<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Accessibility — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/accessibility/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Thu, 19 Mar 2026 05:23:44 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/accessibility/feed.xml" rel="self" type="application/rss+xml"/><item><title>RegPwnBOF Registry Symlink Race Condition Exploit</title><link>https://feed.craftedsignal.io/briefs/2024-01-regpwnbof/</link><pubDate>Thu, 19 Mar 2026 05:23:44 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-regpwnbof/</guid><description>RegPwnBOF exploits a registry symlink race condition in the Windows Accessibility ATConfig mechanism, enabling a normal user to write arbitrary values to protected HKLM registry keys for persistence and privilege escalation.</description><content:encoded><![CDATA[<p>RegPwnBOF is an exploit leveraging a registry symlink race condition within the Windows Accessibility ATConfig mechanism. This vulnerability allows an unprivileged user to manipulate protected areas of the registry, specifically HKLM, which are typically reserved for administrators or system processes. By exploiting this race condition, an attacker can write arbitrary values to these protected keys. The initial report surfaced around March 2026, highlighting the potential for unauthorized persistence and privilege escalation. This circumvents standard Windows security controls, posing a significant risk to system integrity and confidentiality. The exploit&rsquo;s accessibility to non-administrator users makes it particularly dangerous in environments where least-privilege principles are not strictly enforced.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unprivileged user initiates the ATConfig mechanism within the Windows Accessibility features.</li>
<li>The exploit creates a registry symlink pointing to a protected HKLM key.</li>
<li>A race condition is triggered during the ATConfig process, allowing the exploit to bypass security checks.</li>
<li>The attacker leverages this race condition to overwrite the target HKLM registry key with arbitrary data.</li>
<li>The modified registry key is used to establish persistence, for example, by creating a Run key.</li>
<li>Upon system restart or user login, the malicious payload associated with the modified Run key is executed.</li>
<li>The attacker gains elevated privileges by executing code within the context of a privileged process.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of RegPwnBOF allows an attacker to gain persistent access to a compromised system and escalate their privileges to administrator level. This can lead to complete system compromise, data theft, and the installation of malware. The impact is magnified by the fact that this exploit can be triggered by a normal user, bypassing traditional access controls. The number of potential victims is considerable, as the vulnerability exists within the Windows Accessibility features, which are enabled by default on many systems.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor registry modifications targeting HKLM keys, especially those related to Accessibility features, using a process_creation log source and the provided Sigma rules.</li>
<li>Implement strict access controls and least-privilege principles to limit the ability of unprivileged users to interact with system-level configurations.</li>
<li>Investigate any unusual registry symlink creation events using file_event logs, particularly those involving the ATConfig mechanism, to identify potential RegPwnBOF exploitation attempts.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>registry</category><category>symlink</category><category>race-condition</category><category>accessibility</category><category>privilege-escalation</category><category>persistence</category><category>windows</category></item></channel></rss>