Mar 2026: MapUrlToZone Security Feature Bypass Vulnerability
CVE-2026-23674 Published on March 10, 2026
MapUrlToZone Security Feature Bypass Vulnerability
Improper resolution of path equivalence in Windows MapUrlToZone allows an unauthorized attacker to bypass a security feature over a network.
Weakness Type
Improper Resolution of Path Equivalence
The system or application is vulnerable to file system contents disclosure through path equivalence. Path equivalence involves the use of special characters in file and directory names. The associated manipulations are intended to generate multiple names for the same object. Path equivalence is usually employed in order to circumvent access controls expressed using an incomplete set of file name or file path representations. This is different from path traversal, wherein the manipulations are performed to generate a name for a different object.
Products Associated with CVE-2026-23674
Want to know whenever a new CVE is published for Microsoft products? stack.watch will email you.
Affected Versions
Microsoft Windows 10 Version 1607:- Version 10.0.14393.0 and below 10.0.14393.8957 is affected.
- Version 10.0.17763.0 and below 10.0.17763.8511 is affected.
- Version 10.0.19044.0 and below 10.0.19044.7058 is affected.
- Version 10.0.19045.0 and below 10.0.19045.7058 is affected.
- Version 10.0.22631.0 and below 10.0.22631.6783 is affected.
- Version 10.0.22631.0 and below 10.0.22631.6783 is affected.
- Version 10.0.26100.0 and below 10.0.26100.8037 is affected.
- Version 10.0.26200.0 and below 10.0.26200.8037 is affected.
- Version 10.0.28000.0 and below 10.0.28000.1719 is affected.
- Version 10.0.28000.0 and below 10.0.28000.1719 is affected.
- Version 6.2.9200.0 and below 6.2.9200.25973 is affected.
- Version 6.2.9200.0 and below 6.2.9200.25973 is affected.
- Version 6.3.9600.0 and below 6.3.9600.23074 is affected.
- Version 6.3.9600.0 and below 6.3.9600.23074 is affected.
- Version 10.0.14393.0 and below 10.0.14393.8957 is affected.
- Version 10.0.14393.0 and below 10.0.14393.8957 is affected.
- Version 10.0.17763.0 and below 10.0.17763.8511 is affected.
- Version 10.0.17763.0 and below 10.0.17763.8511 is affected.
- Version 10.0.20348.0 and below 10.0.20348.4893 is affected.
- Version 10.0.25398.0 and below 10.0.25398.2207 is affected.
- Version 10.0.26100.0 and below 10.0.26100.32522 is affected.
- Version 10.0.26100.0 and below 10.0.26100.32522 is affected.