A critical unauthenticated remote code execution vulnerability in the Windows Internet Key Exchange (IKE) service demands immediate attention from every Windows-running organisation. CVE-2026-33824, patched in Microsoftβs April 2026 Patch Tuesday, carries a CVSS score of 9.8 and was confirmed as actively exploited before the patch was available β making it a zero-day in practice, even though Microsoft had not formally labelled it as such in its initial advisory.
What Was Found
The flaw resides in IKEEXT.dll, the Windows component responsible for managing IKEv2 key exchange operations used by VPN connections, site-to-site tunnels, and DirectAccess. A double-free condition (CWE-415) in the IKEEXT::ProcessIKEPayload function is triggered when the function processes malformed nested payloads within a sequence of SA_INIT packets containing an invalid combination of Notify and Proposal payloads. The resulting memory corruption can be leveraged by an attacker to achieve arbitrary code execution in the context of the IKEEXT service β which runs as NT AUTHORITY\SYSTEM.
Critically, the attack requires no authentication, no user interaction, and only network access to the target. An adversary anywhere on the internet can deliver a specially crafted sequence of UDP packets to exploit the vulnerability.
Why It Matters
The consequences of a successful exploit are total. SYSTEM-level access enables credential harvesting from LSASS memory, modification of security configurations, termination of endpoint detection and response (EDR) agents, and installation of persistent rootkits β all without any warning to the targeted user.
The affected surface is exceptionally broad. CVE-2026-33824 impacts Windows 10 (all supported editions including 1607, 1809, 21H2, and 22H2), Windows 11 (22H2 through 26H1), and Windows Server 2016, 2019, 2022, 23H2, and 2025. In practice, that means every modern Windows enterprise estate is exposed unless patched.
Active exploitation has been confirmed before the release of patches on 14 April 2026, indicating that at least one threat actor had operationalised the technique prior to the fix becoming available. The potential for widespread exploitation post-patch β as defenders race against attackers reverse-engineering the update β makes urgency critical.
Technical Detail
| Attribute | Detail |
|---|---|
| CVE | CVE-2026-33824 |
| CVSS v3.1 | 9.8 (CRITICAL) |
| Attack vector | Network (remote, no authentication) |
| Root cause | Double free (CWE-415) in IKE payload parsing |
| Service | IKEEXT.dll, runs as NT AUTHORITY\SYSTEM |
| Affected ports | UDP 500 (IKE), UDP 4500 (NAT-T) |
| Trigger | Malformed SA_INIT packets with invalid Notify+Proposal combo |
| Patched in | April 2026 Patch Tuesday (KB5082063, KB5082142, others per version) |
The IKEEXT service starts automatically on Windows systems where IKEv2 is enabled. Hosts that have not explicitly disabled this service β which includes the vast majority of enterprise Windows deployments β are exposed.
Recommended Actions
- Apply the April 2026 Patch Tuesday update immediately. All Windows 10, 11, and Server versions receive fixes for CVE-2026-33824. This is the only complete remediation.
- If patching is not immediately possible, block inbound traffic on UDP port 500 and UDP port 4500 at the network perimeter and on Windows Firewall for all hosts that do not require IKEv2 connectivity.
- For hosts requiring IKEv2, restrict inbound UDP 500/4500 to known peer IP addresses only. Remove any open-to-internet IKE access where it is not operationally necessary.
- Audit IKE service exposure using your vulnerability scanner or Intune/SCCM compliance policies β identify any internet-facing systems with IKEEXT running and unpatched.
- Review SIEM alerts for anomalous process creation under
svchost.exehosting IKEEXT, unexpected LSASS access, or suspicious outbound connectivity following IKEv2 SA negotiation attempts. - Prioritise Windows Server systems hosting VPN gateways, DirectAccess endpoints, or hybrid Azure connectivity β these are the most exposed and most valuable targets.
Broader Context
CVE-2026-33824 adds to a troubling pattern from Aprilβs Patch Tuesday, which also fixed the actively exploited SharePoint zero-day (CVE-2026-32201) and the BlueHammer Windows Defender privilege escalation (CVE-2026-33825). The simultaneous availability of a critical unauthenticated RCE and a reliable local privilege escalation tool means that an attacker who gains a foothold via any means and chains it with BlueHammer has an unobstructed path to SYSTEM. Patch both vulnerabilities as a combined priority, not in isolation.
The IKE service is a legacy VPN substrate that persists in enterprises as DirectAccess deployments age out β if your organisation has migrated to Always On VPN or cloud-based zero-trust access, confirm that IKEv2 is disabled on hosts that no longer require it. Reducing attack surface here has compounding security benefit beyond just this CVE.
Share this article