Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Thu, 14 May 2026 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Microsoft windows Server 2022 23h2
|
|
| CPEs | cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:arm64:* cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x86:* cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:arm64:* cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x86:* cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:arm64:* cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:arm64:* cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_11_25h2:*:*:*:*:*:*:arm64:* cpe:2.3:o:microsoft:windows_11_25h2:*:*:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_11_26h1:*:*:*:*:*:*:arm64:* cpe:2.3:o:microsoft:windows_11_26h1:*:*:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:* |
|
| Vendors & Products |
Microsoft windows Server 2022 23h2
|
Wed, 13 May 2026 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 13 May 2026 10:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Microsoft windows 10 21h2
Microsoft windows 10 22h2 Microsoft windows 11 22h3 Microsoft windows 11 23h2 Microsoft windows 11 24h2 Microsoft windows 11 25h2 Microsoft windows 11 26h1 Microsoft windows Server 2012 (server Core Installation) Microsoft windows Server 2012 R2 Microsoft windows Server 2012 R2 (server Core Installation) Microsoft windows Server 2016 (server Core Installation) Microsoft windows Server 2019 (server Core Installation) Microsoft windows Server 2022, 23h2 Edition (server Core Installation) Microsoft windows Server 2025 (server Core Installation) |
|
| Vendors & Products |
Microsoft windows 10 21h2
Microsoft windows 10 22h2 Microsoft windows 11 22h3 Microsoft windows 11 23h2 Microsoft windows 11 24h2 Microsoft windows 11 25h2 Microsoft windows 11 26h1 Microsoft windows Server 2012 (server Core Installation) Microsoft windows Server 2012 R2 Microsoft windows Server 2012 R2 (server Core Installation) Microsoft windows Server 2016 (server Core Installation) Microsoft windows Server 2019 (server Core Installation) Microsoft windows Server 2022, 23h2 Edition (server Core Installation) Microsoft windows Server 2025 (server Core Installation) |
Tue, 12 May 2026 17:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Native WiFi Miniport Driver allows an unauthorized attacker to execute code over an adjacent network. | |
| Title | Windows Native WiFi Miniport Driver Remote Code Execution Vulnerability | |
| First Time appeared |
Microsoft
Microsoft windows 10 1607 Microsoft windows 10 1809 Microsoft windows 10 21h2 Microsoft windows 10 22h2 Microsoft windows 11 23h2 Microsoft windows 11 24h2 Microsoft windows 11 25h2 Microsoft windows 11 26h1 Microsoft windows Server 2012 Microsoft windows Server 2012 R2 Microsoft windows Server 2016 Microsoft windows Server 2019 Microsoft windows Server 2022 Microsoft windows Server 2025 Microsoft windows Server 23h2 |
|
| Weaknesses | CWE-362 CWE-416 |
|
| CPEs | cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:* cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:* cpe:2.3:o:microsoft:windows_10_21H2:*:*:*:*:*:*:x86:* cpe:2.3:o:microsoft:windows_10_22H2:*:*:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_11_23H2:*:*:*:*:*:*:arm64:* cpe:2.3:o:microsoft:windows_11_23H2:*:*:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_11_24H2:*:*:*:*:*:*:arm64:* cpe:2.3:o:microsoft:windows_11_25H2:*:*:*:*:*:*:arm64:* cpe:2.3:o:microsoft:windows_11_26H1:*:*:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_server_2012_R2:*:*:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_server_23h2:*:*:*:*:*:*:*:* |
|
| Vendors & Products |
Microsoft
Microsoft windows 10 1607 Microsoft windows 10 1809 Microsoft windows 10 21h2 Microsoft windows 10 22h2 Microsoft windows 11 23h2 Microsoft windows 11 24h2 Microsoft windows 11 25h2 Microsoft windows 11 26h1 Microsoft windows Server 2012 Microsoft windows Server 2012 R2 Microsoft windows Server 2016 Microsoft windows Server 2019 Microsoft windows Server 2022 Microsoft windows Server 2025 Microsoft windows Server 23h2 |
|
| References |
| |
| Metrics |
cvssV3_1
|
Subscriptions
Status: PUBLISHED
Assigner: microsoft
Published:
Updated: 2026-05-15T17:13:45.965Z
Reserved: 2026-03-10T23:09:43.265Z
Link: CVE-2026-32161
Updated: 2026-05-13T10:00:10.895Z
Status : Analyzed
Published: 2026-05-12T18:16:57.290
Modified: 2026-05-14T14:54:15.077
Link: CVE-2026-32161
No data.
OpenCVE Enrichment
Updated: 2026-05-13T10:00:10Z