May 2026: Windows TCP/IP Driver Security Feature Bypass Vulnerability
CVE-2026-35422 Published on May 12, 2026

Windows TCP/IP Driver Security Feature Bypass Vulnerability
Authentication bypass using an alternate path or channel in Windows TCP/IP allows an authorized attacker to bypass a security feature over a network.

Vendor Advisory NVD

Weakness Type

Authentication Bypass Using an Alternate Path or Channel

A product requires authentication, but the product has an alternate path or channel that does not require authentication.


Products Associated with CVE-2026-35422

Want to know whenever a new CVE is published for Microsoft products? stack.watch will email you.

 
 
 
 
 
 
 
 
 
 
 
 

Affected Versions

Microsoft Windows 10 Version 1607: Microsoft Windows 10 Version 1809: Microsoft Windows 10 Version 21H2: Microsoft Windows 10 Version 22H2: Microsoft Windows 11 version 22H3: Microsoft Windows 11 Version 23H2: Microsoft Windows 11 Version 24H2: Microsoft Windows 11 Version 25H2: Microsoft Windows 11 version 26H1: Microsoft Windows Server 2012: Microsoft Windows Server 2012 (Server Core installation): Microsoft Windows Server 2012 R2: Microsoft Windows Server 2012 R2 (Server Core installation): Microsoft Windows Server 2016: Microsoft Windows Server 2016 (Server Core installation): Microsoft Windows Server 2019: Microsoft Windows Server 2019 (Server Core installation): Microsoft Windows Server 2022: Microsoft Windows Server 2022, 23H2 Edition (Server Core installation): Microsoft Windows Server 2025: Microsoft Windows Server 2025 (Server Core installation):