<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2026-26184 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-26184/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 14 Apr 2026 18:16:55 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-26184/feed.xml" rel="self" type="application/rss+xml"/><item><title>Windows Projected File System Buffer Over-Read Privilege Escalation (CVE-2026-26184)</title><link>https://feed.craftedsignal.io/briefs/2026-04-projfs-privesc/</link><pubDate>Tue, 14 Apr 2026 18:16:55 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-projfs-privesc/</guid><description>CVE-2026-26184 is a buffer over-read vulnerability in the Windows Projected File System (ProjFS) that allows a local attacker to elevate privileges.</description><content:encoded><![CDATA[<p>CVE-2026-26184 is a high-severity vulnerability affecting the Windows Projected File System (ProjFS). This buffer over-read vulnerability allows an authenticated local attacker to elevate their privileges on a vulnerable system. Successful exploitation would grant the attacker higher-level access to the system, potentially enabling them to perform actions such as installing programs, viewing, changing, or deleting data, or creating new accounts with full user rights. The vulnerability was reported to Microsoft and assigned a CVSS v3.1 base score of 7.8, indicating a significant risk. Affected systems require patching to prevent potential exploitation.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to the system with low-level privileges.</li>
<li>The attacker crafts a malicious file or directory structure designed to trigger the buffer over-read in ProjFS.</li>
<li>The attacker interacts with the specially crafted file or directory through the Windows Projected File System. This interaction could involve accessing, modifying, or listing the contents of the projected file system.</li>
<li>The ProjFS driver attempts to read data from a buffer using an incorrect size, resulting in a buffer over-read.</li>
<li>The over-read allows the attacker to read adjacent memory locations.</li>
<li>The attacker leverages the memory disclosure to overwrite critical system data or function pointers within the kernel.</li>
<li>The attacker executes code with elevated privileges within the kernel context.</li>
<li>The attacker gains complete control over the system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-26184 allows a local attacker to elevate privileges to SYSTEM, the highest level of privilege in Windows. This would grant the attacker complete control over the compromised system. There is currently no public information about real-world exploitation. Sectors at risk are broad, as Windows Projected File System is a core component in modern Windows operating systems.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the security update provided by Microsoft to patch CVE-2026-26184 as soon as possible. The patch can be found in the Microsoft Security Update Guide (<a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26184">https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26184</a>).</li>
<li>Monitor for unusual file system activity, especially related to ProjFS, by deploying the Sigma rule <code>Detect Suspicious ProjFS Activity</code>.</li>
<li>Monitor for unexpected processes or kernel modules loading after the projected file system operations by deploying the Sigma rule <code>Detect Potential Privilege Escalation via ProjFS</code>.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2026-26184</category><category>privilege-escalation</category><category>windows</category></item></channel></rss>