CTI Swarm
Zurück zu allen Deep Dives
ZERO DAY INITIATIVE - BLOG

CVE-2026-33824: Remote Code Execution in Windows IKEv2

CRITICAL Microsoft CVE-2026-33824 IKEv2 Windows RCE

Strategische Zusammenfassung

IKEv2-RCE bedroht VPN-Infrastruktur und Remote-Access-Systeme; kritisch für Windows Server 2022/2019 in DACH-Umgebungen mit verteilten Standorten.

Relevanz für Joel Traber

IKEv2-RCE bedroht VPN-Infrastruktur und Remote-Access-Systeme; kritisch für Windows Server 2022/2019 in DACH-Umgebungen mit verteilten Standorten.

Volltext

Title: Zero Day Initiative — CVE-2026-33824: Remote Code Execution in Windows IKEv2

URL Source: https://www.thezdi.com/blog/2026/4/22/cve-2026-33824-remote-code-execution-in-windows-ikev2

Published Time: 2026-04-23T10:42:11-0500

Markdown Content: # Zero Day Initiative — CVE-2026-33824: Remote Code Execution in Windows IKEv2

Menu

* [PRIVACY](https://www.trendmicro.com/privacy) * [WHO WE ARE](https://www.thezdi.com/about/) * [HOW IT WORKS](https://www.thezdi.com/about/benefits/) * [BLOG](https://www.thezdi.com/blog/) * [ADVISORIES](https://www.thezdi.com/advisories/) * [LOG IN](https://www.thezdi.com/portal/)[SIGN UP](https://www.thezdi.com/portal/register/)

Menu

* [PRIVACY](https://www.trendmicro.com/privacy/) * [WHO WE ARE](https://www.thezdi.com/about/) * [HOW IT WORKS](https://www.thezdi.com/about/benefits/) * [BLOG](https://www.thezdi.com/blog/) * [ADVISORIES](https://www.thezdi.com/advisories/) * [LOG IN](https://www.thezdi.com/portal/) * [SIGN UP](https://www.thezdi.com/portal/register/)

* *

# CVE-2026-33824: Remote Code Execution in Windows IKEv2

April 23, 2026 | TrendAI Research Team

[SUBSCRIBE](https://www.zerodayinitiative.com/rss/)

_In this excerpt of a TrendAI Research Services vulnerability report, Richard Chen and Lucas Miller of the TrendAI Research team detail a recently patched double free vulnerability in the Windows Internet Key Exchange (IKE) service. This bug was originally discovered by_ _WARP & MORSE team at Microsoft. Successful exploitation could result in a crash of the IKEEXT service, or potentially arbitrary code execution. The following is a portion of their write-up covering CVE-2026-33824, with a few minimal modifications._

* * *

A double free vulnerability has been reported in the Windows Internet Key Exchange (IKEv2) service. The vulnerability is due to an error when processing fragments.

An unauthenticated, remote attacker could exploit this vulnerability by sending crafted packets to the target server. Successful exploitation could result in a crash of the IKEEXT service, or potentially arbitrary code execution.

**The Vulnerability**

Microsoft Windows is an operating system which includes both server and desktop components along with an easy-to-use GUI. All currently supported versions of Windows include Internet Key Exchange Protocol Extensions to support the Virtual Private Network (VPN) feature.

The VPN feature of Windows encrypts communication between hosts. ISAKMP is a negotiation protocol used by IPsec-enabled hosts to build a security association. It uses the [Internet Key Exchange (IKE) Protocol](https://datatracker.ietf.org/doc/html/rfc7296) in order to negotiate keys for encrypted communication. IKE has two versions: IKEv1 and IKEv2. IKE version 1 (IKEv1) and version 2 (IKEv2) messages have the following general format:

This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. [Learn more about bidirectional Unicode characters](https://github.co/hiddenchars)

[Show hidden characters](https://www.thezdi.com/blog/2026/4/22/%7B%7B%20revealButtonHref%20%7D%7D)

Field Length (Bytes) Description ----------------------------------------------------------------------- IKE […]

[… 8,815 Zeichen — nächste Zone: keyword-dense paragraphs …]

__int64 IkeReinjectReassembledPacket{ void *pFragList, __int64 pMMSA, __int64 *pFragContext, __int64 pMMSACtx} { IKE_RECV_CONTEXT recvCtx; memset(&recvCtx, 0, 0xF0); dwReassembledSize = 0; status = WfpMemAlloc(pFragList->dwTotalSize); if ( !status ) { // Copy of fragment context fields (0xA8 bytes) recvCtx.sourceAddr = pFragContext[0]; // +0x00: source address [ ...address and metadata fields copied via SSE moves... ] recvCtx.destAddr = pFragContext[3]; // +0x30: dest address [ ...continued... ] recvCtx.pRealmBlobData_VULN = pFragContext[9]; // +0x90: SHALLOW COPY of blob ptr recvCtx.pMMSACtxData = pFragContext[20]; // +0xA0: MMSA context // Reassemble fragments into a single contiguous buffer pCurEntry = pFragList->pHead; pReassembledBuf = recvCtx.pReassembledBuf; while ( pCurEntry != pFragList ) { status = WfpUINT32Add(dwReassembledSize, pCurEntry->dwDataSize, &tmp); if ( status ) goto cleanup; memcpy(pReassembledBuf + dwReassembledSize, pCurEntry->pData, pCurEntry->dwDataSize); dwReassembledSize += pCurEntry->dwDataSize; pCurEntry = pCurEntry->pFlink; } [ ...IKEv2 header fixup omitted for readability... ] // Re-queue reassembled packet for IKEv2 processing status = IkeQueueRecvRequest(&recvCtx, 1); } cleanup: WfpMemFree(&recvCtx.pReassembledBuf); // FREE #1 PATH: ClearFragList iterates the fragment list ClearFragList(pFragList); if ( status ) WfpReportError(status, "IkeReinjectReassembledPacket"); return status; } __int64 IkeQueueRecvRequest(__int64 pRecvCtx, int a2) { status = WfpMemAlloc(0xF0); // Allocate heap work item if ( status ) goto error; pWorkItem = pWorkItemAlloc; // Shallow copy of entire IKE_RECV_CONTEXT (0xF0 bytes) into heap // work item. *(OWORD *)pWorkItem = *(OWORD *)pRecvCtx; // +0x00 *(OWORD *)(pWorkItem + 1) = *(OWORD *)(pRecvCtx + 1); // +0x10 [ ...14 more 16-byte copies... ] *(OWORD *)(pWorkItem + 14) = *(OWORD *)(pRecvCtx + 14);// +0xE0 // Deep-copy the reassembly buffer (offset +0x10) status = WfpMemAlloc(*(DWORD *)(pRecvCtx + 24)); [ ...memcpy of reassembly buffer... ] // Queue for thread pool processing IkeQueueWorkItem(IkeHandleRecvRequest, pWorkItem); [ ...

This vulnerability was [patched](https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2026-33824) by Microsoft in the April 2026 release cycle. They do note two mitigations that could prevent exploitation while the patch is being tested and deployed.

A remote, una […]

[… 8,284 Zeichen — nächste Zone: tail …]

The threat research team will be back with other great vulnerability analysis reports in the future. Until then, follow the team on [Twitter](https://www.twitter.com/thezdi), [Mastodon](https://infosec.exchange/@thezdi), [LinkedIn](https://www.linkedin.com/company/zerodayinitiative), or [Bluesky](https://bsky.app/profile/thezdi.bsky.social) for the latest in exploit techniques and security patches.

* [Windows](https://www.thezdi.com/blog/tag/Windows) * [IKE](https://www.thezdi.com/blog/tag/IKE) * [Research](https://www.thezdi.com/blog/tag/Research)

### General Inquiries

[zdi@trendmicro.com](mailto:zdi@trendmicro.com)

### Find us on X

[@thezdi](https://twitter.com/thezdi)

### Find us on Mastodon

[Mastodon](https://infosec.exchange/@thezdi)

### Media Inquiries

[media_relations@trendmicro.com](mailto:media_relations@trendmicro.com)

### Sensitive Email Communications

[PGP Key](https://www.zerodayinitiative.com/documents/zdi-pgp-key.asc)

[WHO WE ARE](https://www.thezdi.com/about/) * [Our Mission](https://www.thezdi.com/about/) * [TrendAI](https://www.trendmicro.com/) * [TippingPoint IPS](https://www.trendmicro.com/en_us/business/products/network/integrated-atp/next-gen-intrusion-prevention-system.html)

[HOW IT WORKS](https://www.thezdi.com/about/benefits/) * [Process](https://www.thezdi.com/about/benefits/#process) * [Researcher Rewards](https://www.thezdi.com/about/benefits/#researcher-rewards) * [FAQS](https://www.thezdi.com/about/faq/) * [Privacy](https://www.trendmicro.com/privacy/)

[ADVISORIES](https://www.thezdi.com/advisories) * [Published Advisories](https://www.thezdi.com/advisories/published) * [Upcoming Advisories](https://www.thezdi.com/advisories/upcoming) * [RSS Feeds](https://www.thezdi.com/rss)

[BLOG](https://www.thezdi.com/blog)

Erwähnte CVEs