CVE-2026-35417: Windows Win32K - ICOMP Type Confusion Privilege Escalation
CVE-2026-35417 is a type confusion vulnerability in Windows Win32K - ICOMP that allows an authorized attacker to elevate privileges locally.
CVE-2026-35417 is a type confusion vulnerability affecting the Win32K - ICOMP component of the Windows operating system. An authorized, local attacker can exploit this vulnerability to elevate their privileges on the system. The vulnerability resides in how Win32K - ICOMP handles resources, leading to type confusion that can be leveraged for malicious purposes. Exploitation requires the attacker to already have a foothold on the system, but successful exploitation results in elevated privileges. This vulnerability poses a significant risk to systems where users with limited privileges require stronger security boundaries.
Attack Chain
- Attacker gains initial access to the system with limited privileges via legitimate means or other exploits.
- Attacker executes a specially crafted application designed to trigger the type confusion vulnerability in Win32K - ICOMP.
- The malicious application manipulates the Win32K - ICOMP component to misinterpret a resource type.
- This type confusion allows the attacker to overwrite critical system structures or functions.
- The attacker injects malicious code into a privileged process, such as a system service.
- The injected code executes with elevated privileges, bypassing security restrictions.
- The attacker leverages the elevated privileges to install malware, modify system configurations, or steal sensitive data.
- The attacker persists on the system, maintaining elevated access for future malicious activities.
Impact
Successful exploitation of CVE-2026-35417 allows a local attacker to escalate their privileges to SYSTEM level. This could allow the attacker to take complete control of the affected system, potentially leading to data theft, system compromise, and further lateral movement within the network. The impact is high because it provides an avenue for attackers to bypass security controls and gain administrative access.
Recommendation
- Apply the security update provided by Microsoft to patch CVE-2026-35417 as soon as possible via https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-35417.
- Deploy the Sigma rule
Detect Suspicious Win32K - ICOMP Activityto detect potential exploitation attempts by monitoring for suspicious process creation events related to Win32K. - Enable process creation auditing with command line arguments to enhance visibility and facilitate the detection of malicious activities related to this vulnerability.
Detection coverage 2
Detect Suspicious Win32K - ICOMP Activity
highDetects CVE-2026-35417 exploitation — Monitors for process creation events that may indicate exploitation attempts against Win32K - ICOMP
Detect Suspicious Win32K - ICOMP Image Load
mediumDetects CVE-2026-35417 exploitation — Monitors for image load events related to Win32K - ICOMP with unusual calling processes
Detection queries are available on the platform. Get full rules →