CVE-2026-33827: Windows TCP/IP Stack RCE — Unauthenticated, Wormable [Critical · CVSS 9.8]

CRITICAL
CVSS 9.8
⚠ WORMABLE
Published April 19, 2026

CVE-2026-33827

A critical unauthenticated remote code execution vulnerability in the Windows TCP/IP stack.

Analysed by Sujit Mahakhud · Microsoft Sentinel Specialist · secbyte.in  |  April 19, 2026

⚡ Executive Summary

A critical unauthenticated RCE vulnerability in the Windows TCP/IP stack (CVE-2026-33827, CVSS 9.8) allows attackers to execute arbitrary code with SYSTEM privileges by sending specially crafted network packets. No authentication or user interaction is required, making this wormable.

🎯 Attack Vector: Network
🔑 Auth Required: None
👤 User Interaction: None
9.8
CVSS Score
Network
Attack Vector
Low
Complexity
None
Privileges
None
User Inter.
Unchanged
Scope

🔬 Technical Details

A critical unauthenticated remote code execution vulnerability exists in the Windows TCP/IP stack. An unauthenticated attacker can send specially crafted packets to a target system, triggering memory corruption in the kernel-mode driver and achieving arbitrary code execution with SYSTEM privileges. No user interaction is required, making this suitable for wormable exploitation across unpatched networks.

CVE ID CVE-2026-33827
CVSS Score 9.8 (CRITICAL)
Vector String CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Confidentiality High
Integrity High
Availability High
Published April 19, 2026
Weakness CWE-122 CWE-787

🎯 Impact Assessment

High
Confidentiality
High
Integrity
High
Availability

If exploited: Full system compromise, data theft, lateral movement, ransomware deployment. No authentication or user interaction required — suitable for wormable propagation across unpatched networks. Patch immediately.

🛡 Microsoft Sentinel KQL Detection

Table: DeviceProcessEvents

// CVE-2026-33827 — Wormable RCE Detection via Suspicious Process Spawning
DeviceProcessEvents
| where TimeGenerated > ago(24h)
// Services commonly abused by TCP/IP stack exploits
| where InitiatingProcessFileName in~ (
    "svchost.exe", "System", "smss.exe", "lsass.exe"
  )
// Post-exploitation child processes — should NEVER spawn from kernel services
| where FileName in~ (
    "cmd.exe", "powershell.exe", "pwsh.exe",
    "net.exe", "whoami.exe", "certutil.exe", "bitsadmin.exe",
    "regsvr32.exe", "mshta.exe", "wscript.exe"
  )
| extend CVE = "CVE-2026-33827"
| project
    TimeGenerated, DeviceName, CVE,
    ParentProcess = InitiatingProcessFileName,
    ChildProcess  = FileName,
    CommandLine   = ProcessCommandLine,
    AccountName
| sort by TimeGenerated desc

💡 Deploy in Sentinel → Analytics → Create rule. Tune threshold to your environment.

🔧 Mitigation & Recommendations

  1. Step 1: Apply the Microsoft security patch immediately via Windows Update or WSUS. Refer to the official MSRC advisory for patch details.
  2. Step 2: Restrict inbound TCP traffic to affected systems using firewall rules. Block unnecessary exposure to the internet until patching is confirmed.
  3. Step 3: Deploy the KQL detection query above in Microsoft Sentinel → Analytics. Set alert frequency to every 5 minutes given the Critical severity.
  4. Step 4: Treat as P1 incident. Activate your vulnerability management process, notify stakeholders, and target full patch deployment within 24–48 hours.
  5. Step 5: If immediate patching is not possible, isolate affected hosts or disable the vulnerable service as a compensating control until patching is complete.
S

Sujit Mahakhud

Microsoft Sentinel Specialist · secbyte.in

Sujit is a cybersecurity practitioner with 31+ years of experience, specialising in Microsoft Sentinel, SOC operations, and enterprise threat detection. He helps security teams cut through noise and focus on real threats.

Leave a Reply