PT-2026-2667 · Microsoft · Windows
Denis Faiustov
+1
·
Published
2026-01-13
·
Updated
2026-03-02
·
CVE-2026-20817
CVSS v3.1
7.8
7.8
High
| Base vector | Vector | AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
Name of the Vulnerable Software and Affected Versions
Windows versions prior to January 2026 patches
Description
A flaw exists in the Windows Error Reporting Service (wersvc.dll) that allows a low-privileged user to exploit the ALPC (Asynchronous Procedure Call) interface. This allows the spawning of processes with near-SYSTEM-level privileges, leading to local privilege escalation to NT AUTHORITYSYSTEM. The root cause is a missing authorization check within the Windows Error Reporting service. Specifically, the service publishes an ALPC port without verifying client permissions. The
SvcElevatedLaunch function lacks privilege validation, enabling a low-privileged user to send an ALPC message containing a shared memory descriptor with an arbitrary command string. The service then duplicates the memory, reads the command string without validation, and, if unable to obtain a client token, falls back to creating a restricted SYSTEM token. This token retains critical privileges like SeDebugPrivilege, SeImpersonatePrivilege, and SeBackupPrivilege. Consequently, processes like WerFault.exe or WerMgr.exe are launched with SYSTEM privileges and the controlled command string. Successful exploitation results in full system compromise through local code execution with SYSTEM rights. The vulnerability affects all Windows systems globally.Recommendations
Apply Microsoft's January 2026 patches.
Exploit
Fix
LPE
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
BDU:2026-00482
CVE-2026-20817
Affected Products
Windows
References · 21
- 🔥 https://github.com/oxfemale/CVE-2026-20817 · Exploit
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20817 · Vendor Advisory
- https://bdu.fstec.ru/vul/2026-00482 · Security Note
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20817 · Security Note
- https://nvd.nist.gov/vuln/detail/CVE-2026-20817 · Security Note
- https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-20817 · Vendor Advisory
- https://twitter.com/ThreatSynop/status/2028490148539777514 · Twitter Post
- https://twitter.com/dailytechonx/status/2021607730536923174 · Twitter Post
- https://twitter.com/UndercodeUpdate/status/2021202194230612299 · Twitter Post
- https://twitter.com/krNeoTra/status/2020025130135781836 · Twitter Post
- https://twitter.com/ThreatSynop/status/2021219413110788106 · Twitter Post
- https://twitter.com/UndercodeUpdate/status/2024537646249152806 · Twitter Post
- https://t.me/poxek/5940 · Telegram Post
- https://twitter.com/ksg93rd/status/2027454568842289502 · Twitter Post
- https://twitter.com/Tinolle/status/2024585552637710571 · Twitter Post