CVE-2026-34329 Overview
CVE-2026-34329 is a heap-based buffer overflow [CWE-122] in the Windows Message Queuing (MSMQ) service. An unauthenticated attacker on an adjacent network can send crafted messages to a vulnerable MSMQ endpoint and trigger memory corruption that leads to remote code execution. The flaw affects supported Windows 10, Windows 11, and Windows Server releases that have the MSMQ feature enabled.
Exploitation requires no user interaction and no prior authentication. Successful exploitation grants code execution in the context of the MSMQ service, which typically runs with elevated privileges.
Critical Impact
An adjacent-network attacker can achieve unauthenticated remote code execution against any Windows host with MSMQ enabled, providing a foothold for lateral movement across broadcast and VLAN segments.
Affected Products
- Microsoft Windows 10 (versions 1607, 1809, 21H2, 22H2)
- Microsoft Windows 11 (versions 23H2, 24H2, 25H2, 26H1)
- Microsoft Windows Server 2012, 2016, 2019, 2022, 2022 23H2, and 2025
Discovery Timeline
- 2026-05-12 - CVE-2026-34329 published to NVD
- 2026-05-14 - Last updated in NVD database
Technical Details for CVE-2026-34329
Vulnerability Analysis
The vulnerability resides in the Windows Message Queuing service, which handles asynchronous message delivery between distributed applications. The service parses incoming MSMQ protocol packets and allocates buffers on the heap to hold message payload data and metadata. Insufficient validation of attacker-controlled length fields allows a crafted packet to write beyond the bounds of a heap allocation.
The corruption primitive enables overwriting adjacent heap metadata or function pointers. An attacker can use this to redirect execution flow and run arbitrary code inside the mqsvc.exe process context. Because MSMQ runs as a system-level service, code execution typically yields high integrity privileges.
The attack vector is adjacent network only, meaning the attacker must be on the same logical network segment as the target. This includes the same subnet, VLAN, or broadcast domain.
Root Cause
The root cause is improper bounds checking when parsing MSMQ packet structures. A size value supplied within the inbound message is trusted without validation against the actual destination buffer size, resulting in a classic heap-based buffer overflow [CWE-122].
Attack Vector
MSMQ listens on TCP port 1801 and additional ports for RPC and multicast traffic. An attacker on the adjacent network sends a malformed MSMQ protocol message to a host where the Message Queuing Windows feature is installed and running. No authentication is required. The single crafted message corrupts the heap and triggers code execution. The vulnerability cannot be reached from the internet unless TCP 1801 is exposed externally, which Microsoft does not recommend.
No public proof-of-concept exploit has been published, and the EPSS score remains low at the time of disclosure.
Detection Methods for CVE-2026-34329
Indicators of Compromise
- Unexpected child processes spawned by mqsvc.exe, particularly command shells, rundll32.exe, or PowerShell instances.
- Crashes or restarts of the Message Queuing service logged under Windows Event ID 7031 or 7034 for the MSMQ service.
- Outbound network connections initiated by mqsvc.exe to non-MSMQ destinations.
Detection Strategies
- Monitor process lineage for mqsvc.exe and alert on any non-standard child process creation.
- Inspect inbound traffic to TCP port 1801 for malformed MSMQ headers, oversized length fields, or anomalous payload sizes.
- Hunt for memory injection or thread creation events originating from the MSMQ service process.
Monitoring Recommendations
- Enable Sysmon Event IDs 1 (process create), 3 (network connect), and 8 (CreateRemoteThread) and forward to a centralized SIEM.
- Audit hosts running the Message Queuing Windows feature and track patch compliance for each.
- Baseline normal MSMQ traffic volume per host and alert on deviations that may indicate scanning or exploitation attempts.
How to Mitigate CVE-2026-34329
Immediate Actions Required
- Apply the Microsoft security update for CVE-2026-34329 to all affected Windows 10, Windows 11, and Windows Server systems.
- Inventory all hosts that have the Message Queuing feature installed using Get-WindowsFeature MSMQ or equivalent tooling.
- Restrict inbound TCP 1801 traffic to trusted hosts only via host and network firewalls.
Patch Information
Microsoft has released updates addressing this vulnerability. Refer to the Microsoft Vulnerability Advisory for the specific KB articles and download links applicable to each affected Windows build.
Workarounds
- Disable the Message Queuing Windows feature on hosts that do not require it. This removes the attack surface entirely.
- Block TCP port 1801 inbound at the host firewall on systems where MSMQ must remain enabled but is only used locally.
- Segment MSMQ-enabled hosts into isolated VLANs to reduce adjacent-network exposure.
# Check whether the Message Queuing feature is installed
Get-WindowsOptionalFeature -Online -FeatureName MSMQ-Server
# Disable Message Queuing if not required
Disable-WindowsOptionalFeature -Online -FeatureName MSMQ-Server -Remove
# Block inbound MSMQ traffic at the Windows firewall
New-NetFirewallRule -DisplayName "Block MSMQ Inbound TCP 1801" `
-Direction Inbound -Protocol TCP -LocalPort 1801 -Action Block
Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.


