of service vulnerability with a CVSS score of 4. This issue has the potential to cause the Microsoft Defender Antimalware Platform to stop functioning entirely.
The Role of Publicly Disclosed Exploits
These vulnerabilities were linked to exploits published by a GitHub user known as Nightmare Eclipse. The exploits, dubbed RedSun (CVE-2026-41091) and UnDefend (CVE-2026-45498), were detailed online earlier this year. Regarding the RedSun exploit, the researcher noted that the behavior involved the antivirus overwriting system files, which could then be abused to gain administrative privileges.
In a commentary on their findings, the researcher stated, “I think antimalware products are supposed to remove malicious files not be sure they are there but that’s just me.” For the UnDefend exploit, the researcher chose not to publish the full code, citing the potential for significant damage, noting a method to misrepresent the status of the security software to the EDR web console.
Future Trends in Endpoint Security
The discovery of these flaws underscores a broader trend: the increasing scrutiny of security software itself. As antimalware platforms gain deeper integration into operating systems, they become high-value targets for attackers looking to bypass defenses. Security experts expect to see a continued focus on “defending the defender,” where researchers hunt for logical flaws in how security agents handle files and system processes.

Frequently Asked Questions (FAQ)
What versions of Microsoft Defender are impacted?
CVE-2026-41091 affects versions 1.1.26030.3008, and earlier. CVE-2026-45498 affects versions 4.18.26030.3011 and earlier. Both have been addressed in subsequent updates.
How can I ensure my system is protected?
Ensure that your Microsoft 365 and Windows security updates are set to automatic. You can verify your current version by checking the “About” or “Update” section within the Microsoft Defender interface.
Are these vulnerabilities currently being exploited?
Yes, Microsoft and the United States’ chief cyber agency have warned of active exploitation of these zero-day vulnerabilities.
Stay informed on the latest security developments by subscribing to our newsletter or exploring our Security Resource Center for more tips on hardening your digital environment. Have you checked your update status today? Let us know in the comments below.
