Windows UPnP Device Host Untrusted Pointer Dereference Vulnerability (CVE-2026-27920)
CVE-2026-27920 is a local privilege escalation vulnerability in the Windows Universal Plug and Play (UPnP) Device Host due to an untrusted pointer dereference.
CVE-2026-27920 is a vulnerability affecting the Windows Universal Plug and Play (UPnP) Device Host. This vulnerability stems from an untrusted pointer dereference, which could allow an attacker with local access and authorization to escalate their privileges on the system. The vulnerability was published on April 14, 2026. An attacker who successfully exploits this vulnerability could gain higher-level access to the system potentially leading to complete system compromise. This privilege escalation could be leveraged to install programs, view, change, or delete data, or create new accounts with full user rights.
Attack Chain
- An attacker gains initial local access to a Windows system.
- The attacker identifies that the Windows UPnP Device Host service is running.
- The attacker crafts a malicious request leveraging the UPnP service.
- The malicious request triggers the untrusted pointer dereference in the UPnP Device Host.
- This dereference allows the attacker to overwrite critical system memory.
- The attacker overwrites memory with a payload designed to inject code into a privileged process.
- The injected code executes with elevated privileges, such as SYSTEM.
- The attacker now has the ability to perform actions with elevated permissions.
Impact
Successful exploitation of CVE-2026-27920 allows a local attacker to elevate their privileges to SYSTEM. This gives the attacker complete control over the affected system. The number of potential victims includes any Windows system with the UPnP Device Host enabled. The impact includes data exfiltration, malware installation, and complete system compromise, which can result in significant financial and reputational damage.
Recommendation
- Monitor for suspicious process creations originating from the
svchost.exeprocess hosting the UPnP Device Host service to detect potential exploitation attempts. - Apply the patch provided by Microsoft for CVE-2026-27920 to remediate the vulnerability.
- Enable process creation logging to capture command-line arguments for
svchost.exe, which is required for the provided Sigma rule to function effectively.
Detection coverage 2
Suspicious Svchost Child Process Creation
highDetects suspicious child processes created by svchost.exe which may indicate privilege escalation attempts.
UPnP Device Host Service Executing Suspicious Binary
highDetects the Windows UPnP Device Host Service (svchost.exe -k LocalServiceNetworkRestricted) spawning cmd.exe, powershell.exe, or other suspicious binaries.
Detection queries are kept inside the platform. Get full rules →
Indicators of compromise
2
| Type | Value |
|---|---|
| [email protected] | |
| [email protected] |