<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>CVE-2026-40572 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-40572/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Sat, 18 Apr 2026 01:16:19 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-40572/feed.xml" rel="self" type="application/rss+xml"/><item><title>NovumOS MemoryMapRange Privilege Escalation Vulnerability (CVE-2026-40572)</title><link>https://feed.craftedsignal.io/briefs/2024-01-28-novum-privesc/</link><pubDate>Sat, 18 Apr 2026 01:16:19 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-28-novum-privesc/</guid><description>A vulnerability exists in NovumOS versions prior to 0.24 where the MemoryMapRange syscall allows user-mode processes to map arbitrary virtual address ranges, including kernel structures, leading to privilege escalation.</description><content:encoded><![CDATA[<p>NovumOS, a custom 32-bit operating system written in Zig and x86 Assembly, is vulnerable to a critical privilege escalation flaw. Specifically, versions prior to 0.24 contain a vulnerability in Syscall 15, also known as MemoryMapRange. This syscall allows Ring 3 user-mode processes to map arbitrary virtual address ranges into their address space. This includes forbidden regions that should be protected, such as critical kernel structures including the Interrupt Descriptor Table (IDT), Global Descriptor Table (GDT), Task State Segment (TSS), and page tables. An attacker with local access to a vulnerable NovumOS system can exploit this vulnerability to gain kernel-level privileges, allowing for complete system compromise. This vulnerability is identified as CVE-2026-40572, and has a CVSS v3.1 base score of 9.0. The vulnerability is fixed in NovumOS version 0.24.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>A local attacker gains initial access to a NovumOS system. This may involve having an existing user account or exploiting another vulnerability for initial entry.</li>
<li>The attacker executes a user-mode process with the intention of escalating privileges.</li>
<li>The process invokes Syscall 15 (MemoryMapRange) with arguments specifying a virtual address range corresponding to a critical kernel structure, such as the IDT.</li>
<li>Due to the vulnerability in NovumOS versions prior to 0.24, the MemoryMapRange syscall does not properly validate the requested memory region.</li>
<li>The syscall allows the user-mode process to successfully map the kernel memory region into its own address space.</li>
<li>The attacker modifies the mapped kernel memory, specifically overwriting entries in the IDT to redirect interrupt handlers to attacker-controlled code.</li>
<li>An interrupt is triggered, either by a hardware event or a software instruction, causing the system to execute the attacker&rsquo;s code in kernel mode.</li>
<li>The attacker now has kernel-level privileges and can perform any action on the system, including installing backdoors, exfiltrating data, or causing a denial of service.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-40572 allows a local attacker to escalate privileges from user mode to kernel mode on NovumOS systems running versions prior to 0.24. This grants the attacker complete control over the affected system. The attacker can then install persistent backdoors, steal sensitive data, or disrupt system operations. Given the base score of 9.0, this is considered a critical vulnerability.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade NovumOS installations to version 0.24 or later to patch CVE-2026-40572.</li>
<li>Implement system call monitoring to detect suspicious invocations of Syscall 15 (MemoryMapRange). The <code>MemoryMapRange Syscall Invocation</code> Sigma rule below can assist with this.</li>
<li>Monitor for unexpected modifications to kernel structures such as the IDT, GDT, and TSS. The <code>Kernel Structure Modification</code> Sigma rule below can assist with this.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>privilege-escalation</category><category>novumOS</category><category>CVE-2026-40572</category></item></channel></rss>