Site icon Fix I.T. Phill – Your Go-To Tech Guru

Microsoft Defender CVE-2026-41091 and CVE-2026-45498: CISA KEV Patch Guide

Microsoft Defender CVE-2026-41091 CVE-2026-45498 CISA KEV Windows Server patch checklist

Microsoft Defender CVE-2026-41091 CVE-2026-45498 CISA KEV Windows Server patch checklist

Short version: CISA added two Microsoft Defender issues to the Known Exploited Vulnerabilities catalog on May 20, 2026: CVE-2026-41091 and CVE-2026-45498. That makes this more than a normal “wait for the next maintenance window” Defender update. Windows workstations, Windows Server systems, hosting support machines, RDS servers, IIS boxes, Hyper-V hosts, domain controllers, file servers, and backup servers should be checked for current Microsoft Defender engine and platform versions.

The practical job is simple: update Microsoft Defender, verify the engine and platform versions, make sure Windows Server roles are not stranded in passive or stale security-intelligence state, and document the machines that handle customer files. This is especially important for hosting shops because admin workstations and shared file paths often become the bridge between customer uploads, backups, support tooling, and server management.

What CISA Added

CISA also added several older Windows, DirectX, Internet Explorer, and Adobe Acrobat/Reader CVEs in the same feed update. Those older entries matter most for legacy desktops, old application islands, lab machines, unmanaged VDI images, and customer environments that still carry unsupported software. For current hosting operations, the Defender items are the part to handle first.

Who Should Prioritize This

Safe Version Checks

On Windows systems where Microsoft Defender is present, check the Defender platform, engine, and signature state. These commands are read-only except for the optional update command.

Get-MpComputerStatus | Select-Object AMProductVersion, AMEngineVersion, AntivirusSignatureVersion, AntivirusSignatureLastUpdated, RealTimeProtectionEnabled

If the machine is allowed to update directly from Microsoft or your managed update path, refresh Defender security intelligence and platform components:

Update-MpSignature

Then run the version check again. For CVE-2026-41091, the Microsoft Malware Protection Engine should be outside the affected range ending before 1.1.26040.8. For CVE-2026-45498, the Microsoft Defender Antimalware Platform should be outside the affected range ending before 4.18.26040.7.

Patch Paths That Actually Work

Reboot And Maintenance Planning

Defender security-intelligence updates often do not require the same kind of reboot planning as a Windows cumulative update, but hosting admins should still plan this like real maintenance. Some machines will need a restart because they are also missing monthly Windows updates, servicing stack updates, driver updates, or pending reboots from earlier work.

Post-Update Verification

What To Tell Customers

A clean customer note can be short: Microsoft Defender received updates for two issues that CISA now tracks as known exploited vulnerabilities. Hosting systems, support workstations, and Windows Server roles are being updated and verified. Customer sites do not need to change application code, but customers should keep their own Windows endpoints current if they use RDP, file managers, FTP clients, or website backup downloads.

Sources

Related Fix I.T. Phill Windows guidance: Microsoft Defender CVE-2026-33825 patch guide and Windows Shell CVE-2026-32202 server patch guide.

Bottom line: update Defender, verify the exact engine and platform versions, and do not let admin workstations or Windows Server roles sit behind stale Defender components just because the monthly cumulative update looks complete.

Exit mobile version