Skip to content
Threat Feed
high advisory

CVE-2026-35417: Windows Win32K - ICOMP Type Confusion Privilege Escalation

CVE-2026-35417 is a type confusion vulnerability in Windows Win32K - ICOMP that allows an authorized attacker to elevate privileges locally.

CVE-2026-35417 is a type confusion vulnerability affecting the Win32K - ICOMP component of the Windows operating system. An authorized, local attacker can exploit this vulnerability to elevate their privileges on the system. The vulnerability resides in how Win32K - ICOMP handles resources, leading to type confusion that can be leveraged for malicious purposes. Exploitation requires the attacker to already have a foothold on the system, but successful exploitation results in elevated privileges. This vulnerability poses a significant risk to systems where users with limited privileges require stronger security boundaries.

Attack Chain

  1. Attacker gains initial access to the system with limited privileges via legitimate means or other exploits.
  2. Attacker executes a specially crafted application designed to trigger the type confusion vulnerability in Win32K - ICOMP.
  3. The malicious application manipulates the Win32K - ICOMP component to misinterpret a resource type.
  4. This type confusion allows the attacker to overwrite critical system structures or functions.
  5. The attacker injects malicious code into a privileged process, such as a system service.
  6. The injected code executes with elevated privileges, bypassing security restrictions.
  7. The attacker leverages the elevated privileges to install malware, modify system configurations, or steal sensitive data.
  8. The attacker persists on the system, maintaining elevated access for future malicious activities.

Impact

Successful exploitation of CVE-2026-35417 allows a local attacker to escalate their privileges to SYSTEM level. This could allow the attacker to take complete control of the affected system, potentially leading to data theft, system compromise, and further lateral movement within the network. The impact is high because it provides an avenue for attackers to bypass security controls and gain administrative access.

Recommendation

  • Apply the security update provided by Microsoft to patch CVE-2026-35417 as soon as possible via https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-35417.
  • Deploy the Sigma rule Detect Suspicious Win32K - ICOMP Activity to detect potential exploitation attempts by monitoring for suspicious process creation events related to Win32K.
  • Enable process creation auditing with command line arguments to enhance visibility and facilitate the detection of malicious activities related to this vulnerability.

Detection coverage 2

Detect Suspicious Win32K - ICOMP Activity

high

Detects CVE-2026-35417 exploitation — Monitors for process creation events that may indicate exploitation attempts against Win32K - ICOMP

sigma tactics: privilege_escalation techniques: T1068 sources: process_creation, windows

Detect Suspicious Win32K - ICOMP Image Load

medium

Detects CVE-2026-35417 exploitation — Monitors for image load events related to Win32K - ICOMP with unusual calling processes

sigma tactics: privilege_escalation techniques: T1068 sources: image_load, windows

Detection queries are available on the platform. Get full rules →