CVE-2026-41091
Description
Improper link resolution before file access ('link following') in Microsoft Defender allows an authorized attacker to elevate privileges locally.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A link following vulnerability in Microsoft Defender allows an authorized attacker to elevate privileges locally.
Vulnerability
CVE-2026-41091 is an improper link resolution before file access ('link following') vulnerability in Microsoft Defender. The specific affected versions have not been disclosed in the available references [1]. The issue occurs when Defender handles file access operations without properly resolving symbolic links, enabling an attacker to redirect access to a privileged file.
Exploitation
An attacker with local access and valid authorization can exploit this vulnerability by creating a symbolic link that points Defender's file operations to a sensitive system file. The exact steps are not detailed in the available references [1], but typical link-following exploits require the attacker to write a symlink to a location that the vulnerable process accesses with elevated privileges.
Impact
Successful exploitation allows the attacker to elevate privileges locally, potentially gaining access to files or resources that require higher permissions. The impact is limited to local privilege escalation, as the attacker must already have some level of authorized access on the system.
Mitigation
CISA has added this vulnerability to its Known Exploited Vulnerabilities catalog [1], indicating active exploitation. Users should apply the vendor-provided update from Microsoft as soon as possible. No specific workarounds are mentioned in the available references.
AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
2- msrc.microsoft.com/update-guide/vulnerability/CVE-2026-41091nvdVendor Advisory
- www.cisa.gov/known-exploited-vulnerabilities-catalognvdUS Government ResourceThird Party Advisory