Windows Error Reporting ALPC Privilege Escalation PoC Exploit Released
A proof-of-concept exploit for CVE-2026-20817, a serious privilege escalation flaw in Windows Error Reporting, has surfaced publicly, raising alarms for unpatched systems. Security team warns that low-privileged users can leverage this to gain SYSTEM-level control with minimal effort.
Windows Error Reporting Vulnerability
CVE-2026-20817 targets the Windows Error Reporting (WER) service, which handles crash dumps via an ALPC port named \\WindowsErrorReportingService.
The core issue lies in the SvcElevatedLaunch method (ID 0x0D), where WER fails to validate caller privileges before launching WerFault.exe using attacker-supplied command-line arguments from shared memory.
Attackers craft malicious ALPC messages that trick the service into duplicating a shared memory handle and executing arbitrary code as SYSTEM.
This grants a token with potent privileges, such as SeDebugPrivilege for process debugging and SeImpersonatePrivilege for user impersonation, though it lacks SeTcbPrivilege.
Unlike typical ALPC flaws requiring race conditions or memory corruption, this stems from a straightforward authorization bypass in wersvc.dll. Demonstrations on Windows 11 23H2 show that standard users can spawn SYSTEM shells in seconds.
PoC Exploit Mechanics
- Create a shared memory segment with a payload command-line, like spawning a reverse shell.
- Connect to the WER ALPC port.
- Send a method 0x0D message embedding the client PID, shared memory handle, and command length.
- WER unquestioningly launches
WerFault.exeunder SYSTEM, inheriting the attacker’s string without checks.
This reliability makes it a prime post-exploitation tool; chain it with initial footholds for domain dominance. No user interaction or admin rights needed, just valid logon sessions.​
Affected Windows Platforms
All Windows 10/11 and Server 2019/2022 builds before the January 2026 patch are vulnerable. Microsoft confirmed the fix in its Security Update Guide, urging immediate deployment.
Post-patch analysis reveals WER now enforces stricter token checks before ALPC handling, blocking unauthorized SvcElevatedLaunch calls.
Detection and Mitigation
Hunt for anomalous WerFault.exe launches from low-integrity contexts via Event ID 4688 in the Windows logs, filtered for parent processes lacking SYSTEM tokens. Tools like Sysmon with privilege-escalation rules reliably catch these.​
Patch now via Windows Update or WSUS. For air-gapped setups, sideload the KB from the Microsoft Update Catalog. Disable WER via registry (HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Windows Error Reporting\Disabled=1) as a stopgap, but expect crash-logging side effects.​