Skip to content
Threat Feed
high advisory

CVE-2026-33839 - Windows Win32K GRFX Race Condition Privilege Escalation

CVE-2026-33839 is a race condition vulnerability in Windows Win32K - GRFX that allows an authorized local attacker to elevate privileges.

CVE-2026-33839 is a vulnerability affecting the Windows Win32K - GRFX component. The vulnerability is classified as a race condition, stemming from improper synchronization in concurrent execution using shared resources. A locally authorized attacker can exploit this vulnerability to achieve privilege escalation. The vulnerability was published on 2026-05-12 and poses a significant risk to systems where local users can execute code. Exploitation of this vulnerability allows an attacker to gain higher-level access to the system, potentially leading to unauthorized data access, modification, or system compromise. Defenders should prioritize patching systems vulnerable to CVE-2026-33839.

Attack Chain

  1. Attacker gains initial local access to the target Windows system with limited privileges.
  2. Attacker identifies the presence of the vulnerable Win32K - GRFX component.
  3. Attacker crafts a malicious application or script that leverages the race condition within the GRFX component.
  4. The malicious application triggers concurrent execution of the vulnerable code path within Win32K - GRFX.
  5. Due to the race condition, the concurrent executions interact in an unintended manner, leading to a privilege escalation.
  6. The attacker’s process gains elevated privileges, such as SYSTEM.
  7. The attacker leverages the elevated privileges to perform unauthorized actions, such as installing malware or accessing sensitive data.
  8. Attacker achieves persistence and control over the compromised system.

Impact

Successful exploitation of CVE-2026-33839 allows a local attacker to escalate their privileges to SYSTEM. This can lead to complete compromise of the affected system, including unauthorized access to sensitive data, installation of malware, and modification of system configurations. The vulnerability has a CVSS v3.1 score of 7.0, indicating a high severity. If successfully exploited, it can bypass security controls that depend on proper privilege separation.

Recommendation

  • Apply the security update provided by Microsoft to patch CVE-2026-33839 as referenced in the advisory URL.
  • Monitor process creation events for unusual activity originating from Win32K - GRFX, using a rule similar to the “Detect Win32K GRFX Privilege Escalation Attempt” Sigma rule.
  • Implement least privilege principles to limit the impact of successful privilege escalation.
  • Enable and review Windows event logs for suspicious activities related to Win32K - GRFX, focusing on unexpected changes in user privileges.

Detection coverage 2

Detect Win32K GRFX Privilege Escalation Attempt

high

Detects CVE-2026-33839 exploitation — potential privilege escalation attempts via abnormal process creation related to Win32K - GRFX

sigma tactics: privilege_escalation techniques: T1068 sources: process_creation, windows

Detect win32kfull.sys execution from unusual folder

medium

Detects execution of win32kfull.sys from unusual folders

sigma tactics: privilege_escalation techniques: T1068 sources: process_creation, windows

Detection queries are available on the platform. Get full rules →