Mar 2026: Active Directory Domain Services Elevation of Privilege Vulnerability
CVE-2026-25177 Published on March 10, 2026
Active Directory Domain Services Elevation of Privilege Vulnerability
Improper restriction of names for files and other resources in Active Directory Domain Services allows an authorized attacker to elevate privileges over a network.
Weakness Type
Improper Restriction of Names for Files and Other Resources
The application constructs the name of a file or other resource using input from an upstream component, but it does not restrict or incorrectly restricts the resulting name. This may produce resultant weaknesses. For instance, if the names of these resources contain scripting characters, it is possible that a script may get executed in the client's browser if the application ever displays the name of the resource on a dynamically generated web page. Alternately, if the resources are consumed by some application parser, a specially crafted name can exploit some vulnerability internal to the parser, potentially resulting in execution of arbitrary code on the server machine. The problems will vary based on the context of usage of such malformed resource names and whether vulnerabilities are present in or assumptions are made by the targeted technology that would make code execution possible.
Products Associated with CVE-2026-25177
Want to know whenever a new CVE is published for Microsoft products? stack.watch will email you.
Affected Versions
Microsoft Windows 10 Version 1607:- Version 10.0.14393.0 and below 10.0.14393.8957 is affected.
- Version 10.0.17763.0 and below 10.0.17763.8511 is affected.
- Version 10.0.19044.0 and below 10.0.19044.7058 is affected.
- Version 10.0.19045.0 and below 10.0.19045.7058 is affected.
- Version 10.0.22631.0 and below 10.0.22631.6783 is affected.
- Version 10.0.22631.0 and below 10.0.22631.6783 is affected.
- Version 10.0.26100.0 and below 10.0.26100.8037 is affected.
- Version 10.0.26200.0 and below 10.0.26200.8037 is affected.
- Version 10.0.28000.0 and below 10.0.28000.1719 is affected.
- Version 10.0.28000.0 and below 10.0.28000.1719 is affected.
- Version 6.2.9200.0 and below 6.2.9200.25973 is affected.
- Version 6.2.9200.0 and below 6.2.9200.25973 is affected.
- Version 6.3.9600.0 and below 6.3.9600.23074 is affected.
- Version 6.3.9600.0 and below 6.3.9600.23074 is affected.
- Version 10.0.14393.0 and below 10.0.14393.8957 is affected.
- Version 10.0.14393.0 and below 10.0.14393.8957 is affected.
- Version 10.0.17763.0 and below 10.0.17763.8511 is affected.
- Version 10.0.17763.0 and below 10.0.17763.8511 is affected.
- Version 10.0.20348.0 and below 10.0.20348.4893 is affected.
- Version 10.0.25398.0 and below 10.0.25398.2207 is affected.
- Version 10.0.26100.0 and below 10.0.26100.32522 is affected.
- Version 10.0.26100.0 and below 10.0.26100.32522 is affected.