CVE-2026-33826
Windows Active Directory Remote Code Execution Vulnerability
CVSS Score
8.0
EPSS Score
0.0%
EPSS Percentile
0th
Improper input validation in Windows Active Directory allows an authorized attacker to execute code over an adjacent network.
| Vendor | microsoft |
| Product | windows server 2012 r2 |
| Ecosystems | |
| Industries | TechnologyEnterprise |
| Published | Apr 14, 2026 |
| Last Updated | Apr 17, 2026 |
Stay Ahead of the Next One
Get instant alerts for microsoft windows server 2012 r2
Be the first to know when new high vulnerabilities affecting microsoft windows server 2012 r2 are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Affected Versions
Microsoft / Windows Server 2012 R2
6.3.9600.0 < 6.3.9600.23132
Microsoft / Windows Server 2012 R2 (Server Core installation)
6.3.9600.0 < 6.3.9600.23132
Microsoft / Windows Server 2016
10.0.14393.0 < 10.0.14393.9060
Microsoft / Windows Server 2016 (Server Core installation)
10.0.14393.0 < 10.0.14393.9060
Microsoft / Windows Server 2019
10.0.17763.0 < 10.0.17763.8644
Microsoft / Windows Server 2019 (Server Core installation)
10.0.17763.0 < 10.0.17763.8644
Microsoft / Windows Server 2022
10.0.20348.0 < 10.0.20348.5020
Microsoft / Windows Server 2022, 23H2 Edition (Server Core installation)
10.0.25398.0 < 10.0.25398.2274
Microsoft / Windows Server 2025
10.0.26100.0 < 10.0.26100.32690
Microsoft / Windows Server 2025 (Server Core installation)
10.0.26100.0 < 10.0.26100.32690