<?xml version="1.0" encoding="UTF-8"?>
<VrdaData refvuldefversion="1.2" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://vrda.jpcert.or.jp" xsi:schemaLocation="http://vrda.jpcert.or.jp/feed/xsd/vrda_data.xsd">
  <VrdaDataProvider>
    <Name>JVN iPedia</Name>
    <URL>http://jvndb.jvn.jp</URL>
  </VrdaDataProvider>
  <VrdaDataSourceType>Advisory</VrdaDataSourceType>
  <Vulinfo revisionno="1" lang="en" invalidated="false">
    <VulinfoID>JVNDB-2026-003585</VulinfoID>
    <VulinfoData>
      <Title>&#12510;&#12452;&#12463;&#12525;&#12477;&#12501;&#12488;&#12398;Microsoft Windows Server 2016&#31561;&#12398;&#35079;&#25968;&#35069;&#21697;&#12395;&#12362;&#12369;&#12427;&#35299;&#25918;&#28168;&#12415;&#12513;&#12514;&#12522;&#12398;&#20351;&#29992;&#12395;&#38306;&#12377;&#12427;&#33030;&#24369;&#24615;</Title>
      <VulinfoDescription>
        <Overview>Windows&#12463;&#12521;&#12473;&#12479;&#12463;&#12521;&#12452;&#12450;&#12531;&#12488;&#12398;&#12501;&#12455;&#12452;&#12523;&#12458;&#12540;&#12496;&#12540;&#12395;&#12362;&#12369;&#12427;Use after free&#12398;&#33030;&#24369;&#24615;&#12395;&#12424;&#12426;&#12289;&#35469;&#35388;&#12373;&#12428;&#12383;&#25915;&#25731;&#32773;&#12364;&#12525;&#12540;&#12459;&#12523;&#12391;&#27177;&#38480;&#12434;&#26119;&#26684;&#12373;&#12379;&#12427;&#12371;&#12392;&#12364;&#21487;&#33021;&#12392;&#12394;&#12426;&#12414;&#12377;&#12290;</Overview>
      </VulinfoDescription>
      <Affected>
        <AffectedItem affectedstatus="vulnerable">
          <Lapt>cpe:/o:microsoft:windows_server_2016</Lapt>
        </AffectedItem>
        <AffectedItem affectedstatus="vulnerable">
          <Lapt>cpe:/o:microsoft:windows_server_2019</Lapt>
        </AffectedItem>
        <AffectedItem affectedstatus="vulnerable">
          <Lapt>cpe:/o:microsoft:windows_server_2022</Lapt>
        </AffectedItem>
        <AffectedItem affectedstatus="vulnerable">
          <Lapt>cpe:/o:microsoft:windows_server_2022_23h2</Lapt>
        </AffectedItem>
        <AffectedItem affectedstatus="vulnerable">
          <Lapt>cpe:/o:microsoft:windows_server_2025</Lapt>
        </AffectedItem>
      </Affected>
      <FactAnalysis>
      </FactAnalysis>
      <Related>
        <RelatedItem relationtype="self" origin="jvnipedia">
          <URL>https://jvndb.jvn.jp/ja/contents/2026/JVNDB-2026-003585.html</URL>
        </RelatedItem>
        <RelatedItem relationtype="alternate" origin="other">
          <Name>Common Vulnerabilities and Exposures (CVE)</Name>
          <VulinfoID>CVE-2026-21251</VulinfoID>
          <URL>https://www.cve.org/CVERecord?id=CVE-2026-21251</URL>
        </RelatedItem>
        <RelatedItem relationtype="alternate" origin="other">
          <Name>National Vulnerability Database (NVD)</Name>
          <VulinfoID>CVE-2026-21251</VulinfoID>
          <URL>https://nvd.nist.gov/vuln/detail/CVE-2026-21251</URL>
        </RelatedItem>
        <RelatedItem relationtype="alternate" origin="other">
          <Name>Security Update Guide</Name>
          <VulinfoID>CVE-2026-21251 - &#12475;&#12461;&#12517;&#12522;&#12486;&#12451;&#26356;&#26032;&#12503;&#12525;&#12464;&#12521;&#12512; &#12460;&#12452;&#12489; - Microsoft - Cluster Client Failover (CCF) &#12398;&#29305;&#27177;&#12398;&#26119;&#26684;&#12398;&#33030;&#24369;&#24615;</VulinfoID>
          <URL>https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21251</URL>
        </RelatedItem>
        <RelatedItem relationtype="reference" origin="other">
          <Name>JVNDB</Name>
          <VulinfoID>CWE-416</VulinfoID>
          <Title>&#35299;&#25918;&#28168;&#12415;&#12513;&#12514;&#12522;&#12398;&#20351;&#29992;</Title>
          <URL>https://cwe.mitre.org/data/definitions/416.html</URL>
        </RelatedItem>
      </Related>
      <DateFirstPublished>2026-02-13T17:01:01+09:00</DateFirstPublished>
      <DateLastUpdated>2026-02-13T17:01:01+09:00</DateLastUpdated>
    </VulinfoData>
  </Vulinfo>
</VrdaData>
