VulnerabilitiesHIGH

Windows Vulnerability - RegPwn Enables Full System Access

🎯

Basically, a flaw in Windows lets users gain full control of the system.

Quick Summary

A high-severity Windows vulnerability, RegPwn, allows low-privileged users to gain full SYSTEM access. This flaw poses significant risks, making it crucial for users to apply the latest patches. Stay informed and secure your systems against this exploit.

The Flaw

The newly discovered Windows vulnerability, dubbed RegPwn (CVE-2026-24291), is an elevation-of-privilege flaw that permits low-privileged users to gain full SYSTEM access. Discovered by the MDSec red team, this vulnerability has been in use since January 2025 during their internal engagements. It was recently patched in a Microsoft security update. The attack exploits the way Windows manages accessibility features, allowing attackers to manipulate system settings.

When a user activates tools like the On-Screen Keyboard, Windows creates a registry key to store configurations. This key inadvertently grants full control to the logged-in user. The flaw becomes evident when these user-controlled settings interact with the Windows Secure Desktop, which is meant to safeguard sensitive operations like prompting for administrator credentials. This misconfiguration creates a dangerous pathway for exploitation.

What's at Risk

The vulnerability allows attackers to execute arbitrary commands with SYSTEM privileges. By modifying their user-level accessibility registry key, an attacker can insert an opportunistic lock (oplock) on a system file. When the user locks their workstation, the system momentarily pauses, providing the attacker a narrow window to exploit the flaw. This can lead to unauthorized access to sensitive areas of the Windows registry, allowing for significant control over the system.

In MDSec's proof-of-concept, they demonstrated how to overwrite the execution path of a system service, effectively granting them a SYSTEM-level command prompt. This level of access can lead to further exploitation, including the installation of malware or data exfiltration.

Patch Status

Microsoft has addressed CVE-2026-24291 as part of its regular Patch Tuesday updates. System administrators are strongly encouraged to apply the latest updates to mitigate this local privilege escalation vulnerability. The patch aims to close the loophole that allows low-privileged users to gain unauthorized access to SYSTEM-level functionalities. It is crucial for organizations to stay vigilant and ensure their systems are up-to-date.

For those interested in understanding the exploit, MDSec has made the RegPwn exploit code publicly available on GitHub. This move allows security researchers to study the vulnerability and its implications further, contributing to the overall cybersecurity knowledge base.

Immediate Actions

To protect your systems from this vulnerability, it is imperative to:

  • Apply the latest Windows updates immediately to close the exploit.
  • Monitor user access to ensure no unauthorized changes are made to system settings.
  • Educate users about the risks associated with enabling accessibility features, as these can be manipulated by attackers.

By taking these steps, organizations can significantly reduce their risk exposure and safeguard their systems against potential exploitation of the RegPwn vulnerability.

🔒 Pro insight: The RegPwn vulnerability highlights critical flaws in Windows accessibility management, necessitating immediate patching to prevent exploitation.

Original article from

Cyber Security News · Abinaya

Read Full Article

Related Pings

HIGHVulnerabilities

iOS Vulnerabilities - DarkSword Exploit Kit Uncovered

A new exploit kit, DarkSword, targets iOS vulnerabilities for surveillance. Millions of iPhones are potentially compromised. Users must update their devices to stay safe.

SecurityWeek·
MEDIUMVulnerabilities

UIDAI - Launches Bug Bounty Programme for Aadhaar Security

UIDAI has launched a Bug Bounty Programme to enhance Aadhaar security. This initiative invites experts to identify vulnerabilities in the system. It's crucial for protecting the personal data of over a billion residents.

Cyber Security News·
HIGHVulnerabilities

Ubuntu Vulnerability - Local Attackers Can Gain Root Access

A critical vulnerability in Ubuntu allows local attackers to gain root access. This flaw affects users of Ubuntu Desktop 24.04 and newer. Immediate updates are essential to protect against potential system compromise.

Infosecurity Magazine·
HIGHVulnerabilities

Vulnerabilities - Claude Users Face Data Theft Risks

A trio of vulnerabilities in Claude could expose users to data theft. This flaw allows attackers to exploit Google searches, threatening enterprise networks. Stay vigilant and watch for updates.

Dark Reading·
CRITICALVulnerabilities

Critical Vulnerability - Unpatched Flaw in Telnetd Exposed

A critical flaw in GNU InetUtils telnetd has been discovered, allowing remote attackers to execute code with elevated privileges. This affects all versions, posing severe risks to systems. Users are urged to disable Telnet services until a patch is available to avoid exploitation.

Security Affairs·
HIGHVulnerabilities

WebKit Vulnerability - Apple Patches Critical Security Flaw

Apple has issued critical patches for a serious WebKit vulnerability affecting iOS and macOS. This flaw allows malicious content to bypass security measures, risking user data. Immediate updates are essential to protect against potential attacks.

Cyber Security News·