Windows Error Reporting Vulnerability Allows Attackers to Elevate Privileges

Windows Error Reporting Vulnerability Allows Attackers to Elevate Privileges
Windows Error Reporting Vulnerability Allows Attackers to Elevate Privileges
A serious flaw in Windows Error Reporting (WER) allows local attackers to gain SYSTEM privileges. CVE-2026-20817, patched in January 2026, scores 7.8 on CVSS v3.1 due to its high impact on confidentiality, integrity, and availability.

Vulnerability Basics

CVE-2026-20817 affects wersvc.dll in the WER service, which runs as NT AUTHORITYSYSTEM and handles crash reports via ALPC ports.

The issue, classified as CWE-280, stems from no permission checks on process creation requests from low-privilege users.

Attackers send crafted messages to spawn WerFault.exe or WerMgr.exe with a near-SYSTEM token, controlling the command line up to 520 bytes.

This local attack needs only standard user access, no interaction, making it ideal for post-compromise escalation.

The chain starts at CWerService::SvcElevatedLaunch, which opens the sender’s process without verifying privileges.

It calls ElevatedProcessStart to pull attacker-supplied command lines from shared memory, then UserTokenUtility::GetProcessToken.

Key step: GetProcessToken grabs the WER’s SYSTEM token, strips only SeTcbPrivilege via CreateRestrictedToken, and ignores the user’s token if unsuitable.

Finally, CreateElevatedProcessAsUser launches the process with this powerful token and attacker args.

Microsoft’s patch adds a feature flag in SvcElevatedLaunch to reject requests outright, disabling the exposed function.

Proof-of-concept demos on Windows 11 23H2 show standard users connecting to WER’s ALPC port, sending messages, and spawning SYSTEM processes with privileges like SeDebugPrivilege.

This enables credential theft, persistence, or full takeover when chained with other flaws. No wild exploits are confirmed yet.

Watch for WerFault.exe or WerMgr.exe with odd command lines or child processes from low-priv users (Event ID 4688).

Check for abnormal tokens lacking SeTcbPrivilege but holding others, plus WER directory changes.

Tools like Sysmon (Event ID 10) spot token tweaks; baselines help flag anomalies.

IndicatorEvent/SourceAction
Unusual WerFault.exe spawnSecurity 4688Alert
SYSTEM token sans SeTcbSysmon 10Investigate
Weird WER argsProcess auditBlock

Apply January 2026 patches via Windows Update immediately. If delayed, disable WerSvc: sc config WerSvc start=disabled; sc stop WerSvc.

Limit local logons, use app whitelisting, and monitor escalations. Test defenses with BAS tools simulating this attack.

Follow us on Google News , LinkedIn and X to Get More Instant UpdatesSet Cyberpress as a Preferred Source in Google.

The post Windows Error Reporting Vulnerability Allows Attackers to Elevate Privileges appeared first on Cyber Security News.


Discover more from RSS Feeds Cloud

Subscribe to get the latest posts sent to your email.

Discover more from RSS Feeds Cloud

Subscribe now to keep reading and get access to the full archive.

Continue reading