Cyber Posture

CVE-2026-33826

High

Published: 14 April 2026

Published
14 April 2026
Modified
17 April 2026
KEV Added
Patch
CVSS Score 8.0 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0051 66.6th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-33826 is a high-severity Improper Input Validation (CWE-20) vulnerability in Microsoft Windows Server 2012. Its CVSS base score is 8.0 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation of Remote Services (T1210); ranked in the top 33.4% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploitation of Remote Services (T1210) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Flaw remediation requires timely identification, reporting, and patching of vulnerabilities like this improper input validation flaw in Windows Active Directory, directly eliminating the exploit path.

prevent

Information input validation mandates checking the validity of all system inputs, directly addressing the CWE-20 improper input validation that enables arbitrary code execution in this CVE.

prevent

Boundary protection monitors and controls communications at network interfaces, mitigating adjacent network (AV:A) access required for low-privilege attackers to reach and exploit Active Directory.

MITRE ATT&CK Enterprise TechniquesAI

T1210 Exploitation of Remote Services Lateral Movement
Adversaries may exploit remote services to gain unauthorized access to internal systems once inside of a network.
T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
Why these techniques?

RCE vulnerability in Windows Active Directory exploitable over adjacent network by low-privilege authorized attacker directly maps to remote service exploitation (T1210) and privilege escalation via software vulnerability (T1068).

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

Improper input validation in Windows Active Directory allows an authorized attacker to execute code over an adjacent network.

Deeper analysisAI

CVE-2026-33826 is an improper input validation vulnerability (CWE-20) affecting Windows Active Directory. Published on 2026-04-14, it enables an authorized attacker to execute arbitrary code over an adjacent network, earning a CVSS v3.1 base score of 8.0 (AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).

The vulnerability can be exploited by an attacker with low privileges (PR:L) who has access to the adjacent network (AV:A). Exploitation requires low complexity (AC:L) and no user interaction (UI:N), allowing the attacker to achieve high impacts on confidentiality, integrity, and availability through remote code execution within the unchanged scope (S:U).

Microsoft's Security Response Center has published an update guide detailing mitigations and patches for CVE-2026-33826 at https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33826, which security practitioners should review for deployment instructions.

Details

CWE(s)

Affected Products

microsoft
windows server 2012
r2
microsoft
windows server 2016
≤ 10.0.14393.9060
microsoft
windows server 2019
≤ 10.0.17763.8644
microsoft
windows server 2022
≤ 10.0.20348.5020
microsoft
windows server 2022 23h2
≤ 10.0.25398.2274
microsoft
windows server 2025
≤ 10.0.26100.32690

CVEs Like This One

CVE-2026-26154Same product: Microsoft Windows Server 2012
CVE-2026-27913Same product: Microsoft Windows Server 2012
CVE-2026-27928Same product: Microsoft Windows Server 2016
CVE-2025-24045Same product: Microsoft Windows Server 2012
CVE-2026-26183Same product: Microsoft Windows Server 2012
CVE-2026-25172Same product: Microsoft Windows Server 2012
CVE-2025-49688Same product: Microsoft Windows Server 2012
CVE-2026-27912Same product: Microsoft Windows Server 2012
CVE-2025-54106Same product: Microsoft Windows Server 2012
CVE-2025-21309Same product: Microsoft Windows Server 2012

References