[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"repo-stars":3,"vuln-CVE-2026-41091":6},{"stargazers_count":4,"fetched_at":5},6,"2026-05-20T17:11:50.996Z",{"id":7,"descriptions":8,"cisa":9,"weaknesses":10,"exploits":195,"aliases":196,"duplicate_of":9,"upstream":197,"downstream":198,"duplicates":199,"related":200,"reserved_at":9,"published_at":201,"modified_at":202,"state":203,"summary":204,"references_raw":213,"kevs":228,"epss":9,"epss_history":239,"metrics":240,"affected":249},"CVE-2026-41091","Improper link resolution before file access ('link following') in Microsoft Defender allows an authorized attacker to elevate privileges locally.",null,[11],{"_key":12,"id":12,"name":13,"description":14,"type":15,"status":16,"abstraction":17,"likelihood_of_exploit":18,"capec":19},"CWE-59","Improper Link Resolution Before File Access ('Link Following')","The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.","weakness","Draft","Base","Medium",[20,101,162,191],{"id":21,"name":22,"techniques":23},"CAPEC-132","Symlink Attack",[24],{"id":25,"name":26,"tactics":27,"countermeasures":34},"T1547.009","Shortcut Modification",[28,31],{"id":29,"name":30},"TA0110","Persistence",{"id":32,"name":33},"TA0111","Privilege Escalation",[35,40,44,48,52,57,62,67,72,77,81,85,89,93,97],{"id":36,"name":37,"tactic":38},"D3-FA","File Analysis",{"name":39},"Detect",{"id":41,"name":42,"tactic":43},"D3-FIM","File Integrity Monitoring",{"name":39},{"id":45,"name":46,"tactic":47},"D3-DA","Dynamic Analysis",{"name":39},{"id":49,"name":50,"tactic":51},"D3-EFA","Emulated File Analysis",{"name":39},{"id":53,"name":54,"tactic":55},"D3-FEV","File Eviction",{"name":56},"Evict",{"id":58,"name":59,"tactic":60},"D3-DF","Decoy File",{"name":61},"Deceive",{"id":63,"name":64,"tactic":65},"D3-FE","File Encryption",{"name":66},"Harden",{"id":68,"name":69,"tactic":70},"D3-RF","Restore File",{"name":71},"Restore",{"id":73,"name":74,"tactic":75},"D3-CF","Content Filtering",{"name":76},"Isolate",{"id":78,"name":79,"tactic":80},"D3-LFP","Local File Permissions",{"name":76},{"id":82,"name":83,"tactic":84},"D3-RFAM","Remote File Access Mediation",{"name":76},{"id":86,"name":87,"tactic":88},"D3-CQ","Content Quarantine",{"name":76},{"id":90,"name":91,"tactic":92},"D3-CM","Content Modification",{"name":76},{"id":94,"name":95,"tactic":96},"D3-EAL","Executable Allowlisting",{"name":76},{"id":98,"name":99,"tactic":100},"D3-EDL","Executable Denylisting",{"name":76},{"id":102,"name":103,"techniques":104},"CAPEC-17","Using Malicious Files",[105,142],{"id":106,"name":107,"tactics":108,"countermeasures":120},"T1574.005","Executable Installer File Permissions Weakness",[109,110,111,114,117],{"id":29,"name":30},{"id":32,"name":33},{"id":112,"name":113},"TA0030","Defense Evasion",{"id":115,"name":116},"TA0005","Stealth",{"id":118,"name":119},"TA0104","Execution",[121,126,130,134,138],{"id":122,"name":123,"tactic":124},"D3-SWI","Software Inventory",{"name":125},"Model",{"id":127,"name":128,"tactic":129},"D3-AVE","Asset Vulnerability Enumeration",{"name":125},{"id":131,"name":132,"tactic":133},"D3-SBV","Service Binary Verification",{"name":39},{"id":135,"name":136,"tactic":137},"D3-SU","Software Update",{"name":66},{"id":139,"name":140,"tactic":141},"D3-RS","Restore Software",{"name":71},{"id":143,"name":144,"tactics":145,"countermeasures":151},"T1574.010","Services File Permissions Weakness",[146,147,148,149,150],{"id":29,"name":30},{"id":32,"name":33},{"id":112,"name":113},{"id":115,"name":116},{"id":118,"name":119},[152,154,156,158,160],{"id":122,"name":123,"tactic":153},{"name":125},{"id":127,"name":128,"tactic":155},{"name":125},{"id":131,"name":132,"tactic":157},{"name":39},{"id":135,"name":136,"tactic":159},{"name":66},{"id":139,"name":140,"tactic":161},{"name":71},{"id":163,"name":164,"techniques":165},"CAPEC-35","Leverage Executable Code in Non-Executable Files",[166,173,180],{"id":167,"name":168,"tactics":169,"countermeasures":172},"T1027.006","HTML Smuggling",[170,171],{"id":112,"name":113},{"id":115,"name":116},[],{"id":174,"name":175,"tactics":176,"countermeasures":179},"T1027.009","Embedded Payloads",[177,178],{"id":112,"name":113},{"id":115,"name":116},[],{"id":181,"name":182,"tactics":183,"countermeasures":186},"T1564.009","Resource Forking",[184,185],{"id":112,"name":113},{"id":115,"name":116},[187],{"id":188,"name":189,"tactic":190},"D3-FFV","File Format Verification",{"name":76},{"id":192,"name":193,"techniques":194},"CAPEC-76","Manipulating Web Input to File System Calls",[],[],[],[],[],[],[],"2026-05-20T13:09:13.634Z","2026-05-20T17:13:18.196Z","Analyzed",{"cisa_kev":205,"cisa_ransomware":206,"cisa_vendor":207,"epss_severity":9,"epss_score":9,"severity":208,"severity_score":209,"severity_version":210,"severity_source":211,"severity_vector":212,"severity_status":203},true,false,"Microsoft","high",7.8,"v3.1","cve.org","CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",[214,221],{"url":215,"sources":216,"tags":218},"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-41091",[211,217],"nvd",[219,220],"Vendor Advisory","Patch",{"url":222,"sources":223,"tags":224},"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2026-41091",[211,217],[225,226,227],"Government Resource","US Government Resource","Third Party Advisory",[229],{"source":230,"vendor":207,"product":231,"date_added":232,"vulnerability_name":233,"short_description":234,"required_action":235,"due_date":236,"known_ransomware_campaign_use":237,"notes":238,"exploitation_type":9},"cisa","Defender","2026-05-20","Microsoft Defender Link Following Vulnerability","Microsoft Defender contains a link following vulnerability that allows an authorized attacker to elevate privileges locally.","Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.","2026-06-03","Unknown","https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2026-41091 ; https://nvd.nist.gov/vuln/detail/CVE-2026-41091",[],[241,246],{"source":211,"cvss_v2_0":9,"cvss_v3_0":9,"cvss_v3_1":242,"cvss_v4_0":9},{"baseScore":209,"baseSeverity":243,"vectorString":212,"impactScore":244,"exploitabilityScore":245},"HIGH",9.8,4.6,{"source":217,"cvss_v2_0":9,"cvss_v3_0":9,"cvss_v3_1":247,"cvss_v4_0":9},{"baseScore":209,"baseSeverity":243,"vectorString":248,"impactScore":244,"exploitabilityScore":245},"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",[250,263],{"ecosystem":9,"name":251,"vendor":252,"product":253,"cpe_part":254,"purl_type":9,"purl_namespace":9,"purl_name":9,"source":9,"versions":255},"malware protection engine","microsoft","malware_protection_engine","a",[256],{"version":257,"is_range":205,"range_type":258,"version_start":259,"version_start_type":260,"version_end":261,"version_end_type":262,"fixed_in":9},"gte1.1.26030.3008_lt1.1.26040.8","cpe","1.1.26030.3008","including","1.1.26040.8","excluding",{"ecosystem":9,"name":264,"vendor":252,"product":265,"cpe_part":254,"purl_type":9,"purl_namespace":9,"purl_name":9,"source":9,"versions":266},"Microsoft Malware Protection Engine","microsoft malware protection engine",[267],{"version":268,"is_range":206,"range_type":211,"version_start":9,"version_start_type":9,"version_end":9,"version_end_type":9,"fixed_in":9},"-"]