Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-23674: CWE-41: Improper Resolution of Path Equivalence in Microsoft Windows 10 Version 1607

0
High
VulnerabilityCVE-2026-23674cvecve-2026-23674cwe-41
Published: Tue Mar 10 2026 (03/10/2026, 17:05:11 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows 10 Version 1607

Description

Improper resolution of path equivalence in Windows MapUrlToZone allows an unauthorized attacker to bypass a security feature over a network.

AI-Powered Analysis

AILast updated: 03/10/2026, 18:37:25 UTC

Technical Analysis

CVE-2026-23674 is a vulnerability classified under CWE-41 (Improper Resolution of Path Equivalence) affecting Microsoft Windows 10 Version 1607 (build 10.0.14393.0). The issue resides in the MapUrlToZone function, which is responsible for mapping URLs to security zones within the Windows security model. Due to improper handling of path equivalence, an attacker can craft malicious URLs or network paths that bypass security zone restrictions, effectively circumventing security features designed to isolate or restrict content based on zone classification. This bypass can be exploited remotely over a network without requiring any privileges or user interaction, increasing the attack surface. The vulnerability has a CVSS 3.1 base score of 7.5, reflecting high severity primarily due to its impact on confidentiality and ease of exploitation. Although no public exploits are known at this time, the flaw poses a significant risk to unpatched systems. The vulnerability does not affect system integrity or availability but can lead to unauthorized disclosure of sensitive information by bypassing security zone policies. The affected product is an older Windows 10 version (1607), which may still be in use in certain environments, especially where legacy systems persist. No patches are currently linked, indicating that remediation may be pending or in progress.

Potential Impact

The primary impact of CVE-2026-23674 is the potential unauthorized disclosure of sensitive information due to bypassing Windows security zone restrictions. This can allow attackers to access or exfiltrate data that would otherwise be protected by zone-based security policies. Since the vulnerability requires no authentication or user interaction and can be exploited remotely, it increases the risk of widespread attacks in environments where Windows 10 Version 1607 is deployed. Organizations relying on legacy Windows 10 systems may face increased exposure, especially if these systems are accessible over networks. Although integrity and availability are not directly impacted, the confidentiality breach could lead to further attacks or data leaks. The lack of known exploits in the wild currently reduces immediate risk but does not eliminate the threat, as attackers may develop exploits once the vulnerability details become widely known. Critical infrastructure, government, and enterprises with legacy Windows 10 deployments are particularly at risk due to the sensitivity of their data and the potential for targeted attacks.

Mitigation Recommendations

1. Prioritize upgrading or patching Windows 10 Version 1607 systems as soon as official patches or updates become available from Microsoft. 2. If patching is not immediately possible, isolate affected systems from untrusted networks to reduce exposure. 3. Implement network segmentation and firewall rules to restrict access to vulnerable endpoints, especially from external or less trusted networks. 4. Monitor network traffic for unusual or suspicious URL requests that may attempt to exploit path equivalence bypass. 5. Employ endpoint detection and response (EDR) solutions to detect anomalous behaviors related to URL handling or security zone bypass attempts. 6. Educate IT staff and users about the risks of legacy system usage and encourage migration to supported Windows versions. 7. Review and tighten security zone policies and configurations to minimize the impact of potential bypasses. 8. Maintain up-to-date inventories of systems running Windows 10 Version 1607 to ensure timely remediation and risk assessment.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
microsoft
Date Reserved
2026-01-14T16:59:33.466Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69b05628ea502d3aa87d68c7

Added to database: 3/10/2026, 5:34:32 PM

Last enriched: 3/10/2026, 6:37:25 PM

Last updated: 3/13/2026, 9:24:56 PM

Views: 40

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses