<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2026-26174 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-26174/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 14 Apr 2026 18:23:14 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-26174/feed.xml" rel="self" type="application/rss+xml"/><item><title>Windows Server Update Service (WSUS) Privilege Escalation via CVE-2026-26174</title><link>https://feed.craftedsignal.io/briefs/2026-04-wsus-privesc/</link><pubDate>Tue, 14 Apr 2026 18:23:14 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-wsus-privesc/</guid><description>CVE-2026-26174 is a race condition vulnerability in Windows Server Update Service that allows an authorized attacker to elevate privileges locally.</description><content:encoded><![CDATA[<p>CVE-2026-26174 describes a race condition vulnerability within the Windows Server Update Service (WSUS). Disclosed on April 14, 2026, this flaw allows a locally authenticated attacker with limited privileges to elevate their privileges to SYSTEM. The vulnerability stems from improper synchronization when WSUS handles concurrent requests, leading to a race condition that can be exploited to overwrite critical system files or manipulate system processes. Successful exploitation could grant an attacker full control over the affected system, potentially enabling lateral movement within the network, data exfiltration, or deployment of malware. Due to the critical role of WSUS in managing updates across an enterprise, this vulnerability poses a significant risk to organizations relying on WSUS for patch management.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker authenticates to the target Windows system with a low-privileged account.</li>
<li>The attacker crafts a malicious request designed to trigger the race condition in WSUS. This might involve sending multiple, simultaneous update requests.</li>
<li>WSUS processes the crafted requests concurrently, leading to unsynchronized access to shared resources.</li>
<li>Due to the race condition, the attacker gains the ability to manipulate a shared resource, such as a temporary file or a registry key, used by WSUS.</li>
<li>The attacker exploits the manipulated shared resource to overwrite a critical system file within the WSUS directory (e.g., a DLL loaded by the WSUS service) or modify a registry setting used by WSUS for configuration.</li>
<li>WSUS service restarts or reloads the modified component, executing the attacker&rsquo;s injected code with elevated privileges.</li>
<li>The attacker&rsquo;s code executes with SYSTEM privileges, granting them full control over the system.</li>
<li>The attacker leverages the elevated privileges to install malicious software, create new accounts, or perform other unauthorized actions.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-26174 allows a local attacker to elevate privileges to SYSTEM. This level of access grants complete control over the compromised machine. In a networked environment, this could lead to lateral movement to other systems, exfiltration of sensitive data, or the deployment of ransomware. Given that WSUS is often deployed across numerous systems, a single successful exploit could compromise a large number of machines. The vulnerability has a CVSS v3.1 score of 7.0, indicating a high severity.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the patch released by Microsoft to address CVE-2026-26174 on all WSUS servers immediately.</li>
<li>Monitor process creation events for unusual processes spawned by the WSUS service (w3wp.exe) using the &ldquo;Detect Suspicious WSUS Child Processes&rdquo; Sigma rule to detect potential exploitation attempts.</li>
<li>Monitor file modifications within the WSUS installation directory (typically <code>C:\Program Files\Update Services\</code>) using the &ldquo;Detect WSUS File Modifications&rdquo; Sigma rule.</li>
<li>Review WSUS logs for any unusual activity or errors that might indicate an attempted exploitation of CVE-2026-26174.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2026-26174</category><category>privilege-escalation</category><category>windows</category><category>wsus</category></item></channel></rss>