Microsoft: Cyber Security News ®’s Post

Microsoft: Cyber Security News ®’s Post

High-Severity "RegPwn" Windows Vulnerability Grants SYSTEM Access to Attackers

A newly disclosed high-severity Windows vulnerability, tracked as CVE-2026-24291 and dubbed "RegPwn," enables low-privileged users to escalate privileges and gain full SYSTEM-level access on affected systems. The flaw exploits the way Windows handles its built-in accessibility features, including the On-Screen Keyboard and Narrator.

When a user launches these tools, Windows creates a registry key to store configuration data. Attackers can manipulate this process to bypass security controls, leveraging the high-integrity access granted to accessibility features originally designed to assist users but now weaponized for privilege escalation.

The vulnerability affects multiple Windows versions, though specific details on affected builds and patches remain undisclosed. Security researchers warn that successful exploitation could allow threat actors to execute arbitrary code with the highest system privileges, potentially leading to full system compromise.

No active exploitation has been confirmed in the wild, but the severity of the flaw underscores the risks of misconfigured or improperly secured system components. Microsoft has not yet released a public advisory or patch for CVE-2026-24291.

Source: https://www.linkedin.com/feed/update/urn:li:activity:7439971821527150592

Microsoft Security Response Center cybersecurity rating report: https://www.rankiteo.com/company/microsoft-security-response-center

"id": "MIC1773829432",
"linkid": "microsoft-security-response-center",
"type": "Vulnerability",
"date": "3/2026",
"severity": "100",
"impact": "5",
"explanation": "Attack threatening the organization's existence"
{'affected_entities': [{'industry': 'Technology',
                        'name': 'Microsoft Windows',
                        'type': 'Operating System'}],
 'attack_vector': 'Local',
 'description': 'A newly disclosed high-severity Windows vulnerability, '
                "tracked as CVE-2026-24291 and dubbed 'RegPwn,' enables "
                'low-privileged users to escalate privileges and gain full '
                'SYSTEM-level access on affected systems. The flaw exploits '
                'the way Windows handles its built-in accessibility features, '
                'including the On-Screen Keyboard and Narrator. Attackers can '
                'manipulate this process to bypass security controls, '
                'leveraging the high-integrity access granted to accessibility '
                'features to execute arbitrary code with the highest system '
                'privileges.',
 'impact': {'operational_impact': 'Potential full system compromise',
            'systems_affected': 'Multiple Windows versions (specific builds '
                                'undisclosed)'},
 'post_incident_analysis': {'root_causes': 'Misconfigured or improperly '
                                           'secured system components '
                                           '(accessibility features)'},
 'references': [{'source': 'Security Research'}],
 'title': "High-Severity 'RegPwn' Windows Vulnerability Grants SYSTEM Access "
          'to Attackers',
 'type': 'Privilege Escalation',
 'vulnerability_exploited': 'CVE-2026-24291 (RegPwn)'}
Great! Next, complete checkout for full access to Rankiteo Blog.
Welcome back! You've successfully signed in.
You've successfully subscribed to Rankiteo Blog.
Success! Your account is fully activated, you now have access to all content.
Success! Your billing info has been updated.
Your billing was not updated.