MLXIO
a close up of a network with wires connected to it
CybersecurityMay 22, 2026· 6 min read· By MLXIO Insights Team

Microsoft Defender Zero-Days Hand Hackers SYSTEM Keys

Share

MLXIO Intelligence

Analysis Snapshot

61
Moderate
Confidence: LowTrend: 10Freshness: 98Source Trust: 100Factual Grounding: 95Signal Cluster: 20

Moderate MLXIO Impact based on trend velocity, freshness, source trust, and factual grounding.

Thesis

High Confidence

Microsoft issued emergency Defender updates after Huntress confirmed active exploitation of two zero-days that could enable SYSTEM-level privilege escalation or silently weaken endpoint protection.

Evidence

  • Microsoft pushed out-of-band Defender fixes on May 21 after RedSun and UnDefend were used in live attacks.
  • CVE-2026-41091 affects the Microsoft Malware Protection Engine and can let a low-privileged attacker escalate to SYSTEM via symbolic link or directory junction manipulation during a Defender scan.
  • CVE-2026-45498 affects the Microsoft Defender Antimalware Platform and can block definition updates, reducing detection of newer threats.
  • Microsoft fixed the issues in Malware Protection Engine version 1.1.26040.8 and Antimalware Platform version 4.18.26040.7.

Uncertainty

  • The supplied reporting does not provide scope of exploitation or affected victim counts.
  • The article says the flaws initially had no CVEs or fixes, but does not include Microsoft advisory text.
  • Deployment status may vary where Defender updates are delayed by policy, isolation, or managed rollout controls.

What To Watch

  • Confirmation that endpoints have received Malware Protection Engine 1.1.26040.8 and Antimalware Platform 4.18.26040.7.
  • Huntress or Microsoft updates on exploitation scope, indicators of compromise, or detection guidance.
  • Any follow-on patches for related Chaotic Eclipse disclosures, including the reportedly unpatched MiniPlasma issue.

Verified Claims

Microsoft released emergency out-of-band Defender fixes on May 21 for two zero-days that were already being exploited.
📎 Microsoft pushed emergency Defender fixes on May 21 after two zero-days, RedSun and UnDefend, were already being used in live attacks.High
CVE-2026-41091 affects the Microsoft Malware Protection Engine and can allow a low-privileged attacker to escalate to SYSTEM-level control.
📎 The flaw stems from improper link resolution before file access, allowing a low-privileged attacker to manipulate a symbolic link or directory junction during a Defender scan and escalate to SYSTEM-level control.High
CVE-2026-45498 is a denial-of-service issue in the Microsoft Defender Antimalware Platform that can block definition updates.
📎 It works as a denial-of-service against the protection engine, silently blocking definition updates and reducing Defender’s ability to catch newer threats.High
The fixes are included in Malware Protection Engine version 1.1.26040.8 and Antimalware Platform version 4.18.26040.7.
📎 Microsoft fixed both CVEs in Malware Protection Engine version 1.1.26040.8 and Antimalware Platform version 4.18.26040.7.High
Neither Defender vulnerability reportedly triggers a visible alert to users or administrators during exploitation.
📎 Neither vulnerability triggers a visible alert to the user or administrator during exploitation, based on the supplied reporting.Medium

Frequently Asked

What are the Microsoft Defender zero-days RedSun and UnDefend?

RedSun and UnDefend are two Microsoft Defender zero-days that were reportedly exploited in live attacks before Microsoft released emergency fixes.

Why is CVE-2026-41091 dangerous?

CVE-2026-41091 can let a low-privileged attacker manipulate a symbolic link or directory junction during a Defender scan and escalate to SYSTEM-level control.

What does CVE-2026-45498 do?

CVE-2026-45498 is a denial-of-service flaw in the Microsoft Defender Antimalware Platform that can silently block definition updates and weaken detection of newer threats.

Which Microsoft Defender versions contain the emergency fixes?

The article says Microsoft fixed the issues in Malware Protection Engine version 1.1.26040.8 and Antimalware Platform version 4.18.26040.7.

How are the Microsoft Defender zero-day fixes delivered?

Microsoft delivers the fixes through Defender’s built-in update mechanism, but administrators should verify deployment where updates may be delayed by policy, isolation, or managed rollout controls.

Updated on May 22, 2026

What We Know: Microsoft rushed Defender fixes outside Patch Tuesday

Microsoft pushed emergency Defender fixes on May 21 after two zero-days, RedSun and UnDefend, were already being used in live attacks.

The out-of-band updates landed after Huntress confirmed real-world exploitation and after researcher Chaotic Eclipse publicly disclosed the flaws without coordinated disclosure, according to Notebookcheck. At first release, the bugs had no CVEs and no available fixes.

That sequence matters. These were not theoretical proof-of-concept bugs waiting for a future patch cycle. Attackers had working paths before Microsoft’s emergency update was available.

The more serious vulnerability is now tracked as CVE-2026-41091. It carries a CVSS score of 7.8 and affects the Microsoft Malware Protection Engine. The flaw stems from improper link resolution before file access, allowing a low-privileged attacker to manipulate a symbolic link or directory junction during a Defender scan and escalate to SYSTEM-level control.

No elevated starting permissions are required for that flaw, according to the source material. That raises the operational risk because an attacker who already has limited access could potentially turn Defender’s own scan behavior into a privilege-escalation path.

The second bug, CVE-2026-45498, is rated CVSS 4.0 and targets the Microsoft Defender Antimalware Platform. It works as a denial-of-service against the protection engine, silently blocking definition updates and reducing Defender’s ability to catch newer threats.

That second issue affects System Center Endpoint Protection, System Center 2012 R2 and 2012 Endpoint Protection, Security Essentials, and standard Defender installations. Neither vulnerability triggers a visible alert to the user or administrator during exploitation, based on the supplied reporting.

Microsoft fixed both CVEs in Malware Protection Engine version 1.1.26040.8 and Antimalware Platform version 4.18.26040.7. The company delivers the fixes through Defender’s built-in update mechanism, but administrators still need to verify deployment, especially where updates are delayed by policy, isolation, or managed rollout controls.

Why It Matters: Defender itself became part of the attack surface

Security teams treat Microsoft Defender as a control plane inside Windows environments. These flaws cut directly into that assumption.

CVE-2026-41091 is the sharper concern because it can move a low-privileged attacker to SYSTEM-level control through file-system manipulation during a Defender scan. In practical terms, that turns a defensive workflow into a privilege-escalation opportunity.

CVE-2026-45498 hits a different part of the problem. Rather than grabbing higher privileges, it degrades protection by blocking definition updates. That creates a quieter risk: a machine may appear to have protection installed while its ability to detect newer threats weakens.

Huntress’ confirmation of active exploitation moves this from patch-management backlog to incident-response queue. Managed service providers, enterprise security teams, and Windows administrators need to assume some exposed systems may have been targeted before fixes were available.

There is also a timing problem. Microsoft’s normal Patch Tuesday cadence did not contain these updates. Out-of-band patches are reserved for issues that cannot comfortably wait, and here the reason is clear: public disclosure, no initial fixes, and confirmed exploitation.

The disclosure chain adds more pressure. RedSun and UnDefend are the fourth and fifth zero-days released by Chaotic Eclipse over the past six weeks, all targeting Windows security components. MiniPlasma, another disclosure in that series, remains unpatched and reportedly gives SYSTEM access on fully patched Windows 11 machines through the Cloud Filter driver.

Microsoft’s update for CVE-2026-41091 also addresses CVE-2026-45584, a heap-based buffer overflow with a CVSS score of 8.1 that allows remote code execution without user interaction. That third flaw has not been confirmed exploited in the wild.

Analysis: the clustering matters less because of the researcher drama and more because the targets are defensive components. When attackers aim at endpoint protection, patch status alone does not answer the full question. Security teams also need to know whether the control was bypassed, degraded, or abused before the update landed.

What Is Still Unclear: The attack details remain thin

What exactly did attackers do with RedSun and UnDefend? The available reporting confirms exploitation, but it does not provide a full victim profile, attacker attribution, infrastructure details, or a complete set of indicators of compromise.

Did every exposed Defender deployment face the same risk? Not necessarily. The source material identifies affected components and products, but administrators should rely on Microsoft’s advisory and their own tooling for precise version checks, configuration exposure, and remediation status.

Were attacks broad or targeted? The supplied material does not establish scale. Huntress confirmed real-world use, but the available details do not support claims about campaign size, sectors hit, geography, or financial impact.

Can organizations assume automatic updates solved the problem? They should not. Microsoft delivers the fixes automatically through Defender’s built-in update path, but air-gapped systems, managed environments, and delayed update rings can lag behind.

CISA added both vulnerabilities to its Known Exploited Vulnerabilities catalog on May 20, 2026. Federal Civilian Executive Branch agencies have until June 3 to confirm patching. That deadline gives enterprise teams outside the federal government a useful urgency marker, even if it is not their compliance requirement.

Analysis: the lack of visible alerts during exploitation is one of the most uncomfortable details. If abuse does not notify users or administrators, defenders cannot rely on obvious symptoms. They need version verification, telemetry review, and endpoint investigation where risk is highest.

What To Watch: Treat patching as the start of response

Administrators should first confirm that Malware Protection Engine version 1.1.26040.8 and Antimalware Platform version 4.18.26040.7, or newer, are deployed across Windows fleets. That check should include managed endpoints, servers, legacy Microsoft endpoint protection products, and systems that do not receive standard automatic updates.

Security teams should also review endpoint alerts and telemetry around Defender service behavior. The source material specifically points to silent update blocking and abuse during Defender scanning, so unusual protection-engine behavior, failed definition updates, tampering signals, or unexplained service degradation deserve quick escalation.

The next useful disclosures would be indicators from Microsoft, Huntress, or other responders. Watch for any published IOCs, affected-version clarifications, exploitation timelines, or guidance on hunting for prior compromise.

Another watch item is MiniPlasma. The supplied reporting says it remains unpatched and belongs to the same recent series of Chaotic Eclipse disclosures targeting Windows security components. If more details emerge or Microsoft ships a fix, administrators will need to fold that into the same exposure review.

The core takeaway is narrow but urgent: Microsoft has patched RedSun and UnDefend, but these zero-days were exploited before fixes existed. For organizations running Defender at scale, installing the update closes the known holes. It does not answer whether attackers already used them.

Impact Analysis

  • Attackers were exploiting both flaws before Microsoft released emergency fixes.
  • The higher-severity bug could let a low-privileged attacker gain SYSTEM-level control.
  • The update-blocking flaw could quietly reduce Defender’s ability to detect newer threats.

Defender Zero-Days Patched by Microsoft

VulnerabilitySeverityAffected ComponentAttack Impact
CVE-2026-41091CVSS 7.8Microsoft Malware Protection EnginePrivilege escalation to SYSTEM via symbolic link or directory junction manipulation
CVE-2026-45498CVSS 4.0Microsoft Defender Antimalware PlatformDenial-of-service that blocks definition updates and weakens threat detection

CVSS Scores for Defender Zero-Days

CVE-2026-41091
CVSS7.8
CVE-2026-45498
CVSS4
MLXIO

Written by

MLXIO Insights Team

Algorithmic Research & Human Oversight

Powered by advanced algorithmic research and perfected by human oversight. The Insights Team delivers highly structured, cross-verified analysis on emerging tech trends and digital shifts, filtering out the fluff to give you high-fidelity value.

Related Articles

a dark room with a purple light coming out of the window
CybersecurityMay 18, 2026

MiniPlasma Zero-Day Grants SYSTEM Access on Patched Windows 11

MiniPlasma zero-day exploit lets attackers escalate privileges to SYSTEM on fully patched Windows 11, risking total system takeover before a fix arrives.

5 min read

red padlock on black computer keyboard
CybersecurityMay 17, 2026

Zero-Day Email Attack Sparks Crisis for Microsoft Exchange Servers

Attackers exploit a zero-day in Microsoft Exchange Server using crafted emails, exposing on-premises servers to serious security risks without a permanent patch

3 min read

a glass of beer
CybersecurityMay 16, 2026

Microsoft’s MDASH AI Snags 16 Critical Windows Flaws First

Microsoft’s MDASH AI detected 16 critical Windows flaws before hackers, shifting the cybersecurity balance with faster vulnerability discovery.

6 min read

Security, privacy, and performance status with fix options.
CybersecurityMay 7, 2026

Microsoft Defender flags DigiCert certificates as malware

Microsoft Defender's flawed update quarantined DigiCert root certificates, disrupting secure Windows connections worldwide and triggering massive trust failures

4 min read

A security and privacy dashboard with its status.
CybersecurityMay 12, 2026

Hackers Exploit AI Blind Spots—Secure Your ML Models Now

Machine learning models face unique security risks that traditional methods miss. This guide reveals how to protect AI systems from sophisticated attacks.

9 min read

red xbox one game controller
TechnologyMay 22, 2026

Microsoft Dumps Xbox Controller Expansion Port Silently

Microsoft quietly removes the Xbox controller expansion port, leaving many accessories incompatible without any announcement.

3 min read

a close up of a video game controller
TechnologyMay 22, 2026

Forza Horizon 6 Grabs $325M While Steam Beats Xbox

Forza Horizon 6 reportedly nears 5M paid copies and $325M gross revenue, with Steam selling more copies but Xbox earning more.

5 min read

black and gray device on black textile
TechnologyMay 22, 2026

Leaked iPhone 18 Cases Signal One Costly Pro Surprise

Leaked iPhone 18 cases suggest Pro models may get thicker, forcing buyers to ditch iPhone 17 Pro cases.

8 min read

Laptop displaying a horse racing on its screen.
TechnologyMay 22, 2026

Four Lenovo Legion Laptops Bet on RTX 5070 12GB GPU

Lenovo is spreading Nvidia’s RTX 5070 12GB GPU across four Legion laptops in China, turning a VRAM upgrade into a full lineup play.

8 min read

apple logo on blue surface
TechnologyMay 22, 2026

iOS 26.5.1 Signals Apple’s Pre-WWDC iPhone Patch Rush

Apple appears to be testing iOS 26.5.1, a likely bug-fix patch that could land before iOS 27 takes the WWDC spotlight.

7 min read

Stay ahead of the curve

Get a weekly digest of the most important tech, AI, and finance news — curated by AI, reviewed by humans.

No spam. Unsubscribe anytime.