High-Severity Windows "RegPwn" Vulnerability Exploits Accessibility Features for Privilege Escalation
A critical Windows elevation-of-privilege vulnerability, tracked as CVE-2026-24291 (RegPwn), was discovered by the MDSec red team and patched in a recent Microsoft Patch Tuesday update. The flaw allowed low-privileged users to gain full SYSTEM-level access by manipulating Windows’ built-in accessibility features.
The attack exploited how Windows handles registry keys for tools like the On-Screen Keyboard and Narrator. When launched, these features create a user-writable registry key that is later copied into the local machine (HKLM) hive during login a process running with SYSTEM privileges. By leveraging an opportunistic lock (oplock) on a system file, attackers could pause the registry copy operation and replace the target key with a symbolic link, redirecting writes to arbitrary registry locations.
In MDSec’s proof-of-concept, this technique was used to overwrite a system service’s execution path, granting immediate SYSTEM-level command access. The vulnerability was actively exploited in internal engagements since January 2025 before Microsoft issued a fix.
MDSec has released the RegPwn exploit code on GitHub for defensive research. Organizations are urged to apply the latest Windows updates to mitigate this local privilege escalation risk.
Source: https://cybersecuritynews.com/regpwn-windows-registry-vulnerability/
Microsoft Security Response Center cybersecurity rating report: https://www.rankiteo.com/company/microsoft-security-response-center
"id": "MIC1773822231",
"linkid": "microsoft-security-response-center",
"type": "Vulnerability",
"date": "1/2025",
"severity": "85",
"impact": "4",
"explanation": "Attack with significant impact with customers data leaks"
{'affected_entities': [{'customers_affected': 'All Windows users prior to '
'patch',
'industry': 'Technology',
'location': 'Global',
'name': 'Microsoft Windows',
'type': 'Operating System'}],
'attack_vector': 'Local',
'customer_advisories': 'Organizations are urged to apply the latest Windows '
'updates to mitigate this local privilege escalation '
'risk.',
'date_detected': '2025-01-01',
'description': 'A critical Windows elevation-of-privilege vulnerability, '
'tracked as CVE-2026-24291 (RegPwn), was discovered by the '
'MDSec red team and patched in a recent Microsoft Patch '
'Tuesday update. The flaw allowed low-privileged users to gain '
'full SYSTEM-level access by manipulating Windows’ built-in '
'accessibility features. The attack exploited how Windows '
'handles registry keys for tools like the On-Screen Keyboard '
'and Narrator, enabling attackers to redirect registry writes '
'to arbitrary locations via symbolic links, ultimately '
'overwriting system service execution paths.',
'impact': {'operational_impact': 'Potential full SYSTEM-level access for '
'low-privileged users',
'systems_affected': 'Windows systems with accessibility features '
'enabled'},
'investigation_status': 'Patched',
'lessons_learned': 'Importance of securing registry operations and '
'accessibility features in Windows; need for timely '
'patching of privilege escalation vulnerabilities.',
'motivation': 'Research/Defensive Testing',
'post_incident_analysis': {'corrective_actions': 'Microsoft patched the '
'vulnerability to prevent '
'registry manipulation via '
'symbolic links in '
'accessibility features.',
'root_causes': 'Insecure handling of registry keys '
'during accessibility feature '
'initialization, allowing symbolic '
'link redirection to SYSTEM-level '
'registry locations.'},
'recommendations': 'Apply the latest Windows updates immediately. Monitor for '
'unusual registry modifications or symbolic link creation. '
'Restrict access to accessibility features where '
'unnecessary.',
'references': [{'source': 'MDSec', 'url': 'https://github.com/MDSec/RegPwn'}],
'response': {'containment_measures': 'Microsoft Patch Tuesday update',
'remediation_measures': 'Apply latest Windows updates'},
'threat_actor': 'MDSec red team (proof-of-concept)',
'title': "High-Severity Windows 'RegPwn' Vulnerability Exploits Accessibility "
'Features for Privilege Escalation',
'type': 'Privilege Escalation',
'vulnerability_exploited': 'CVE-2026-24291 (RegPwn)'}