Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-23656: CWE-345: Insufficient Verification of Data Authenticity in Microsoft Windows App Client for Windows Desktop

0
Medium
VulnerabilityCVE-2026-23656cvecve-2026-23656cwe-345
Published: Tue Mar 10 2026 (03/10/2026, 17:05:05 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows App Client for Windows Desktop

Description

Insufficient verification of data authenticity in Windows App Installer allows an unauthorized attacker to perform spoofing over a network.

AI-Powered Analysis

AILast updated: 03/10/2026, 18:33:20 UTC

Technical Analysis

CVE-2026-23656 is a vulnerability identified in Microsoft Windows App Client for Windows Desktop version 1.00, classified under CWE-345, which pertains to insufficient verification of data authenticity. This weakness arises because the application does not adequately verify the authenticity of data it receives over the network, allowing an attacker to spoof data or commands. The vulnerability enables an unauthorized attacker to send crafted network packets that the client may accept as legitimate, potentially leading to integrity breaches such as unauthorized command execution or manipulation of application behavior. The CVSS 3.1 base score is 5.9, reflecting a medium severity level, with attack vector being network-based (AV:N), requiring high attack complexity (AC:H), no privileges (PR:N), and no user interaction (UI:N). The scope remains unchanged (S:U), and the impact affects integrity (I:H) but not confidentiality (C:N) or availability (A:N). No known exploits have been reported in the wild, and no patches are currently linked, indicating that mitigation relies on vendor updates and defensive controls. This vulnerability highlights the importance of robust data authenticity checks in network communications to prevent spoofing attacks that can undermine application trustworthiness.

Potential Impact

The primary impact of CVE-2026-23656 is on data integrity within affected Windows App Client environments. An attacker exploiting this vulnerability can perform spoofing attacks over the network, potentially causing the application to accept and act upon falsified data or commands. This can lead to unauthorized manipulation of application behavior, which may disrupt business processes, cause erroneous data processing, or enable further attack vectors such as privilege escalation or lateral movement if combined with other vulnerabilities. Since confidentiality and availability are not directly impacted, the risk is focused on trustworthiness and correctness of data. Organizations relying heavily on Windows App Client for critical operations may face operational disruptions or data integrity issues. The lack of required privileges or user interaction lowers the barrier for remote exploitation, although the high attack complexity reduces the likelihood of widespread exploitation without specialized skills or conditions. The absence of known exploits in the wild currently limits immediate risk but does not preclude future exploitation once the vulnerability becomes more widely understood.

Mitigation Recommendations

To mitigate CVE-2026-23656 effectively, organizations should: 1) Monitor Microsoft security advisories closely and apply patches or updates as soon as they become available for the Windows App Client. 2) Implement network-level protections such as strict firewall rules, network segmentation, and intrusion detection/prevention systems (IDS/IPS) to detect and block spoofed or anomalous traffic targeting the Windows App Client. 3) Employ strong cryptographic verification and authentication mechanisms for network communications where possible, including the use of TLS with mutual authentication to ensure data authenticity. 4) Conduct regular security assessments and penetration testing focused on network spoofing and data integrity attacks to identify and remediate weaknesses. 5) Educate IT and security teams about this vulnerability to ensure rapid response and incident handling if suspicious activity is detected. 6) Limit exposure of Windows App Client instances to untrusted networks and consider using VPNs or secure tunnels for remote access. These steps go beyond generic advice by emphasizing proactive network defenses and cryptographic verification tailored to the nature of the vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
microsoft
Date Reserved
2026-01-14T16:59:33.462Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69b05626ea502d3aa87d687f

Added to database: 3/10/2026, 5:34:30 PM

Last enriched: 3/10/2026, 6:33:20 PM

Last updated: 3/13/2026, 11:54:52 PM

Views: 24

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses