Windows HTTP.sys Local Privilege Escalation Vulnerability (CVE-2026-21250)
A local privilege escalation vulnerability exists in Windows 11 24H2, Windows 11 25H2, and Windows Server 2022 23H2 due to improper handling of untrusted pointers in HTTP.sys via strcat truncation.
A local privilege escalation vulnerability, CVE-2026-21250, affects Windows 11 24H2 (10.0.26100.7780), Windows 11 25H2 (10.0.26200.7780), and Windows Server 2022 23H2 (10.0.25398.2148). The vulnerability lies in the HTTP.sys driver and is triggered by sending a specially crafted HTTP request to a local HTTP service. The vulnerability arises because the strcat() function truncates binary malicious pointers, causing incomplete delivery of the untrusted pointer to the HTTP.sys driver, potentially leading to a Blue Screen of Death (BSOD) or random memory access errors. Successful exploitation allows a local attacker to gain elevated privileges on the system.
Attack Chain
- An attacker gains local access to a vulnerable Windows system.
- The attacker starts the HTTP service (
net start http). - The attacker crafts a malicious HTTP GET request containing the
X-Trigger-Ptrheader with a specially crafted payload. - The attacker sends the malicious HTTP request to the local HTTP service (127.0.0.1:80).
- The
strcat()function within the HTTP.sys driver truncates the malicious pointer due to the presence of a null byte (0x00). - The truncated, untrusted pointer is passed to the HTTP.sys driver.
- The HTTP.sys driver attempts to dereference the truncated pointer.
- This leads to a Blue Screen of Death (BSOD) or random memory access errors, potentially leading to privilege escalation.
Impact
Successful exploitation of CVE-2026-21250 allows a local attacker to elevate their privileges on the targeted Windows system. While the provided exploit PoC focuses on triggering a BSOD, in a real-world scenario, the attacker could potentially leverage this vulnerability to gain SYSTEM privileges, leading to complete control over the compromised system.
Recommendation
- Monitor for suspicious HTTP requests with the
X-Trigger-Ptrheader using the Sigma rule provided below, specifically looking for truncated or malformed pointers (Sigma rule - “Detect Malicious HTTP Request to Trigger CVE-2026-21250”). - Apply available patches from Microsoft to address the underlying vulnerability in HTTP.sys (CVE-2026-21250).
- Implement network monitoring to detect unusual traffic patterns associated with the exploit, focusing on port 80 and HTTP GET requests (Sigma rule - “Detect HTTP Request with Malicious Pointer Payload”).
- Consider disabling the HTTP service if it is not required, reducing the attack surface.
- Enable enhanced logging for the HTTP service to capture detailed information about incoming requests and potential exploitation attempts (Log source: webserver).
Detection coverage 2
Detect Malicious HTTP Request to Trigger CVE-2026-21250
highDetects HTTP requests containing the X-Trigger-Ptr header, which is used in the CVE-2026-21250 exploit.
Detect HTTP Request with Malicious Pointer Payload
criticalDetects HTTP requests that have a malicious pointer payload within the X-Trigger-Ptr field.
Detection queries are available on the platform. Get full rules →