Skip to content
Threat Feed
high advisory

CVE-2026-27910: Windows Installer Local Privilege Escalation

CVE-2026-27910 describes a local privilege escalation vulnerability in Windows Installer due to improper handling of insufficient permissions, allowing an authorized attacker to gain elevated privileges.

CVE-2026-27910 is a vulnerability within Windows Installer that stems from the improper handling of insufficient permissions or privileges. This flaw enables an attacker with local access and some level of authorization to elevate their privileges on the system. The vulnerability, reported on April 14, 2026, could be exploited by a malicious actor to gain administrative rights, potentially leading to unauthorized data access, system modification, or complete system compromise. The affected component is the Windows Installer service, and the attacker must have valid local credentials to initiate the exploit. Microsoft is the CNA for this vulnerability.

Attack Chain

  1. The attacker gains initial local access to the target system with limited privileges.
  2. The attacker crafts a malicious Windows Installer package (.msi file) designed to exploit the permission handling vulnerability.
  3. The attacker executes the crafted .msi package using msiexec.exe.
  4. During the installation process, the Windows Installer attempts to perform actions requiring higher privileges without proper authorization checks.
  5. The attacker leverages the improper permission handling to write malicious files to protected system directories, such as C:\Windows\System32.
  6. The attacker modifies critical registry keys, such as those under HKLM\SYSTEM\CurrentControlSet\Services, to execute arbitrary code at startup.
  7. The attacker executes the newly placed malicious files or triggers the modified registry entries to run code with elevated privileges.
  8. The attacker achieves privilege escalation, gaining SYSTEM-level access to the compromised host.

Impact

Successful exploitation of CVE-2026-27910 allows a local attacker to escalate their privileges to SYSTEM. This could lead to complete compromise of the affected system, including unauthorized access to sensitive data, modification of system settings, installation of malware, and potential lateral movement within the network. The number of potential victims is broad, encompassing any Windows system where an attacker can obtain local access.

Recommendation

  • Apply the patch released by Microsoft to address CVE-2026-27910 as soon as possible using the information available at https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27910.
  • Implement the Sigma rule Detect Suspicious MSIEXEC Execution to identify potential exploitation attempts by monitoring for unusual command-line arguments of the msiexec.exe process.
  • Monitor for unauthorized modifications to critical system directories (e.g., C:\Windows\System32) and registry keys (e.g., HKLM\SYSTEM\CurrentControlSet\Services) that could indicate privilege escalation attempts using Registry Modification Detection Sigma rule.

Detection coverage 2

Detect Suspicious MSIEXEC Execution

high

Detects suspicious execution of msiexec.exe with command-line arguments indicative of potential exploitation.

sigma tactics: privilege_escalation techniques: T1068 sources: process_creation, windows

Registry Modification Detection

medium

Detects modifications to critical registry keys often targeted during privilege escalation attempts.

sigma tactics: persistence, privilege_escalation techniques: T1068, T1547.001 sources: registry_set, windows

Detection queries are kept inside the platform. Get full rules →

Indicators of compromise

1

email

1

url

TypeValue
urlhttps://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27910
email[email protected]