Windows RCE Vulnerability (CVE-2026-2999)
CVE-2026-2999
IDExpert Windows Logon Agent developed by Changing has a Remote Code Execution vulnerability, allowing unauthenticated remote attackers to force the system to download arbitrary executable files from ...
Overview
A critical security flaw has been identified in the IDExpert Windows Logon Agent, a software component developed by Changing. This vulnerability allows an unauthenticated attacker on the same network to remotely execute malicious code on affected Windows systems with high privileges.
Vulnerability Details
In simple terms, the IDExpert Logon Agent does not properly validate or restrict the sources from which it downloads files. An attacker can send a specially crafted network request to a vulnerable system, tricking the agent into downloading an arbitrary executable file-such as malware or ransomware-from an attacker-controlled server. The agent will then automatically execute that file. No username or password is required for this attack, making it particularly dangerous.
Impact Assessment
This is a Critical severity vulnerability with a CVSS score of 9.8. The potential impacts include:
- Full System Compromise: Attackers can gain complete control over the affected Windows machine.
- Malware Deployment: Systems can be infected with ransomware, spyware, or other malicious payloads.
- Lateral Movement: A compromised machine can be used as a foothold to attack other systems on the corporate network.
- Data Theft and Destruction: Sensitive data can be accessed, exfiltrated, or deleted.
Any system running a vulnerable version of the IDExpert Windows Logon Agent is at immediate risk.
Remediation and Mitigation
Primary Action: Patch Immediately Contact Changing directly for a patched version of the IDExpert Windows Logon Agent. Apply the update to all affected endpoints as a matter of highest priority. There is no workaround that fully eliminates the risk; patching is the only complete solution.
Immediate Mitigation Steps (If Patching is Delayed):
- Network Segmentation: Isolate systems running the vulnerable agent from untrusted networks, especially the internet. Restrict network access to these systems using firewalls to allow only essential, trusted communications.
- Monitor for Exploitation: Review network and host logs for unexpected outbound connections from affected systems to unknown external IP addresses, which may indicate an attempted download of a malicious payload.
General Recommendation: Organizations should inventory their assets to identify all installations of the IDExpert Windows Logon Agent and prioritize them for this emergency update.
Never miss a critical vulnerability
Get real-time security alerts delivered to your preferred platform.
Related Advisories
IDExpert Windows Logon Agent developed by Changing has a Remote Code Execution vulnerability, allowing unauthenticated remote attackers to force the system to download arbitrary DLL files from a remot...
External Control of File Name or Path in the Mail feature of Zoom Workplace for Windows before 6.6.0 may allow an unauthenticated user to conduct an escalation of privilege via network access....
OpenClaw versions prior to 2026.2.2 fail to properly validate Windows cmd.exe metacharacters in allowlist-gated exec requests, allowing attackers to bypass command approval restrictions. Remote attack...
Sensitive data disclosure and manipulation due to improper authentication. The following products are affected: Acronis Cyber Protect 16 (Linux, Windows) before build 39938, Acronis Cyber Protect 15 (...
Other Windows Vulnerabilities
External Control of File Name or Path in the Mail feature of Zoom Workplace for Windows before 6.6.0 may allow an unauthenticated user to conduct an escalation of privilege via network access....
Use after free in Windows Print Spooler Components allows an authorized attacker to execute code over a network....
OpenClaw versions prior to 2026.2.2 fail to properly validate Windows cmd.exe metacharacters in allowlist-gated exec requests, allowing attackers to bypass command approval restrictions. Remote attack...
An issue was discovered in 6.0 before 6.0.3, 5.2 before 5.2.12, and 4.2 before 4.2.29. `URLField.to_python()` in Django calls `urllib.parse.urlsplit()`, which performs NFKC normalization on Windows th...