<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Upnp — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/upnp/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 15 Apr 2026 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/upnp/feed.xml" rel="self" type="application/rss+xml"/><item><title>CVE-2026-27916 Use-After-Free in Windows UPnP Device Host</title><link>https://feed.craftedsignal.io/briefs/2026-04-cve-2026-27916-upnp/</link><pubDate>Wed, 15 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-cve-2026-27916-upnp/</guid><description>CVE-2026-27916 is a use-after-free vulnerability in Windows Universal Plug and Play (UPnP) Device Host that allows an authorized attacker to elevate privileges locally.</description><content:encoded><![CDATA[<p>CVE-2026-27916 is a critical use-after-free vulnerability affecting the Windows Universal Plug and Play (UPnP) Device Host service. This vulnerability allows an attacker with local access to elevate their privileges on the system. The vulnerability exists due to improper memory management within the UPnP service when handling specific network requests or device interactions. Successful exploitation could allow a low-privileged user or process to execute arbitrary code with elevated privileges, potentially leading to full system compromise. While specific exploitation details are not provided in the advisory, the nature of use-after-free vulnerabilities indicates the potential for reliable exploitation. This vulnerability requires local access, suggesting that it is likely part of a multi-stage attack.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to the target system, potentially through phishing or exploiting another vulnerability.</li>
<li>The attacker identifies that the target system is running the vulnerable Windows UPnP Device Host.</li>
<li>The attacker crafts a malicious UPnP request designed to trigger the use-after-free condition within the UPnP service.</li>
<li>The attacker sends the crafted UPnP request to the vulnerable service, triggering the memory corruption.</li>
<li>The UPnP service attempts to access the freed memory, leading to a crash or, with careful manipulation, code execution.</li>
<li>The attacker exploits the use-after-free vulnerability to overwrite critical system structures in memory.</li>
<li>The attacker leverages the corrupted memory to inject and execute arbitrary code within the context of the UPnP service, which runs with elevated privileges.</li>
<li>The attacker gains elevated privileges on the system, allowing them to perform actions such as installing software, modifying data, and creating new accounts.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-27916 allows a local attacker to elevate privileges to SYSTEM. This could allow a malicious actor to gain complete control over an affected system, potentially leading to data theft, system compromise, and further lateral movement within a network. The vulnerability affects any system running the vulnerable Windows UPnP service. The impact is high due to the potential for full system compromise.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the security update released by Microsoft to patch CVE-2026-27916 on all affected Windows systems. Refer to the Microsoft advisory <a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27916">https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27916</a>.</li>
<li>Enable process auditing to monitor for unexpected processes being launched by the UPnP service (svchost.exe hosting the upnphost service) to aid in detecting potential exploitation attempts. Implement the &ldquo;UPnP Device Host Spawning Suspicious Process&rdquo; Sigma rule below, and tune for your environment.</li>
<li>Monitor for suspicious network activity originating from the UPnP service (svchost.exe).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>windows</category><category>upnp</category><category>privilege-escalation</category><category>cve-2026-27916</category></item><item><title>CVE-2026-32156 Use-After-Free Vulnerability in Windows UPnP Device Host</title><link>https://feed.craftedsignal.io/briefs/2026-04-upnp-use-after-free/</link><pubDate>Tue, 14 Apr 2026 18:39:36 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-upnp-use-after-free/</guid><description>CVE-2026-32156 is a use-after-free vulnerability in the Windows Universal Plug and Play (UPnP) Device Host service that allows an unauthorized attacker to execute code locally.</description><content:encoded><![CDATA[<p>CVE-2026-32156 is a use-after-free vulnerability affecting the Windows Universal Plug and Play (UPnP) Device Host service. This vulnerability allows a local, unauthorized attacker to execute arbitrary code. The vulnerability arises from improper memory management within the UPnP service when handling device discovery or control requests. Successful exploitation requires specific conditions to trigger the use-after-free condition. The vulnerability was reported to Microsoft and assigned a CVSS v3.1 base score of 7.4, indicating a high severity. Exploitation of this vulnerability leads to arbitrary code execution, potentially allowing the attacker to gain elevated privileges on the affected system. It&rsquo;s crucial for defenders to apply the patch released by Microsoft to mitigate the risk.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to the target system through some other means (e.g., phishing, exploiting a different vulnerability, or physical access).</li>
<li>The attacker crafts a malicious UPnP device description or control message.</li>
<li>The attacker sends the crafted message to the Windows UPnP Device Host service (upnphost.dll).</li>
<li>The UPnP service parses the malicious message, triggering a use-after-free condition due to improper memory management.</li>
<li>The attacker leverages the use-after-free condition to overwrite memory, gaining control of the program execution flow.</li>
<li>The attacker injects and executes arbitrary code within the context of the UPnP Device Host service.</li>
<li>The attacker escalates privileges from the UPnP Device Host service (running as Local Service) to SYSTEM.</li>
<li>The attacker achieves arbitrary code execution with SYSTEM privileges, allowing them to install malware, modify system settings, or steal sensitive data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-32156 allows an attacker to execute arbitrary code with SYSTEM privileges on a vulnerable Windows system. This could allow the attacker to install malware, steal sensitive data, or take complete control of the affected system. The vulnerability is locally exploitable, meaning an attacker needs some form of access to the target machine to initiate the exploit. While no widespread exploitation has been reported, the potential impact of arbitrary code execution warrants immediate patching and monitoring.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the security update released by Microsoft to patch CVE-2026-32156 on all affected Windows systems (reference: <a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32156)">https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32156)</a>.</li>
<li>Monitor process creation events for suspicious activity originating from the <code>upnphost.dll</code> or <code>svchost.exe</code> processes, which host the UPnP service. Use the Sigma rule provided to detect potential exploitation attempts.</li>
<li>Enable process auditing to capture detailed information about process creation and execution, which can aid in identifying exploitation attempts (reference: Sigma rule logsource).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>use-after-free</category><category>windows</category><category>upnp</category><category>code-execution</category></item><item><title>Critical Command Injection Vulnerability in Zyxel Routers (CVE-2026-13942)</title><link>https://feed.craftedsignal.io/briefs/2026-02-zyxel-rce/</link><pubDate>Fri, 27 Feb 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-02-zyxel-rce/</guid><description>A critical command injection vulnerability (CVE-2026-13942) in the UPnP function of Zyxel routers allows remote attackers to execute arbitrary operating system commands by sending crafted UPnP SOAP requests.</description><content:encoded>&lt;p>A critical command injection vulnerability, tracked as CVE-2026-13942, has been discovered in the UPnP (Universal Plug and Play) service of Zyxel routers. The vulnerability stems from insufficient validation of input within the UPnP SOAP request processing.  An unauthenticated, remote attacker can exploit this flaw by sending specially crafted UPnP SOAP requests to the affected device. This allows the attacker to inject and execute arbitrary operating system commands with elevated privileges on…&lt;/p>
</content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>zyxel</category><category>router</category><category>command injection</category><category>cve-2026-13942</category><category>upnp</category></item></channel></rss>