Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-0386: CWE-284: Improper Access Control in Microsoft Windows Server 2008 R2 Service Pack 1

0
High
VulnerabilityCVE-2026-0386cvecve-2026-0386cwe-284
Published: Tue Jan 13 2026 (01/13/2026, 17:56:05 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows Server 2008 R2 Service Pack 1

Description

Improper access control in Windows Deployment Services allows an unauthorized attacker to execute code over an adjacent network.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/02/2026, 00:32:58 UTC

Technical Analysis

CVE-2026-0386 is a vulnerability classified under CWE-284 (Improper Access Control) found in Microsoft Windows Server 2008 R2 Service Pack 1, specifically impacting Windows Deployment Services (WDS). WDS is a network-based installation service for deploying Windows operating systems. The flaw allows an attacker on an adjacent network segment to execute arbitrary code remotely without authentication or user interaction. The vulnerability arises because WDS does not properly enforce access control policies, permitting unauthorized code execution. The CVSS 3.1 vector (AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H) indicates that the attack requires adjacency (local network), high attack complexity, no privileges, and no user interaction, but results in high impact on confidentiality, integrity, and availability. This means an attacker could potentially take full control of the affected server, access sensitive data, modify system configurations, or disrupt services. Windows Server 2008 R2 is an older operating system version, nearing or past end-of-support in many environments, which increases risk due to lack of ongoing security updates. No patches or known exploits are currently documented, but the vulnerability's nature suggests it could be leveraged in targeted attacks against legacy infrastructure. The improper access control weakness is a critical security design flaw that undermines the trust boundary of network services, especially in environments where WDS is exposed or insufficiently segmented.

Potential Impact

The impact of CVE-2026-0386 is significant for organizations still operating Windows Server 2008 R2 with Windows Deployment Services enabled. Successful exploitation allows remote code execution by an unauthenticated attacker on the same network segment, potentially leading to full system compromise. This can result in unauthorized access to sensitive data, disruption of deployment services, lateral movement within the network, and the establishment of persistent footholds. Given the high confidentiality, integrity, and availability impacts, critical business operations relying on these servers could be severely affected. The vulnerability poses a particular risk to organizations with legacy infrastructure that cannot be easily upgraded, including government agencies, financial institutions, healthcare providers, and industrial control systems. The lack of known exploits currently reduces immediate risk but does not eliminate the threat, especially as attackers often develop exploits after public disclosure. The adjacency requirement limits remote internet exploitation but does not mitigate risks within internal networks, including VPNs or compromised segments.

Mitigation Recommendations

1. Upgrade or migrate systems from Windows Server 2008 R2 to a supported version of Windows Server to receive security updates and reduce exposure to legacy vulnerabilities. 2. If upgrading is not immediately possible, isolate Windows Deployment Services servers on dedicated VLANs or network segments with strict access controls to limit adjacency to trusted hosts only. 3. Implement network-level filtering and firewall rules to restrict access to WDS ports and services exclusively to authorized management systems. 4. Monitor network traffic for unusual activity related to WDS, including unexpected connections or code execution attempts. 5. Employ host-based intrusion detection and prevention systems to detect anomalous behavior on affected servers. 6. Regularly audit and review access permissions and service configurations to ensure no unnecessary exposure. 7. Stay alert for official patches or security advisories from Microsoft and apply them promptly once available. 8. Develop and test incident response plans specific to legacy system compromises to minimize damage if exploitation occurs.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
microsoft
Date Reserved
2025-11-17T18:35:27.135Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69668adaa60475309f9adf31

Added to database: 1/13/2026, 6:11:38 PM

Last enriched: 3/2/2026, 12:32:58 AM

Last updated: 3/26/2026, 3:46:57 AM

Views: 258

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses