CVE-2026-0386: CWE-284: Improper Access Control in Microsoft Windows Server 2019
CVE-2026-0386 is a high-severity vulnerability in Microsoft Windows Server 2019's Windows Deployment Services (WDS) component. It stems from improper access control (CWE-284), allowing an unauthorized attacker to execute arbitrary code over an adjacent network without authentication or user interaction. The vulnerability affects version 10. 0. 17763. 0 and has a CVSS 3. 1 score of 7. 5, indicating a significant risk to confidentiality, integrity, and availability. Although no known exploits are currently in the wild, the flaw could enable attackers to compromise servers within the same local network segment. European organizations using Windows Server 2019, especially those relying on WDS for network-based deployment, are at risk.
AI Analysis
Technical Summary
CVE-2026-0386 is a vulnerability categorized under CWE-284 (Improper Access Control) affecting Microsoft Windows Server 2019, specifically the Windows Deployment Services (WDS) component. WDS is used for network-based deployment of Windows operating systems, allowing administrators to remotely install Windows on machines over a network. The vulnerability arises because WDS improperly restricts access controls, enabling an attacker on an adjacent network segment to execute arbitrary code without requiring authentication or user interaction. The CVSS 3.1 vector (AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H) indicates that the attack requires adjacency (local network), high attack complexity, no privileges, and no user interaction, but results in high impact on confidentiality, integrity, and availability. The affected version is Windows Server 2019 build 10.0.17763.0. Although no public exploits are known yet, the flaw could be leveraged to gain control over affected servers, potentially leading to data breaches, service disruption, or lateral movement within a network. The vulnerability was reserved in November 2025 and published in January 2026, with no patches currently listed, emphasizing the need for vigilance and interim mitigations.
Potential Impact
For European organizations, the impact of CVE-2026-0386 could be substantial, especially for enterprises and public sector entities relying on Windows Server 2019 and WDS for deployment and network management. Successful exploitation could lead to unauthorized code execution, resulting in data theft, disruption of critical services, or further compromise of internal networks. This is particularly concerning for sectors such as finance, healthcare, government, and critical infrastructure, where Windows Server 2019 is widely deployed. The adjacency requirement limits remote exploitation but does not eliminate risk, as attackers could gain access through compromised devices or insider threats within the same local network. The high impact on confidentiality, integrity, and availability means that exploitation could cause severe operational and reputational damage, regulatory penalties under GDPR, and financial losses.
Mitigation Recommendations
1. Monitor Microsoft’s official channels closely for the release of security patches addressing CVE-2026-0386 and apply them immediately upon availability. 2. Restrict network access to Windows Deployment Services by implementing strict network segmentation and firewall rules to limit WDS communication only to trusted management systems. 3. Employ network intrusion detection and prevention systems (IDS/IPS) to identify and block suspicious activities targeting WDS ports and protocols. 4. Conduct regular audits of WDS configurations and access controls to ensure they follow the principle of least privilege. 5. Use network access control (NAC) solutions to prevent unauthorized devices from connecting to the local network segment where WDS operates. 6. Educate IT staff about the vulnerability and encourage heightened monitoring of logs and unusual network behavior related to WDS. 7. Consider temporarily disabling WDS if it is not critical to operations until a patch is available.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2026-0386: CWE-284: Improper Access Control in Microsoft Windows Server 2019
Description
CVE-2026-0386 is a high-severity vulnerability in Microsoft Windows Server 2019's Windows Deployment Services (WDS) component. It stems from improper access control (CWE-284), allowing an unauthorized attacker to execute arbitrary code over an adjacent network without authentication or user interaction. The vulnerability affects version 10. 0. 17763. 0 and has a CVSS 3. 1 score of 7. 5, indicating a significant risk to confidentiality, integrity, and availability. Although no known exploits are currently in the wild, the flaw could enable attackers to compromise servers within the same local network segment. European organizations using Windows Server 2019, especially those relying on WDS for network-based deployment, are at risk.
AI-Powered Analysis
Technical Analysis
CVE-2026-0386 is a vulnerability categorized under CWE-284 (Improper Access Control) affecting Microsoft Windows Server 2019, specifically the Windows Deployment Services (WDS) component. WDS is used for network-based deployment of Windows operating systems, allowing administrators to remotely install Windows on machines over a network. The vulnerability arises because WDS improperly restricts access controls, enabling an attacker on an adjacent network segment to execute arbitrary code without requiring authentication or user interaction. The CVSS 3.1 vector (AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H) indicates that the attack requires adjacency (local network), high attack complexity, no privileges, and no user interaction, but results in high impact on confidentiality, integrity, and availability. The affected version is Windows Server 2019 build 10.0.17763.0. Although no public exploits are known yet, the flaw could be leveraged to gain control over affected servers, potentially leading to data breaches, service disruption, or lateral movement within a network. The vulnerability was reserved in November 2025 and published in January 2026, with no patches currently listed, emphasizing the need for vigilance and interim mitigations.
Potential Impact
For European organizations, the impact of CVE-2026-0386 could be substantial, especially for enterprises and public sector entities relying on Windows Server 2019 and WDS for deployment and network management. Successful exploitation could lead to unauthorized code execution, resulting in data theft, disruption of critical services, or further compromise of internal networks. This is particularly concerning for sectors such as finance, healthcare, government, and critical infrastructure, where Windows Server 2019 is widely deployed. The adjacency requirement limits remote exploitation but does not eliminate risk, as attackers could gain access through compromised devices or insider threats within the same local network. The high impact on confidentiality, integrity, and availability means that exploitation could cause severe operational and reputational damage, regulatory penalties under GDPR, and financial losses.
Mitigation Recommendations
1. Monitor Microsoft’s official channels closely for the release of security patches addressing CVE-2026-0386 and apply them immediately upon availability. 2. Restrict network access to Windows Deployment Services by implementing strict network segmentation and firewall rules to limit WDS communication only to trusted management systems. 3. Employ network intrusion detection and prevention systems (IDS/IPS) to identify and block suspicious activities targeting WDS ports and protocols. 4. Conduct regular audits of WDS configurations and access controls to ensure they follow the principle of least privilege. 5. Use network access control (NAC) solutions to prevent unauthorized devices from connecting to the local network segment where WDS operates. 6. Educate IT staff about the vulnerability and encourage heightened monitoring of logs and unusual network behavior related to WDS. 7. Consider temporarily disabling WDS if it is not critical to operations until a patch is available.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- microsoft
- Date Reserved
- 2025-11-17T18:35:27.135Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69668adaa60475309f9adf31
Added to database: 1/13/2026, 6:11:38 PM
Last enriched: 2/5/2026, 8:34:43 AM
Last updated: 2/7/2026, 3:32:25 AM
Views: 193
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2071: Buffer Overflow in UTT 进取 520W
HighCVE-2026-25762: CWE-400: Uncontrolled Resource Consumption in adonisjs core
HighCVE-2026-25754: CWE-1321: Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') in adonisjs core
HighCVE-2026-25644: CWE-295: Improper Certificate Validation in datahub-project datahub
HighCVE-2026-25804: CWE-287: Improper Authentication in antrea-io antrea
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.