HomeMicrosoftCVE-2026-21249

CVE-2026-21249

LOW
3.3CVSS
Published: 2026-02-10
Updated: 2026-02-11
AI Analysis

Description

External control of file name or path in Windows NTLM allows an unauthorized attacker to perform spoofing locally.

CVSS Metrics

Vector
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
Attack Vector
local
Complexity
low
Privileges
none
User Action
required
Scope
unchanged
Confidentiality
low
Integrity
none
Availability
none
Weaknesses
CWE-73

Metadata

Primary Vendor
MICROSOFT
Published
2/10/2026
Last Modified
2/11/2026
Source
NIST NVD
Note: Verify all details with official vendor sources before applying patches.

Affected Products

microsoft : windows_10_1607microsoft : windows_10_1607microsoft : windows_10_1809microsoft : windows_10_1809microsoft : windows_10_21h2microsoft : windows_10_21h2microsoft : windows_10_21h2microsoft : windows_10_22h2microsoft : windows_10_22h2microsoft : windows_10_22h2microsoft : windows_11_23h2microsoft : windows_11_23h2microsoft : windows_11_24h2microsoft : windows_11_24h2microsoft : windows_11_25h2microsoft : windows_11_25h2microsoft : windows_server_2012microsoft : windows_server_2016microsoft : windows_server_2019microsoft : windows_server_2022microsoft : windows_server_2022_23h2microsoft : windows_server_2025

AI-Powered Remediation

Generate remediation guidance or a C-suite brief for this vulnerability.

Executive Intelligence Brief

CVE-CVE-2026-21249 | LOW Severity | CVEDatabase.com | CVEDatabase.com