Remote Code Execution Vulnerability in Windows IKE Service Extensions
CVE-2026-33824

9.8CRITICAL

What is CVE-2026-33824?

CVE-2026-33824 is a remote code execution vulnerability found in the IKE (Internet Key Exchange) Service Extensions of Microsoft Windows. This vulnerability arises from a double free error, which occurs when a program attempts to free the same memory location more than once. This flaw could allow an unauthorized attacker to execute arbitrary code over a network, potentially gaining control over affected systems. Given that the IKE service is instrumental in managing security associations and key exchanges for VPN connections, the exploitation of this vulnerability could severely compromise network security and integrity. Organizations that rely on Microsoft Windows for their network infrastructure may find themselves at significant risk if this vulnerability is not adequately addressed.

Potential impact of CVE-2026-33824

  1. Unauthorized Access: Exploitation of this vulnerability could permit attackers to execute arbitrary code remotely, allowing them to gain unauthorized access to sensitive systems and data within the organization's network.

  2. Compromise of Network Security: The ability to manipulate the IKE service could lead to the compromise of VPNs and other secure connections, undermining the overall security architecture that relies on these protocols for safe communication.

  3. Data Breaches and Malware Deployment: By exploiting this vulnerability, attackers could potentially facilitate data breaches, exfiltrate sensitive information, or deploy ransomware and other forms of malware, further endangering organizational assets and user data.

Affected Version(s)

Windows 10 Version 1607 32-bit Systems 10.0.14393.0 < 10.0.14393.9060

Windows 10 Version 1809 32-bit Systems 10.0.17763.0 < 10.0.17763.8644

Windows 10 Version 21H2 32-bit Systems 10.0.19044.0 < 10.0.19044.7184

References

CVSS V3.1

Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.