Skip to content
Threat Feed
high advisory

CVE-2026-26179 Windows Kernel Double Free Privilege Escalation

CVE-2026-26179 is a double free vulnerability in the Windows Kernel, allowing a locally authenticated attacker to elevate privileges on the system.

CVE-2026-26179 is a critical security vulnerability residing within the Windows Kernel. This double-free vulnerability allows an attacker with local access to elevate their privileges. Successful exploitation grants the attacker higher-level permissions on the compromised system. The vulnerability was reported to Microsoft and assigned a CVSS v3.1 score of 7.8, indicating a high severity. The vulnerability lies within the core operating system components, making it a significant threat to Windows-based environments. Exploitation of this vulnerability requires an attacker to have valid local credentials on the target system. The vulnerability was published on 2026-04-14.

Attack Chain

  1. An attacker gains initial local access to a Windows system through legitimate credentials or by exploiting another vulnerability.
  2. The attacker crafts a malicious program designed to trigger the double-free condition in the Windows Kernel.
  3. The malicious program interacts with a vulnerable kernel function, likely through a specific system call (Nt*).
  4. The vulnerable kernel function attempts to free the same memory region twice due to a logical error.
  5. The double-free corrupts the kernel’s memory management structures, such as the heap metadata.
  6. The memory corruption allows the attacker to overwrite critical kernel data structures, such as process tokens or privilege attributes.
  7. The attacker modifies the process token of their own process, elevating their privileges to SYSTEM or another highly privileged account.
  8. The attacker now executes privileged commands and gains full control over the system.

Impact

Successful exploitation of CVE-2026-26179 allows a local attacker to elevate privileges to SYSTEM, the highest level of privilege on a Windows system. This grants the attacker complete control over the compromised machine, allowing them to install software, modify data, create new accounts, and access sensitive information. A successful privilege escalation can lead to a complete compromise of the confidentiality, integrity, and availability of the system. This vulnerability affects all Windows systems where the patch has not been applied.

Recommendation

  • Apply the security update provided by Microsoft to patch CVE-2026-26179 as soon as possible.
  • Monitor systems for unusual process creation events originating from user accounts, as this could be an indicator of exploit activity. Deploy the provided Sigma rule Detect Suspicious Process Token Modifications to identify potential privilege escalation attempts.
  • Enable process auditing and monitor for unusual system calls using tools like Sysmon to catch the initial exploitation attempts.
  • Regularly review and enforce the principle of least privilege to limit the impact of successful local exploits.
  • Deploy the Sigma rule Detect Double Free Vulnerability Exploitation to identify exploitation of double free vulnerabilities by monitoring process creation and memory allocation patterns.

Detection coverage 2

Detect Suspicious Process Token Modifications

high

Detects suspicious attempts to modify a process token, potentially indicating privilege escalation.

sigma tactics: privilege_escalation techniques: T1068 sources: process_creation, windows

Detect Double Free Vulnerability Exploitation

medium

Detects potential exploitation of double free vulnerabilities by monitoring process creation and memory allocation patterns.

sigma tactics: privilege_escalation techniques: T1068 sources: process_creation, windows

Detection queries are kept inside the platform. Get full rules →