Skip to content
Threat Feed
high advisory

Windows Push Notifications Race Condition Privilege Escalation (CVE-2026-32160)

CVE-2026-32160 describes a race condition vulnerability in Windows Push Notifications that allows a locally authorized attacker to elevate privileges.

CVE-2026-32160 is a vulnerability affecting Windows Push Notifications. Discovered and reported by Microsoft, it stems from a race condition that occurs during concurrent execution using a shared resource without proper synchronization. This flaw enables a local attacker with authorization to elevate their privileges on the affected system. The vulnerability was published on April 14, 2026, and is documented in the NVD database. Exploitation requires local access, but successful exploitation grants significant control over the compromised system, posing a substantial risk to confidentiality, integrity, and availability. Defenders should prioritize patching systems vulnerable to CVE-2026-32160 to mitigate the risk of local privilege escalation.

Attack Chain

  1. Attacker gains initial local access to a Windows system with a standard user account.
  2. Attacker identifies that the system is running a vulnerable version of Windows Push Notifications.
  3. Attacker crafts a malicious application or script designed to exploit the race condition in the Windows Push Notifications service.
  4. The malicious application attempts to access a shared resource used by the Windows Push Notifications service.
  5. The application triggers concurrent execution scenarios by rapidly accessing or modifying the shared resource.
  6. Due to the race condition, the attacker’s application gains unintended write access or control over sensitive data or functions within the Windows Push Notifications service.
  7. The attacker leverages the elevated privileges within the Windows Push Notifications service to execute arbitrary code with system-level permissions.
  8. Attacker installs malware, modifies system configurations, or exfiltrates sensitive data, achieving complete control over the local system.

Impact

Successful exploitation of CVE-2026-32160 allows a local attacker to escalate their privileges to SYSTEM, granting them complete control over the compromised Windows system. This could lead to data theft, malware installation, system corruption, or use of the compromised system as a pivot point for further attacks within the network. While the specific number of potential victims is unknown, the vulnerability affects a core Windows component, making a wide range of systems potentially vulnerable.

Recommendation

  • Apply the patch provided by Microsoft for CVE-2026-32160 to remediate the race condition vulnerability in Windows Push Notifications. Reference: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32160
  • Monitor process creation events for unusual processes spawned by the Windows Push Notifications service (using the rule below).
  • Implement strict access control policies to limit local user privileges and reduce the attack surface.
  • Enable and review Windows event logs for suspicious activity related to privilege escalation attempts.

Detection coverage 2

Suspicious Process Spawned by Windows Push Notifications Service

high

Detects potential exploitation of CVE-2026-32160 by monitoring for unusual child processes spawned by the Windows Push Notifications service.

sigma tactics: privilege_escalation techniques: T1068 sources: process_creation, windows

Potential CVE-2026-32160 Exploit - File Creation in System32 by svchost

medium

Detects potential exploitation by monitoring file creation events in System32 initiated by svchost.exe (Windows Push Notifications service).

sigma tactics: persistence, privilege_escalation techniques: T1068 sources: file_event, windows

Detection queries are kept inside the platform. Get full rules →