{"vulnerability": "CVE-2026-45498", "sightings": [{"uuid": "9799c045-36c5-447f-98aa-aa9f93ce7650", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-45498", "type": "seen", "source": "https://bsky.app/profile/boredchilada.bsky.social/post/3mmcpa3cyoa2e", "content": "~Cisa~\nCISA added seven actively exploited vulnerabilities to the KEV catalog, urging immediate remediation.\n-\nIOCs: CVE-2026-41091, CVE-2026-45498\n-\n#CISA #KEV #ThreatIntel #Vulnerability", "creation_timestamp": "2026-05-20T20:04:04.748498Z"}, {"uuid": "bced2a31-1c17-4136-a740-997d13dfd4b9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2026-45498", "type": "seen", "source": "https://www.govcert.gov.hk/en/alerts_detail.php?id=1878", "content": "", "creation_timestamp": "2026-05-19T21:00:00.000000Z"}, {"uuid": "2f98d35c-dd56-4c56-b73e-8f3192e972ca", "vulnerability_lookup_origin": "405284c2-e461-4670-8979-7fd2c9755a60", "author": "af0120d0-3dac-4a6a-974b-a9f33d2a9846", "vulnerability": "CVE-2026-45498", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/e18ff94c-33da-466f-9a04-6a9d76c6097d", "content": "", "creation_timestamp": "2026-05-20T18:00:02.848527Z"}, {"uuid": "d2b57f46-085d-4b91-a743-284c66adbd3a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-45498", "type": "seen", "source": "https://infosec.exchange/users/secdb/statuses/116608677530202595", "content": "\ud83d\udea8 [CISA-2026:0520] CISA Adds 7 Known Exploited Vulnerabilities to Catalog (https://secdb.nttzen.cloud/security-advisory/detail/CISA-2026:0520)\nCISA has added 7 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.\n\u26a0\ufe0f CVE-2008-4250 (https://secdb.nttzen.cloud/cve/detail/CVE-2008-4250)- Name: Microsoft Windows Buffer Overflow Vulnerability- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.- Known To Be Used in Ransomware Campaigns? Unknown- Vendor: Microsoft- Product: Windows- Notes: https://learn.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-067 ; https://nvd.nist.gov/vuln/detail/CVE-2008-4250\n\u26a0\ufe0f CVE-2009-1537 (https://secdb.nttzen.cloud/cve/detail/CVE-2009-1537)- Name: Microsoft DirectX NULL Byte Overwrite Vulnerability- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.- Known To Be Used in Ransomware Campaigns? Unknown- Vendor: Microsoft- Product: DirectX- Notes: https://learn.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-028 ; https://nvd.nist.gov/vuln/detail/CVE-2009-1537\n\u26a0\ufe0f CVE-2009-3459 (https://secdb.nttzen.cloud/cve/detail/CVE-2009-3459)- Name: Adobe Acrobat and Reader Heap-Based Buffer Overflow Vulnerability- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.- Known To Be Used in Ransomware Campaigns? Unknown- Vendor: Adobe- Product: Acrobat and Reader- Notes: https://www.cisa.gov/news-events/alerts/2009/10/13/adobe-reader-and-acrobat-vulnerabilities ; https://web.archive.org/web/20120324170253/http://www.adobe.com/support/security/bulletins/apsb09-15.html#:~:text=CVE%2D2009%2D3459).-,NOTE%3A,-There%20are%20reports ; https://nvd.nist.gov/vuln/detail/CVE-2009-3459\n\u26a0\ufe0f CVE-2010-0249 (https://secdb.nttzen.cloud/cve/detail/CVE-2010-0249)- Name: Microsoft Internet Explorer Use-After-Free Vulnerability- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.- Known To Be Used in Ransomware Campaigns? Unknown- Vendor: Microsoft- Product: Internet Explorer- Notes: https://learn.microsoft.com/en-us/security-updates/SecurityAdvisories/2010/979352 ; https://nvd.nist.gov/vuln/detail/CVE-2010-0249\n\u26a0\ufe0f CVE-2010-0806 (https://secdb.nttzen.cloud/cve/detail/CVE-2010-0806)- Name: Microsoft Internet Explorer Use-After-Free Vulnerability- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.- Known To Be Used in Ransomware Campaigns? Unknown- Vendor: Microsoft- Product: Internet Explorer- Notes: https://learn.microsoft.com/en-us/security-updates/securityadvisories/2010/981374 ; https://nvd.nist.gov/vuln/detail/CVE-2010-0806\n\u26a0\ufe0f CVE-2026-41091 (https://secdb.nttzen.cloud/cve/detail/CVE-2026-41091)- Name: Microsoft Defender Link Following Vulnerability- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.- Known To Be Used in Ransomware Campaigns? Unknown- Vendor: Microsoft- Product: Defender- Notes: https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2026-41091 ; https://nvd.nist.gov/vuln/detail/CVE-2026-41091\n\u26a0\ufe0f CVE-2026-45498 (https://secdb.nttzen.cloud/cve/detail/CVE-2026-45498)- Name: Microsoft Defender Denial of Service Vulnerability- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.- Known To Be Used in Ransomware Campaigns? Unknown- Vendor: Microsoft- Product: Defender- Notes: https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2026-45498 ; https://nvd.nist.gov/vuln/detail/CVE-2026-45498\n#SecDB #InfoSec #CVE #CISA_KEV #cisa_20260520 #cisa20260520 #cve_2008_4250 #cve_2009_1537 #cve_2009_3459 #cve_2010_0249 #cve_2010_0806 #cve_2026_41091 #cve_2026_45498 #cve20084250 #cve20091537 #cve20093459 #cve20100249 #cve20100806 #cve202641091 #cve202645498", "creation_timestamp": "2026-05-20T21:13:37.433876Z"}, {"uuid": "c11fe829-4b8b-4e21-b835-191ca76e6dab", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2026-45498", "type": "seen", "source": "https://cyber.gc.ca/en/alerts-advisories/microsoft-security-advisory-av26-489", "content": "", "creation_timestamp": "2026-05-20T10:16:09.000000Z"}, {"uuid": "df3c7470-62d2-48c7-81c4-a9ad8bb2121c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-45498", "type": "seen", "source": "https://bsky.app/profile/o2cloud.bsky.social/post/3mmc3h6v5lm2e", "content": "\ud83d\udd17 CVE : CVE-2026-34956, CVE-2026-44431, CVE-2026-46483, CVE-2026-41091, CVE-2026-45498, CVE-2026-45584, CVE-2026-34956, CVE-2026-41091, CVE-2026-44431, CVE-2026-45498, CVE-2026-45584, CVE-2026-46483", "creation_timestamp": "2026-05-20T14:10:08.180497Z"}, {"uuid": "1f39082e-2d3a-4249-8ff3-cb8f443e6464", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-45498", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3mmc5ly2p472k", "content": "CVE-2026-45498 - Microsoft Defender Denial of Service Vulnerability\nCVE ID : CVE-2026-45498\n \n Published : May 20, 2026, 1:16 p.m. | 58\u00a0minutes ago\n \n Description : Microsoft Defender Denial of Service Vulnerability\n \n Severity: 4.0 | MEDIUM\n \n Visit the link for more details,...", "creation_timestamp": "2026-05-20T14:48:35.518725Z"}, {"uuid": "c7a50cb3-de21-49af-a410-ad4ce42696b5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-45498", "type": "seen", "source": "https://bsky.app/profile/todb2.hugesuccess.org/post/3mmclfri4bwf2", "content": "I thought there was a bug in EPSS since I couldn't see the score for CVE-2026-45498, but... it's just too new. Released today. Rare not-Patch-Tuesday CVE release for Microsoft. Wonder what's up.\n\n(It's a Microsoft Defender DoS, which, sure, seems bad for an A/V thing, but... it's just DoS [\u2026]", "creation_timestamp": "2026-05-20T19:00:24.639573Z"}, {"uuid": "0beef2a7-fcf5-4c7c-a157-274b9b2d05d8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2026-45498", "type": "seen", "source": "https://www.hkcert.org/security-bulletin/microsoft-defender-multiple-vulnerabilities_20260521", "content": "", "creation_timestamp": "2026-05-20T18:00:00.000000Z"}, {"uuid": "2ae5e623-87e5-41a2-95b0-3607afe8f266", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-45498", "type": "seen", "source": "https://bsky.app/profile/blackhatnews.tokyo/post/3mmdx6otbzd27", "content": "Microsoft\u304c\u653b\u6483\u3067\u60aa\u7528\u3055\u308c\u308b\u65b0\u3057\u3044Defender\u30bc\u30ed\u30c7\u30a4\u306b\u3064\u3044\u3066\u8b66\u544a\n\n\u6c34\u66dc\u65e5\u306bMicrosoft\u306f\u3001\u30bc\u30ed\u30c7\u30a4\u653b\u6483\u3067\u60aa\u7528\u3055\u308c\u3066\u3044\u308b2\u3064\u306eDefender\u8106\u5f31\u6027\u306b\u5bfe\u3059\u308b\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30d1\u30c3\u30c1\u306e\u30ed\u30fc\u30eb\u30a2\u30a6\u30c8\u3092\u958b\u59cb\u3057\u307e\u3057\u305f\u3002 \u6700\u521d\u306e\u3082\u306e\u306f\u3001\u8ffd\u8de1\u5bfe\u8c61\u3068\u3057\u3066\u300c\u30d3\u30c7\u30aa\u30d7\u30ec\u30a4\u30e4\u30fc\u304c\u73fe\u5728\u5e83\u544a\u3092\u518d\u751f\u3057\u3066\u3044\u307e\u3059\u3002\u30de\u30a6\u30b9\u307e\u305f\u306f\u30ad\u30fc\u30dc\u30fc\u30c9\u30675\u79d2\u3067\u5e83\u544a\u3092\u30b9\u30ad\u30c3\u30d7\u3067\u304d\u307e\u30592\u756a\u76ee\u306e\u8106\u5f31\u6027\uff08CVE-2026-45498", "creation_timestamp": "2026-05-21T07:59:06.616814Z"}, {"uuid": "0c2a265a-7300-495b-ba95-2ad1f9b20700", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2026-45498", "type": "seen", "source": "https://bsky.app/profile/ahmandonk.bsky.social/post/3mmdyvqqkcx2w", "content": "\ud83d\udcf0 Microsoft Tambal Dua Celah Zero-Day Kritis pada Windows Defender yang Aktif Dieksploitasi\n\n\ud83d\udc49 Baca artikel lengkap di sini: https://ahmandonk.com/2026/05/21/microsoft-tambal-dua-zero-day-defender-dieksploitasi/\n\n#beritaTeknologi #cisaKevCatalog #cve-2026-41091 #cve-2026-45498 #denialOfService", "creation_timestamp": "2026-05-21T08:29:54.422579Z"}, {"uuid": "1ffff023-abbd-4d6f-83eb-8f5633ae8432", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-45498", "type": "seen", "source": "https://bsky.app/profile/helpnetsecurity.com/post/3mmeblgq6r22p", "content": "Microsoft Defender vulnerabilities exploited in the wild (CVE-2026-41091, CVE-2026-45498)\n\n\ud83d\udcd6 Read more: www.helpnetsecurity.com/2026/05/21/m...\n\n#cybersecurity #cybersecuritynews #vulnerability #vulnerabilitydisclosure #Windows @microsoft.com", "creation_timestamp": "2026-05-21T11:05:16.849293Z"}, {"uuid": "2ada4638-8668-4ed1-9e0c-b2da77977586", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-45498", "type": "seen", "source": "https://bsky.app/profile/blackhatnews.tokyo/post/3mmebwpqnuq27", "content": "Microsoft Defender\u306e\u8106\u5f31\u6027\u304c\u91ce\u751f\u3067\u60aa\u7528\u3055\u308c\u3066\u3044\u308b\uff08CVE-2026-41091\u3001CVE-2026-45498\uff09\n\n\u653b\u6483\u8005\u304cMicrosoft Defender\u306e2\u3064\u306e\u8106\u5f31\u6027\uff08CVE-2026-41091\u304a\u3088\u3073CVE-2026-45498\uff09\u3092\u60aa\u7528\u3057\u3066\u304a\u308a\u3001Microsoft\u306f\u3053\u308c\u3092\u8a8d\u3081\u3001CISA\u306f\u305d\u308c\u3089\u3092\u65e2\u77e5\u306e\u60aa\u7528\u3055\u308c\u3066\u3044\u308b\u8106\u5f31\u6027\u30ab\u30bf\u30ed\u30b0\u306b\u8ffd\u52a0\u3059\u308b\u3053\u3068\u3067\u78ba\u8a8d\u3057\u307e\u3057\u305f\u3002 \u8106\u5f31\u6027\u306b\u3064\u3044\u3066 CVE-2026-41091\u306f\u30ed\u30fc\u30ab\u30eb\u6a29\u9650\u6607\u683c", "creation_timestamp": "2026-05-21T11:11:30.522267Z"}, {"uuid": "ec5b5ab8-3d00-40f0-903f-c4e0c25cc8be", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-45498", "type": "seen", "source": "https://bsky.app/profile/hendryadrian.bsky.social/post/3mmecyfedqo2y", "content": "Microsoft patched two exploited zero-days in Defender: CVE-2026-41091, a local privilege escalation to SYSTEM, and CVE-2026-45498, a denial-of-service flaw. CISA added both to KEV. #MicrosoftDefender #CVE202641091 #CVE202645498", "creation_timestamp": "2026-05-21T11:30:20.998462Z"}, {"uuid": "c189e33b-db4c-4e13-b156-5c40dabdbdad", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-45498", "type": "seen", "source": "https://infosec.exchange/users/vuldb/statuses/116612314241362366", "content": "It is possible to see elevated activities targeting Microsoft Defender Antimalware Platform (CVE-2026-45498) https://vuldb.com/vuln/364877/cti", "creation_timestamp": "2026-05-21T11:25:30.282736Z"}, {"uuid": "25379ea3-6698-4e39-bcaa-87245faae571", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-45498", "type": "seen", "source": "https://t.me/true_secator/8228", "content": "Microsoft \u043f\u0440\u0435\u0434\u0443\u043f\u0440\u0435\u0434\u0438\u043b\u0430 \u043e \u043d\u043e\u0432\u044b\u0445 \u0434\u0432\u0443\u0445 0-day \u0432 Defender, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u0430\u043a\u0442\u0438\u0432\u043d\u043e \u0437\u0430\u0434\u0435\u0439\u0441\u0442\u0432\u0443\u0435\u0442\u0441\u044f \u0432 \u0430\u0442\u0430\u043a\u0430\u0445.\n\n\u041f\u0435\u0440\u0432\u0430\u044f, CVE-2026-41091, \u043f\u0440\u0435\u0434\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 \u0441\u043e\u0431\u043e\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0443\u044e \u043f\u043e\u0432\u044b\u0441\u0438\u0442\u044c \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0438 \u0438 \u0437\u0430\u0442\u0440\u0430\u0433\u0438\u0432\u0430\u044e\u0449\u0443\u044e Microsoft Malware Protection Engine 1.1.26030.3008 \u0438 \u0431\u043e\u043b\u0435\u0435 \u0440\u0430\u043d\u043d\u0438\u0435 \u0432\u0435\u0440\u0441\u0438\u0438.\n\n\u041f\u0440\u043e\u0431\u043b\u0435\u043c\u0430 \u0432\u043e\u0437\u043d\u0438\u043a\u0430\u0435\u0442 \u0438\u0437-\u0437\u0430 \u043d\u0435\u043a\u043e\u0440\u0440\u0435\u043a\u0442\u043d\u043e\u0433\u043e \u0440\u0430\u0437\u0440\u0435\u0448\u0435\u043d\u0438\u044f \u0441\u0441\u044b\u043b\u043e\u043a \u043f\u0435\u0440\u0435\u0434 \u0434\u043e\u0441\u0442\u0443\u043f\u043e\u043c \u043a \u0444\u0430\u0439\u043b\u0443 (\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u043d\u0438\u044f \u043f\u043e \u0441\u0441\u044b\u043b\u043a\u0430\u043c), \u0447\u0442\u043e \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0430\u043c \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u0441\u0438\u0441\u0442\u0435\u043c\u043d\u044b\u0435 \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0438.\n\n\u0412\u0442\u043e\u0440\u0430\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c (CVE-2026-45498) \u0437\u0430\u0442\u0440\u0430\u0433\u0438\u0432\u0430\u0435\u0442 \u0441\u0438\u0441\u0442\u0435\u043c\u044b, \u0440\u0430\u0431\u043e\u0442\u0430\u044e\u0449\u0438\u0435 \u043f\u043e\u0434 \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u0435\u043c Microsoft Defender Antimalware Platform 4.18.26030.3011 \u0438 \u0431\u043e\u043b\u0435\u0435 \u0440\u0430\u043d\u043d\u0438\u0445 \u0432\u0435\u0440\u0441\u0438\u0439, \u043d\u0430\u0431\u043e\u0440\u0430 \u0438\u043d\u0441\u0442\u0440\u0443\u043c\u0435\u043d\u0442\u043e\u0432 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438, \u0442\u0430\u043a\u0436\u0435 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u043c\u044b\u0445 Microsoft System Center Endpoint Protection, System Center 2012 R2 Endpoint Protection, System Center 2012 Endpoint Protection \u0438 Security Essentials.\n\n\u041f\u043e \u0434\u0430\u043d\u043d\u044b\u043c Microsoft, \u0443\u0441\u043f\u0435\u0448\u043d\u0430\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0430\u043c \u0438\u043d\u0438\u0446\u0438\u0438\u0440\u043e\u0432\u0430\u0442\u044c DoS \u043d\u0430 \u043d\u0435\u0437\u0430\u0449\u0438\u0449\u0435\u043d\u043d\u044b\u0445 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0430\u0445 \u043f\u043e\u0434 \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u0435\u043c Windows.\n\nMicrosoft \u0432\u044b\u043f\u0443\u0441\u0442\u0438\u043b\u0430 \u0432\u0435\u0440\u0441\u0438\u0438 1.1.26040.8 \u0438 4.18.26040.7 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u044b Malware Protection Engine \u0434\u043b\u044f \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f \u0434\u0432\u0443\u0445 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u0438 \u0434\u043e\u0431\u0430\u0432\u0438\u043b\u0430, \u0447\u0442\u043e \u043a\u043b\u0438\u0435\u043d\u0442\u0430\u043c \u043d\u0435 \u043d\u0443\u0436\u043d\u043e \u043f\u0440\u0435\u0434\u043f\u0440\u0438\u043d\u0438\u043c\u0430\u0442\u044c \u043d\u0438\u043a\u0430\u043a\u0438\u0445 \u0434\u0435\u0439\u0441\u0442\u0432\u0438\u0439 \u0434\u043b\u044f \u0437\u0430\u0449\u0438\u0442\u044b \u0441\u0432\u043e\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c, \u043f\u043e\u0441\u043a\u043e\u043b\u044c\u043a\u0443 \u00ab\u043a\u043e\u043d\u0444\u0438\u0433\u0443\u0440\u0430\u0446\u0438\u044f \u043f\u043e \u0443\u043c\u043e\u043b\u0447\u0430\u043d\u0438\u044e \u0432 \u0430\u043d\u0442\u0438\u0432\u0438\u0440\u0443\u0441\u043d\u043e\u043c \u041f\u041e Microsoft \u043f\u043e\u043c\u043e\u0433\u0430\u0435\u0442 \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0438\u0442\u044c \u0430\u0432\u0442\u043e\u043c\u0430\u0442\u0438\u0447\u0435\u0441\u043a\u043e\u0435 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u0431\u0430\u0437 \u0434\u0430\u043d\u043d\u044b\u0445 \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u044b\u0445 \u041f\u041e \u0438 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b Windows Defender Antimalware Platform.\n\n\u041e\u0434\u043d\u0430\u043a\u043e \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044f\u043c \u0432\u0441\u0435 \u0436\u0435 \u0441\u043b\u0435\u0434\u0443\u0435\u0442 \u043f\u0440\u043e\u0432\u0435\u0440\u0438\u0442\u044c, \u043d\u0430\u0441\u0442\u0440\u043e\u0435\u043d\u0430 \u043b\u0438 \u0430\u0432\u0442\u043e\u043c\u0430\u0442\u0438\u0447\u0435\u0441\u043a\u0430\u044f \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u043a\u0430 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0439 \u0438 \u043e\u043f\u0440\u0435\u0434\u0435\u043b\u0435\u043d\u0438\u0439 \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u044b\u0445 \u041f\u041e \u0434\u043b\u044f \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b Windows Defender, \u0438 \u0443\u0431\u0435\u0434\u0438\u0442\u044c\u0441\u044f \u0432 \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u043a\u0435 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f.\n\n\u0412\u0447\u0435\u0440\u0430 \u0430\u043c\u0435\u0440\u0438\u043a\u0430\u043d\u0441\u043a\u0430\u044f CISA \u0442\u0430\u043a\u0436\u0435 \u043f\u0440\u0438\u0437\u0432\u0430\u043b\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0438\u0442\u044c \u0437\u0430\u0449\u0438\u0442\u0443 \u0441\u0438\u0441\u0442\u0435\u043c Windows \u043e\u0442 \u0434\u0432\u0443\u0445 0-day \u0432 Microsoft Defender, \u043f\u0440\u0435\u0434\u0443\u043f\u0440\u0435\u0434\u0438\u0432, \u0447\u0442\u043e \u043e\u043d\u0438 \u0430\u043a\u0442\u0438\u0432\u043d\u043e \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044e\u0442\u0441\u044f \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0430\u043c\u0438. \u0421\u043e\u043e\u0442\u0432\u0435\u0442\u0441\u0442\u0432\u0435\u043d\u043d\u043e, \u0432\u043d\u0435\u0441\u043b\u0430\u00a0\u0438\u0445 \u0432 \u0441\u0432\u043e\u0439 \u043a\u0430\u0442\u0430\u043b\u043e\u0433 (KEV).", "creation_timestamp": "2026-05-21T14:44:32.000000Z"}, {"uuid": "4a262af0-9eec-4fb8-b4b3-2027329feac7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-45498", "type": "seen", "source": "https://bsky.app/profile/hendryadrian.bsky.social/post/3mmeeo7mnce2q", "content": "Microsoft patched two actively exploited Defender zero-days, CVE-2026-41091 and CVE-2026-45498. One can grant SYSTEM privileges, while the other can trigger DoS on unpatched Windows devices. #MicrosoftDefender #CISA #Windows \u0627\u0644\u0623\u0645\u0646\u064a\u0629", "creation_timestamp": "2026-05-21T12:00:27.727276Z"}, {"uuid": "398e3354-1a6b-4ba4-a8a5-a0fa951fff98", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2026-45498", "type": "seen", "source": "https://www.acn.gov.it/portale/w/microsoft-rilevato-sfruttamento-attivo-di-nuove-vulnerabilita", "content": "", "creation_timestamp": "2026-05-21T02:11:49.000000Z"}, {"uuid": "97de1d95-e2c7-44a2-be1e-9e32194b05fb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-45498", "type": "seen", "source": "https://bsky.app/profile/bitnewsbot.bsky.social/post/3mmeoy56j7z2j", "content": "Two actively exploited vulnerabilities in Microsoft Defender, CVE-2026-41091 and CVE-2026-45498, have been patched according to an advisory dated May 21, [\u2026]", "creation_timestamp": "2026-05-21T15:04:57.316285Z"}, {"uuid": "e5c8eaaa-8b63-4649-b963-40d58de5ace0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-45498", "type": "seen", "source": "https://infosec.exchange/ap/users/116025545744531578/statuses/116612467967333188", "content": "\ud83d\udd34 SonicWall Gen6 SSL-VPN MFA bypass is being exploited through CVE-2024-12802 after incomplete LDAP remediation, with ransomware tooling observed.\n\ud83d\udd34 Microsoft Defender CVE-2026-41091 and CVE-2026-45498 are now in CISA KEV after confirmed exploitation.\nCheck VPN auth logs and verify Defender platform and engine versions.solomonneas.dev/intel\n#CyberSecurity #ThreatIntel #CISA #VPN", "creation_timestamp": "2026-05-21T15:18:47.085745Z"}, {"uuid": "1125d3dd-63c9-424a-99f1-070e26728ea4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-45498", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3mmeqcqorryq2", "content": "CISA Adds Two Exploited Microsoft Defender Zero-Days to KEV Microsoft Defender is actively being exploited via two zero-days, CVE-2026-41091 and CVE-2026-45498, which CISA added to its KEV catalog ...\n\n#Cybersecurity #CVE #Vulnerability #Alerts [\u2026] \n\n[Original post on dailysecurityreview.com]", "creation_timestamp": "2026-05-21T15:28:49.624737Z"}, {"uuid": "359f1d28-19c0-4dd6-bc61-0cf7b33e53a6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-45498", "type": "seen", "source": "https://bsky.app/profile/kitafox.bsky.social/post/3mmfgtwlux62d", "content": "Microsoft Defender\u306e\u8106\u5f31\u6027\u304c\u5b9f\u969b\u306b\u60aa\u7528\u3055\u308c\u308b\u4e8b\u4f8b\u304c\u767a\u751f\uff08CVE-2026-41091\u3001CVE-2026-45498\uff09 \n\nMicrosoft Defender vulnerabilities exploited in the wild (CVE-2026-41091, CVE-2026-45498)  #HelpNetSecurity (May 21)\n\nwww.helpnetsecurity.com/2026/05/21/m...", "creation_timestamp": "2026-05-21T22:14:31.236781Z"}, {"uuid": "1a45e434-0973-441a-acc5-2117a75e73d3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-45498", "type": "seen", "source": "https://bsky.app/profile/pmloik.bsky.social/post/3mmfvchcwo22h", "content": "Top 3 CVE for last 7 days:\nCVE-2026-45584: 64 interactions\nCVE-2026-45250: 63 interactions\nCVE-2026-42897: 43 interactions\n\n\nTop 3 CVE for yesterday:\nCVE-2026-45250: 63 interactions\nCVE-2026-41091: 8 interactions\nCVE-2026-45498: 8 interactions\n", "creation_timestamp": "2026-05-22T02:30:46.491076Z"}, {"uuid": "934b4573-575e-4fdd-9356-b4356b6c2d5f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-45498", "type": "seen", "source": "https://mastodon.social/ap/users/115426718704364579/statuses/116614160241192927", "content": "\ud83d\udcf0 Warning: Microsoft Defender Flaws Actively Exploited to Gain SYSTEM Privileges\n\u26a0\ufe0f ACTIVE EXPLOITATION ALERT: Flaws in Microsoft Defender (CVE-2026-41091, CVE-2026-45498) are being used by attackers to gain SYSTEM privileges and disable AV. Patch the Malware Protection Engine immediately! #CyberSecurity #Vulnerability #PatchNow\n\ud83c\udf10 cyber[.]netsecops[.]io\n\ud83d\udd17 https://cyber.netsecops.io/articles/microsoft-defender-vulnerabilities-actively-exploited-for-privilege-escalati\u2026", "creation_timestamp": "2026-05-21T19:14:34.308130Z"}, {"uuid": "5d735a7a-8909-46d6-8c6f-e89b514bb0bd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-45498", "type": "seen", "source": "https://bsky.app/profile/netsecio.bsky.social/post/3mmf4xa64nm2h", "content": "\u26a0\ufe0f ACTIVE EXPLOITATION ALERT: Flaws in Microsoft Defender (CVE-2026-41091, CVE-2026-45498) are being used by attackers to gain SYSTEM privileges and disable AV. Patch the Malware Protection Engine immediately! #CyberSecurity #Vulnerability #PatchNow\n\n\ud83c\udf10 cyber[.]netsecops[.]io", "creation_timestamp": "2026-05-21T19:14:59.349177Z"}, {"uuid": "46901545-bd5c-415b-8934-5e2430614728", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-45498", "type": "seen", "source": "https://bsky.app/profile/cocanews.bsky.social/post/3mmgebhad222p", "content": "\u30de\u30a4\u30af\u30ed\u30bd\u30d5\u30c8\u3001Defender\u306e\u60aa\u7528\u3055\u308c\u305f\u30bc\u30ed\u30c7\u30a4\u3092\u4fee\u6b63\uff08CVE-2026-41091\u3001CVE-2026-45498\uff09 | Codebook\uff5cSecurity News\n\nhttps://www.wacoca.com/news/2843035/\n\n\u30de\u30a4\u30af\u30ed\u30bd\u30d5\u30c8\u3001Defender\u306e\u60aa\u7528\u3055\u308c\u305f\u30bc\u30ed\u30c7\u30a4RedSun\u3068UnDefend\u3092\u4fee\u6b63\uff08CVE-2026-41091\u3001CVE-2026-45498\uff09 SecurityWeek \u2013 May 21, 2026 \u30de\u30a4\u30af\u30ed\u30bd\u30d5 [...]", "creation_timestamp": "2026-05-22T06:58:38.202607Z"}, {"uuid": "864f05d4-0cda-4662-8d1f-1f93477d5732", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-45498", "type": "seen", "source": "https://bsky.app/profile/shiojiri.com/post/3mmgajxmtikzj", "content": "\u30de\u30a4\u30af\u30ed\u30bd\u30d5\u30c8\u3001Defender\u306e\u60aa\u7528\u3055\u308c\u305f\u30bc\u30ed\u30c7\u30a4\u3092\u4fee\u6b63\uff08CVE-2026-41091\u3001CVE-2026-45498\uff09 | Codebook\uff5cSecurity News https://codebook.machinarecord.com/threatreport/silobreaker-cyber-alert/45741/", "creation_timestamp": "2026-05-22T05:52:28.508085Z"}, {"uuid": "42af2df6-88e9-4960-b1b2-21f4787d2d83", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-45498", "type": "seen", "source": "https://bsky.app/profile/blackhatnews.tokyo/post/3mmgomw4g5m2u", "content": "CISA\u304cMicrosoft Defender\u30bc\u30ed\u30c7\u30a4\u8106\u5f31\u6027\u306e\u60aa\u7528\u306b\u95a2\u3059\u308b\u8b66\u544a\u3092\u767a\u884c\n\nCISA\u306f\u3001Microsoft Defender\u306b\u5f71\u97ff\u3092\u4e0e\u3048\u308b\u65b0\u305f\u306b\u958b\u793a\u3055\u308c\u305f2\u3064\u306e\u30bc\u30ed\u30c7\u30a4\u8106\u5f31\u6027\u306b\u3064\u3044\u3066\u3001\u7d44\u7e54\u306b\u8b66\u544a\u3059\u308b\u7dca\u6025\u8b66\u544a\u3092\u767a\u884c\u3057\u307e\u3057\u305f\u3002\u4e21\u65b9\u3068\u30822026\u5e745\u670820\u65e5\u306b\u65e2\u77e5\u306e\u60aa\u7528\u8106\u5f31\u6027\uff08KEV\uff09\u30ab\u30bf\u30ed\u30b0\u306b\u8ffd\u52a0\u3055\u308c\u307e\u3057\u305f\u3002 CVE-2026-45498\uff1aMicrosoft Defender DoS\u8106\u5f31\u6027 CVE", "creation_timestamp": "2026-05-22T10:03:59.669608Z"}, {"uuid": "5565f9d7-051c-4617-a172-b408dab68c9d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-45498", "type": "seen", "source": "https://bsky.app/profile/jussimetso.com/post/3mmgjkz2z6k25", "content": "There are 2 Zero-day vulnerabities in Microsoft Defender! CVE-2026-41091 and CVE-2026-45498 impacting to impact Microsoft Defender\u2019s Malware Protection Engine and Antimalware Platform. www.linkedin.com/pulse/warnin...", "creation_timestamp": "2026-05-22T08:33:28.071838Z"}, {"uuid": "a033d4cb-920f-41a1-8412-bffa17c981d8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-45498", "type": "seen", "source": "https://t.me/bdufstecru/3186", "content": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u0430 \u0430\u043d\u0442\u0438\u0432\u0438\u0440\u0443\u0441\u043d\u043e\u0439 \u0437\u0430\u0449\u0438\u0442\u044b Microsoft Defender Antimalware Platform \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u043d\u0435\u043a\u043e\u043d\u0442\u0440\u043e\u043b\u0438\u0440\u0443\u0435\u043c\u044b\u043c \u0440\u0430\u0441\u0445\u043e\u0434\u043e\u043c \u0440\u0435\u0441\u0443\u0440\u0441\u043e\u0432. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u0432\u044b\u0437\u0432\u0430\u0442\u044c \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438\n\nBDU:2026-07109\nCVE-2026-45498\n\n\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044f:\nhttps://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-45498\n\n\u041a\u043e\u043c\u043f\u0435\u043d\u0441\u0438\u0440\u0443\u044e\u0449\u0438\u0435 \u043c\u0435\u0440\u044b:\n- \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u0438\u044f \u0438 \u043f\u0440\u0435\u0434\u043e\u0442\u0432\u0440\u0430\u0449\u0435\u043d\u0438\u044f \u0432\u0442\u043e\u0440\u0436\u0435\u043d\u0438\u0439 \u0434\u043b\u044f \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u0438\u044f (\u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f, \u0440\u0435\u0433\u0438\u0441\u0442\u0440\u0430\u0446\u0438\u0438) \u0438 \u0440\u0435\u0430\u0433\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u044f \u043d\u0430 \u043f\u043e\u043f\u044b\u0442\u043a\u0438 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438.", "creation_timestamp": "2026-05-22T13:23:03.000000Z"}, {"uuid": "e1936c4e-b899-4281-a68a-28f5a35e55de", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-45498", "type": "seen", "source": "https://bsky.app/profile/hacker.at.thenote.app/post/3mmgvb62utk2g", "content": "Microsoft Defender vulnerabilities exploited in the wild (CVE-2026-41091, CVE-2026-45498)\n\nAttackers are exploiting two Microsoft Defender vulnerabilities (CVE-2026-41091 and CVE-2026-45498), Microsoft acknowledged and CISA confirmed by adding them to its Known Exploite\u2026\n#hackernews #microsoft #news", "creation_timestamp": "2026-05-22T12:02:42.237530Z"}, {"uuid": "f98b3c19-8836-41bb-8c24-8d6b34432607", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-45498", "type": "seen", "source": "https://mastodon.social/ap/users/115426718704364579/statuses/116619811118984669", "content": "\ud83d\udcf0 Warning: Microsoft Defender Flaws Actively Exploited to Gain SYSTEM Privileges\n\u26a0\ufe0f ACTIVE EXPLOITATION ALERT: Flaws in Microsoft Defender (CVE-2026-41091, CVE-2026-45498) are being used by attackers to gain SYSTEM privileges and disable AV. Patch the Malware Protection Engine immediately! #CyberSecurity #Vulnerability #PatchNow\n\ud83c\udf10 cyber[.]netsecops[.]io\n\ud83d\udd17 https://cyber.netsecops.io/articles/microsoft-defender-vulnerabilities-actively-exploited-for-privilege-escalati\u2026", "creation_timestamp": "2026-05-22T19:11:40.403519Z"}, {"uuid": "3c22f2b1-c2e1-46f5-a7b8-bfa21bf125d5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-45498", "type": "seen", "source": "https://bsky.app/profile/netsecio.bsky.social/post/3mmhnbzmjdo2p", "content": "\u26a0\ufe0f ACTIVE EXPLOITATION ALERT: Flaws in Microsoft Defender (CVE-2026-41091, CVE-2026-45498) are being used by attackers to gain SYSTEM privileges and disable AV. Patch the Malware Protection Engine immediately! #CyberSecurity #Vulnerability #PatchNow\n\n\ud83c\udf10 cyber[.]netsecops[.]io", "creation_timestamp": "2026-05-22T19:12:40.156577Z"}]}