High severity8.0NVD Advisory· Published Apr 14, 2026· Updated Apr 17, 2026
CVE-2026-33826
CVE-2026-33826
Description
Improper input validation in Windows Active Directory allows an authorized attacker to execute code over an adjacent network.
Affected products
6- cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*Range: <10.0.14393.9060
- cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*Range: <10.0.17763.8644
- cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*Range: <10.0.20348.5020
- cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*Range: <10.0.25398.2274
- cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*Range: <10.0.26100.32690
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
1- msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33826nvdVendor Advisory
News mentions
0No linked articles in our index yet.