<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Microsoft Corporation — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/vendors/microsoft-corporation/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 12 May 2026 18:43:51 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/vendors/microsoft-corporation/feed.xml" rel="self" type="application/rss+xml"/><item><title>CVE-2026-40369 - Windows Kernel Untrusted Pointer Dereference Privilege Escalation</title><link>https://feed.craftedsignal.io/briefs/2026-05-cve-2026-40369/</link><pubDate>Tue, 12 May 2026 18:43:51 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-cve-2026-40369/</guid><description>CVE-2026-40369 is an untrusted pointer dereference vulnerability in the Windows Kernel that allows a locally authorized attacker to escalate privileges.</description><content:encoded><![CDATA[<p>CVE-2026-40369 is a privilege escalation vulnerability affecting the Windows Kernel. Disclosed on May 12, 2026, this vulnerability stems from an untrusted pointer dereference, potentially allowing an attacker with local access and authorized privileges to execute code with elevated permissions. This could lead to a complete compromise of the affected system. Successful exploitation would require an attacker to already have some level of access to the system.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains initial access to the system with standard user privileges.</li>
<li>Attacker crafts a malicious program to trigger the untrusted pointer dereference in the Windows Kernel.</li>
<li>The malicious program exploits CVE-2026-40369 to overwrite kernel memory.</li>
<li>The kernel attempts to dereference the attacker-controlled pointer.</li>
<li>Due to the untrusted nature of the pointer, the dereference operation accesses an arbitrary memory location.</li>
<li>Attacker redirects code execution to a shellcode injected into a memory region.</li>
<li>The shellcode elevates the attacker&rsquo;s privileges to SYSTEM.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-40369 allows a local attacker to escalate their privileges to SYSTEM. This would give the attacker complete control over the compromised system, allowing them to install malware, steal sensitive data, or disrupt critical services. The vulnerability has a CVSS v3.1 score of 7.8, indicating a high severity.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the patch released by Microsoft to remediate CVE-2026-40369 as soon as possible. Reference: <a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-40369">https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-40369</a></li>
<li>Deploy the Sigma rule &ldquo;Detect Potential CVE-2026-40369 Exploitation Attempt&rdquo; to identify suspicious process creation events indicative of exploitation attempts.</li>
<li>Monitor for unusual system calls or API calls that could be indicative of kernel-level exploitation.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>privilege-escalation</category><category>windows-kernel</category><category>cve</category></item><item><title>CVE-2026-35415: Windows Storage Spaces Controller Integer Overflow Privilege Escalation</title><link>https://feed.craftedsignal.io/briefs/2026-05-cve-2026-35415/</link><pubDate>Tue, 12 May 2026 18:30:20 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-cve-2026-35415/</guid><description>CVE-2026-35415 is an integer overflow vulnerability in the Windows Storage Spaces Controller that allows a locally authorized attacker to elevate privileges.</description><content:encoded><![CDATA[<p>CVE-2026-35415 is an integer overflow vulnerability affecting the Windows Storage Spaces Controller. This vulnerability allows an attacker with local access to the system and valid credentials to elevate their privileges. The vulnerability stems from an integer overflow or wraparound condition within the Storage Spaces Controller, potentially leading to memory corruption or other exploitable conditions. Successful exploitation of this flaw would allow an attacker to gain higher-level permissions on the compromised system, potentially leading to full system control. As of the publication of this brief, there are no known reports of active exploitation in the wild.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains initial local access to a Windows system with valid credentials.</li>
<li>The attacker interacts with the Windows Storage Spaces Controller.</li>
<li>The attacker crafts specific input that triggers an integer overflow within the Storage Spaces Controller.</li>
<li>The integer overflow leads to a memory corruption condition.</li>
<li>The attacker leverages the memory corruption to overwrite critical system data structures.</li>
<li>The attacker manipulates their user privileges within the system.</li>
<li>The attacker successfully elevates their privileges to SYSTEM or another high-privileged account.</li>
<li>The attacker performs privileged actions on the system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-35415 allows a local attacker to elevate privileges on a Windows system. This could lead to a complete compromise of the affected system, allowing the attacker to install malware, steal sensitive data, or perform other malicious activities. The vulnerability affects any system where the Storage Spaces Controller is enabled. The number of potential victims is wide, since Windows is the most popular OS.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the security update provided by Microsoft to patch CVE-2026-35415 as soon as possible, referencing the Microsoft advisory URL in the references section.</li>
<li>Deploy the Sigma rule provided to detect potential exploitation attempts of CVE-2026-35415 by monitoring for suspicious Storage Spaces Controller activity.</li>
<li>Monitor for unauthorized privilege escalation attempts following potential exploitation attempts.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">threat</category><category>cve</category><category>vulnerability</category><category>privilege-escalation</category><category>windows</category></item><item><title>CVE-2026-33841 Heap-Based Buffer Overflow in Windows Kernel Allows Privilege Escalation</title><link>https://feed.craftedsignal.io/briefs/2026-05-cve-2026-33841-windows-kernel-privesc/</link><pubDate>Tue, 12 May 2026 18:21:01 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-cve-2026-33841-windows-kernel-privesc/</guid><description>CVE-2026-33841 is a heap-based buffer overflow vulnerability in the Windows Kernel that allows a locally authorized attacker to elevate privileges.</description><content:encoded><![CDATA[<p>CVE-2026-33841 is a heap-based buffer overflow vulnerability affecting the Windows Kernel. This vulnerability allows an attacker who already has local access to a system to elevate their privileges. Successful exploitation could allow the attacker to gain higher-level access to the system, potentially leading to complete control. Microsoft has released a security update to address this vulnerability. This vulnerability was published on May 12, 2026, and defenders should prioritize patching systems to prevent potential exploitation.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains initial local access to the target system through legitimate means or exploiting another vulnerability.</li>
<li>Attacker crafts a malicious input designed to trigger the heap-based buffer overflow in the Windows Kernel.</li>
<li>The attacker executes a program or script that sends the malicious input to the vulnerable kernel function.</li>
<li>The Windows Kernel attempts to process the input, leading to a buffer overflow on the heap.</li>
<li>The overflow overwrites adjacent memory regions on the heap, potentially corrupting critical kernel data structures.</li>
<li>The corrupted data structures are manipulated to redirect program execution flow within the kernel.</li>
<li>The attacker redirects execution to attacker-controlled code within kernel space.</li>
<li>The attacker-controlled code executes with elevated privileges, granting the attacker system-level access.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-33841 allows an attacker to elevate their privileges from a standard user account to system-level privileges. This could allow the attacker to install programs, view, change, or delete data, or create new accounts with full user rights. Given the nature of the Windows Kernel, the entire system is at risk if this vulnerability is exploited.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the security update released by Microsoft to patch CVE-2026-33841 as referenced in the advisory URL.</li>
<li>Deploy the Sigma rules provided below to your SIEM to detect potential exploitation attempts of CVE-2026-33841.</li>
<li>Monitor for suspicious process creation events that may indicate unauthorized privilege escalation.</li>
<li>Enable process creation logging with command line arguments to help identify potential exploitation attempts.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2026-33841</category><category>privilege-escalation</category><category>windows</category></item></channel></rss>