CVE-2026-24291

7.8 HIGH

📋 TL;DR

This vulnerability allows an authorized attacker with local access to exploit incorrect permissions in Windows Accessibility Infrastructure (ATBroker.exe) to elevate privileges. It affects Windows systems where the attacker already has some level of access but can gain higher privileges like SYSTEM. This is a local privilege escalation vulnerability.

💻 Affected Systems

Products:
  • Windows Accessibility Infrastructure (ATBroker.exe)
Versions: Specific Windows versions as listed in Microsoft advisory
Operating Systems: Windows 10, Windows 11, Windows Server 2016, Windows Server 2019, Windows Server 2022
Default Config Vulnerable: ⚠️ Yes
Notes: Affects default installations of supported Windows versions; requires attacker to have some level of local access.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attacker gains SYSTEM privileges, enabling complete system compromise, installation of malware, credential theft, and persistence mechanisms.

🟠

Likely Case

Authorized user or malware with initial access escalates to administrative privileges to bypass security controls and move laterally.

🟢

If Mitigated

With proper access controls and monitoring, impact is limited to isolated systems with quick detection and containment.

🌐 Internet-Facing: LOW - This is a local privilege escalation requiring initial access; not directly exploitable over the internet.
🏢 Internal Only: HIGH - Once an attacker gains initial access to a system internally, they can exploit this to escalate privileges and compromise the host.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires local access and knowledge of the vulnerability; no public exploit code known at this time.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Microsoft Security Update Guide for specific KB numbers

Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-24291

Restart Required: Yes

Instructions:

1. Apply the latest Windows security updates from Microsoft. 2. Use Windows Update or download patches from Microsoft Update Catalog. 3. Restart the system as required.

🔧 Temporary Workarounds

Disable ATBroker Service

windows

Temporarily disable the Accessibility Infrastructure Broker service to mitigate the vulnerability.

sc config ATBroker start= disabled
sc stop ATBroker

Restrict Service Permissions

windows

Modify permissions on ATBroker.exe to prevent unauthorized access.

icacls "C:\Windows\System32\ATBroker.exe" /deny *S-1-1-0:(RX)

🧯 If You Can't Patch

  • Implement strict access controls to limit local user privileges and monitor for suspicious activity.
  • Use application whitelisting to prevent execution of unauthorized processes and monitor ATBroker.exe behavior.

🔍 How to Verify

Check if Vulnerable:

Check Windows version and installed updates; compare with Microsoft advisory for affected versions.

Check Version:

systeminfo | findstr /B /C:"OS Name" /C:"OS Version"

Verify Fix Applied:

Verify that the latest security updates from Microsoft are installed and the system has been restarted.

📡 Detection & Monitoring

Log Indicators:

  • Unusual process creation by ATBroker.exe
  • Failed or successful privilege escalation attempts in security logs
  • Modifications to ATBroker.exe permissions or service configuration

Network Indicators:

  • Not applicable as this is a local exploit

SIEM Query:

EventID=4688 AND ProcessName="ATBroker.exe" AND NewProcessName contains "cmd.exe" OR "powershell.exe"

🔗 References

📤 Share & Export