Use after free in Windows Kernel-Mode Drivers allows an authorized attacker to execute code over a network.
Metrics
Affected Vendors & Products
References
History
Wed, 13 May 2026 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 12 May 2026 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Microsoft windows Server 2025 (server Core Installation)
|
|
| Vendors & Products |
Microsoft windows Server 2025 (server Core Installation)
|
Tue, 12 May 2026 17:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Use after free in Windows Kernel-Mode Drivers allows an authorized attacker to execute code over a network. | |
| Title | Windows Kernel-Mode Driver Remote Code Execution Vulnerability | |
| First Time appeared |
Microsoft
Microsoft windows Server 2025 |
|
| Weaknesses | CWE-416 | |
| CPEs | cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Microsoft
Microsoft windows Server 2025 |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: microsoft
Published: 2026-05-12T16:59:11.202Z
Updated: 2026-05-15T17:13:07.096Z
Reserved: 2026-03-26T21:02:16.445Z
Link: CVE-2026-34332
Updated: 2026-05-13T09:59:30.184Z
Status : Analyzed
Published: 2026-05-12T18:17:07.127
Modified: 2026-05-14T15:25:29.693
Link: CVE-2026-34332
No data.
ReportizFlow