LOW · 3.3

CVE-2026-21249

External control of file name or path in Windows NTLM allows an unauthorized attacker to perform spoofing locally.

Vulnerability Description

External control of file name or path in Windows NTLM allows an unauthorized attacker to perform spoofing locally.

CVSS Score

3.3

LOW

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality
LOW
Integrity
NONE
Availability
NONE

Affected Products

VendorProductVersions
MicrosoftWindows 10 1607< 10.0.14393.8868
MicrosoftWindows 10 1809< 10.0.17763.8389
MicrosoftWindows 10 21H2< 10.0.19044.6937
MicrosoftWindows 10 22H2< 10.0.19045.6937
MicrosoftWindows 11 23H2< 10.0.22631.6649
MicrosoftWindows 11 24H2< 10.0.26100.7781
MicrosoftWindows 11 25H2< 10.0.26200.7781
MicrosoftWindows Server 2012r2
MicrosoftWindows Server 2016< 10.0.14393.8868
MicrosoftWindows Server 2019< 10.0.17763.8389
MicrosoftWindows Server 2022< 10.0.20348.4711
MicrosoftWindows Server 2022 23H2< 10.0.25398.2149
MicrosoftWindows Server 2025< 10.0.26100.32313

Related Weaknesses (CWE)

References

FAQ

What is CVE-2026-21249?

CVE-2026-21249 is a vulnerability with a CVSS score of 3.3 (LOW). External control of file name or path in Windows NTLM allows an unauthorized attacker to perform spoofing locally.

How severe is CVE-2026-21249?

CVE-2026-21249 has been rated LOW with a CVSS base score of 3.3/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2026-21249?

Check the references section above for vendor advisories and patch information. Affected products include: Microsoft Windows 10 1607, Microsoft Windows 10 1809, Microsoft Windows 10 21H2, Microsoft Windows 10 22H2, Microsoft Windows 11 23H2.