Apr 2026: Windows Hyper-V Remote Code Execution Vulnerability
CVE-2026-32149 Published on April 14, 2026

Windows Hyper-V Remote Code Execution Vulnerability
Improper input validation in Windows Hyper-V allows an authorized attacker to execute code locally.

Vendor Advisory NVD

Weakness Types

Improper Input Validation

The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.

What is an Integer underflow Vulnerability?

The product subtracts one value from another, such that the result is less than the minimum allowable integer value, which produces a value that is not equal to the correct result. This can happen in signed and unsigned cases.

CVE-2026-32149 has been classified to as an Integer underflow vulnerability or weakness.

Heap-based Buffer Overflow

A heap overflow condition is a buffer overflow, where the buffer that can be overwritten is allocated in the heap portion of memory, generally meaning that the buffer was allocated using a routine such as malloc().


Products Associated with CVE-2026-32149

Want to know whenever a new CVE is published for Microsoft products? stack.watch will email you.

 
 
 
 
 
 
 
 
 
 

Affected Versions

Microsoft Windows 10 Version 1607: Microsoft Windows 10 Version 1809: Microsoft Windows 10 Version 21H2: Microsoft Windows 10 Version 22H2: Microsoft Windows 11 version 22H3: Microsoft Windows 11 Version 23H2: Microsoft Windows 11 Version 24H2: Microsoft Windows 11 Version 25H2: Microsoft Windows 11 version 26H1: Microsoft Windows Server 2016: Microsoft Windows Server 2016 (Server Core installation): Microsoft Windows Server 2019: Microsoft Windows Server 2019 (Server Core installation): Microsoft Windows Server 2022: Microsoft Windows Server 2022, 23H2 Edition (Server Core installation): Microsoft Windows Server 2025: Microsoft Windows Server 2025 (Server Core installation):