Windows TCP/IP Remote Code Execution Vulnerability
A race condition in the Windows TCP/IP stack allows an unauthenticated attacker on the network to execute arbitrary code by sending specially crafted network packets. The vulnerability affects Windows 10 (versions 1607, 1809, 21H2, 22H2), Windows 11 (versions 23H2, 24H2, 25H2, 26H1), and Windows Server 2016, 2019, 2022, and 2025 across 32-bit, 64-bit, and ARM64 architectures. Exploitation is considered less likely in the wild, but the remote code execution capability poses significant risk to networked control system components.
- Network access to the affected Windows system
- No authentication required
- Attacker must send network traffic that triggers the race condition timing window
Patching may require device reboot — plan for process interruption
/api/v1/advisories/40c8b218-1163-4fa8-8276-d37312b2e8f7Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.