Vulnerability Description
Use after free in Windows TCP/IP allows an unauthorized attacker to execute code over a network.
CVSS Score
8.1
HIGH
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Microsoft | Windows 10 1809 | < 10.0.17763.8755 |
| Microsoft | Windows 10 21H2 | < 10.0.19044.7291 |
| Microsoft | Windows 10 22H2 | < 10.0.19045.7291 |
| Microsoft | Windows 11 23H2 | < 10.0.22631.7079 |
| Microsoft | Windows 11 24H2 | < 10.0.26100.8390 |
| Microsoft | Windows 11 25H2 | < 10.0.26200.8390 |
| Microsoft | Windows 11 26H1 | < 10.0.28000.2113 |
| Microsoft | Windows Server 2019 | < 10.0.17763.8755 |
| Microsoft | Windows Server 2022 | < 10.0.20348.5074 |
| Microsoft | Windows Server 2022 23H2 | < 10.0.25398.2330 |
| Microsoft | Windows Server 2025 | < 10.0.26100.32772 |
Related Weaknesses (CWE)
References
FAQ
What is CVE-2026-40415?
CVE-2026-40415 is a vulnerability with a CVSS score of 8.1 (HIGH). Use after free in Windows TCP/IP allows an unauthorized attacker to execute code over a network.
How severe is CVE-2026-40415?
CVE-2026-40415 has been rated HIGH with a CVSS base score of 8.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-40415?
Check the references section above for vendor advisories and patch information. Affected products include: Microsoft Windows 10 1809, Microsoft Windows 10 21H2, Microsoft Windows 10 22H2, Microsoft Windows 11 23H2, Microsoft Windows 11 24H2.