Tuesday, March 31, 2026

Micropatches released for Windows Storage Elevation of Privilege Vulnerability (CVE-2026-21508)

 


February 2026 Windows Updates brought a patch for CVE-2026-21508, a local privilege escalation vulnerability in Windows Storage component allowing a low-privileged local user to run arbitrary code as Local System.

The vulnerability was found and reported to Microsoft by security researcher Oscar Zanotti Campo. Oscar subsequently published a detailed analysis of the vulnerability and a proof-of-concept, both of which allowed us to reproduce and patch this issue for our users.

 

The Vulnerability 

This flaw is in the windows.storage.dll module when used by WUDFHost.exe. The WUDFHost.exe process impersonates the user while loading sensitive registry keys from the Classes\CLSID\ path for resolving the target handles. A local attacker can leverage this to get  WUDFHost to use their own registry keys and load a malicious DLL, which can then revert the impersonation and run code as Local System. 

 

Microsoft's Patch

Microsoft's patch forces WUDFHost.exe to load sensitive registry keys from the machine registry hive instead of from the calling user's hive.

 

Our Patch

Our patch is logically identical to Microsoft's. 


Micropatch Availability

Micropatches were written for the following security-adopted Windows versions:

  1. Windows 11 v22H2 - fully updated
  2. Windows 11 v21H2 - fully updated
  3. Windows 10 v22H2 - fully updated
  4. Windows 10 v21H1 - fully updated
  5. Windows 10 v20H2 - fully updated
  6. Windows 10 v2004 - fully updated
  7. Windows 10 v1909 - fully updated
  8. Windows 10 v1809 - fully updated
  9. Windows 10 v1803 - fully updated


Micropatches have already been distributed to, and applied on, all affected online computers with 0patch Agent in PRO or Enterprise accounts (unless Enterprise group settings prevented that).

Vulnerabilities like these get discovered on a regular basis, and attackers know about them all. If you're using Windows that aren't receiving official security updates anymore, 0patch will make sure these vulnerabilities won't be exploited on your computers - and you won't even have to know or care about these things. 

We'd like to thank Oscar Zanotti Campo for sharing their analysis and proof-of-concept, which allowed us to create a patch and protect 0patch users against this issue.

If you're new to 0patch, create a free account in 0patch Central, start a free trial, then install and register 0patch Agent. Everything else will happen automatically. No computer reboot will be needed.

Did you know 0patch security-adopted Windows 10 and Office 2016 and 2019 when they went out of support this month, allowing you to keep using them for at least 3 more years (5 years for Windows 10)? Read more about it here and here

To learn more about 0patch, please visit our Help Center.








 

Monday, March 30, 2026

Micropatches released for Arbitrary Registry Key Delete As Local System With Consolidator Scheduled Task (CVE-2025-59512)

 


November 2025 Windows Updates brought a patch for CVE-2025-59512, a local privilege escalation vulnerability in Customer Experience Improvement Program, allowing a low-privileged Windows user to delete arbitrary registry key as Local System - which can be used for running privileged code at a later time.

The vulnerability was found and reported to Microsoft by security researcher Tianlin Zhang. Security researcher Clément Labro subsequently reverse-engineered Microsoft's patch for another vulnerability but also detailed this arbitrary registry key delete issue in their article, which allowed us to reproduce and patch this issue for our users.

 

The Vulnerability 

The vulnerability is in the way the "Consolidator" scheduled task, part of the Customer Experience Improvement Program on Windows, deletes all registry subkeys under in one of its own registry keys when started. Due to improper permissions on said key, any local user can specify a further subkey that is a symbolic link to another key anywhere else in the registry and run the scheduled task. This results in the key linked to by the symbolic link getting deleted.

Deleting an arbitrary registry key can result in all kinds of things including disabling security features or exploiting some other vulnerability. 

 

Microsoft's Patch

Microsoft's patch eliminated the entire functionality of deleting registry subkeys from the "Consolidator" scheduled task.

 

Our Patch

Our patch is logically identical to Microsoft's. 

Let's see our patch in action. First, a low-privileged user creates a registry symbolic link pointing to a registry key test under HKLM\SOFTWARE and runs the "Consolidator" scheduled task while 0patch Agent is disabled. This results in HKLM\SOFTWARE\test getting deleted. Doing the same with 0patch Agent enabled does not result in the deletion of HKLM\SOFTWARE\test.


 

 

Micropatch Availability

Micropatches were written for the following security-adopted Windows versions:

  1. Windows 11 v22H2 - fully updated
  2. Windows 11 v21H2 - fully updated
  3. Windows 10 v22H2 - fully updated
  4. Windows 10 v21H1 - fully updated
  5. Windows 10 v20H2 - fully updated
  6. Windows 10 v2004 - fully updated
  7. Windows 10 v1909 - fully updated
  8. Windows 10 v1809 - fully updated
  9. Windows 10 v1803 - fully updated
  10. Windows 7 - fully updated with no ESU, ESU 1, ESU 2 or ESU 3
  11. Windows Server 2008 R2 - fully updated with no ESU, ESU 1, ESU 2, ESU 3 or ESU 4
  12. Windows Server 2012 - fully updated with no ESU or ESU 1
  13. Windows Server 2012 R2 - fully updated with no ESU or ESU 1 


Micropatches have already been distributed to, and applied on, all affected online computers with 0patch Agent in PRO or Enterprise accounts (unless Enterprise group settings prevented that).

Vulnerabilities like these get discovered on a regular basis, and attackers know about them all. If you're using Windows that aren't receiving official security updates anymore, 0patch will make sure these vulnerabilities won't be exploited on your computers - and you won't even have to know or care about these things. 

We'd like to thank Tianlin Zhang for discovering this vulnerability and Clément Labro for publishing their analysis, both of which allowed us to create a patch and protect 0patch users against this issue.

If you're new to 0patch, create a free account in 0patch Central, start a free trial, then install and register 0patch Agent. Everything else will happen automatically. No computer reboot will be needed.

Did you know 0patch security-adopted Windows 10 and Office 2016 and 2019 when they went out of support this month, allowing you to keep using them for at least 3 more years (5 years for Windows 10)? Read more about it here and here

To learn more about 0patch, please visit our Help Center.








 

Monday, March 23, 2026

Micropatches released for Desktop Windows Manager Elevation of Privilege Vulnerability (CVE-2025-55681)

 


October 2025 Windows Updates brought a fix for CVE-2025-55681, a local privilege escalation vulnerability in Windows Desktop Manager that allowed a low-privileged attacker to execute malicious code as Local System. The vulnerability was subsequently described in detail by SSD Secure Disclosure, allowing us to reproduce it and create a patch for legacy Windows systems.

 

The Vulnerability 

The vulnerability is a memory corruption issue, caused by accessing an allocated memory block out of bounds.

 

Microsoft's Patch

Microsoft's patch added an out-of-bounds check to the code, which terminates the process in case of violation. This effectively turned the local privilege escalation vulnerability into a denial of service vulnerability, but the assumption is that terminating the Desktop Windows Manager on a computer does not benefit the local attacker.

 

Our Patch

Our patch is logically identical to Microsoft's. 


Micropatch Availability

Micropatches were written for the following security-adopted Windows versions:

  1. Windows 11 v21H2 - fully updated
  2. Windows 10 v21H2 - fully updated
  3. Windows 10 v21H1 - fully updated
  4. Windows 10 v20H2 - fully updated
  5. Windows 10 v2004 - fully updated
  6. Windows 10 v1909 - fully updated 


We could not reproduce the issue on any 32-bit Windows machine, nor on Windows 10 v1903 or 1809.


Micropatches have already been distributed to, and applied on, all affected online computers with 0patch Agent in PRO or Enterprise accounts (unless Enterprise group settings prevented that).

Vulnerabilities like these get discovered on a regular basis, and attackers know about them all. If you're using Windows that aren't receiving official security updates anymore, 0patch will make sure these vulnerabilities won't be exploited on your computers - and you won't even have to know or care about these things. 

We'd like to thank SSD Secure Disclosure for discovering this vulnerability and publishing their analysis, which allowed us to create a patch and protect 0patch users against this issue.

If you're new to 0patch, create a free account in 0patch Central, start a free trial, then install and register 0patch Agent. Everything else will happen automatically. No computer reboot will be needed.

Did you know 0patch security-adopted Windows 10 and Office 2016 and 2019 when they went out of support this month, allowing you to keep using them for at least 3 more years (5 years for Windows 10)? Read more about it here and here

To learn more about 0patch, please visit our Help Center.








 

Wednesday, March 18, 2026

Micropatches released for Microsoft Access Remote Code Execution Vulnerability (CVE-2025-62552)


 

December 2025 Windows Updates brought a patch for CVE-2025-62552, a remote code execution vulnerability in Microsoft Access that could allow a remote attacker to have their malicious code executed on user's computer upon opening a Word file with an Access database connection.

The vulnerability was discovered and reported to Microsoft by security researcher Alberto Bruscino. Alberto subsequently published a detailed article, and shared their POC with us, which allowed us to reproduce the vulnerability and create patches for it.

 

The Vulnerability 

The vulnerability is in the way Microsoft Access creates a database file in an ODBC connection, whereby a malicious Word file with an Access database connection (such as via the "mail merge" functionality) can create an arbitrary Word file in an Office-trusted location, subsequently resulting in attacker's Word macros being executed with user's identity. (See Alberto's article for a detailed process.)

Among our security-adopted Office versions, we found this vulnerability to affect not only Office 2016 and 2019 click-to-run, but also Office 2013 and Office 2010. Office 2016 and 2019 volume license received an official patch from Microsoft.

 

Microsoft's Patch

Microsoft patched this issue by changing Microsoft Access logic such that using remote database files now also adheres to the already-existing trust model based on Trusted Locations. Various other security decisions have previously been based on the Trusted Locations model, e.g., whether a document opened from a folder is allowed to execute macros, but now the decision to use a remote database file is also included.

Note that this change, while needed for security, has negatively affected various use cases, resulting in an "Operation is not supported" error when remote database connections were used by Office documents outside of trusted locations:

Microsoft Learn: Operation is not supported error in Access and Excel

To resolve this error, users had to either move the affected Office documents to a Trusted Location, or (not recommended) disable this enforcement using the AllowQueryRemoteTables registry value as described in this article (see section "Access Connectivity Engine (ACE)").

Here is another good article on resolving  this error.

 

Our Patch

Our patch is logically identical to Microsoft's. This means that - just like with Microsoft's patch - it can break some existing use cases that involve external database references. Should this happen, we recommend the following course of action:

  1. Try adding the Office document that produces the error to a Trusted Location  (see here for Office 2013, here for Office 2016 and higher), either by moving the document to one of existing trusted locations, or adding a new trusted location where the document resides. In the latter case, be careful not to trust a location where an attacker could potentially place their own malicious Office documents.
  2. If the above fails, disable all relevant patches for CVE-2025-62552 - in PRO accounts, disable patches in 0patch Console locally on the affected computer; in Enterprise accounts, disable patches in 0patch Central for groups containing affected computers.

  

Let's see our patch in action on a fully updated Office 2019 click-to-run, which we have security-adopted last October when it received its last official security patches. The user opens a malicious clickme.docx document while 0patch is disabled and agrees to have Word use an embedded SQL query and run mail merge operation (both of which should not be considered dangerous per se), which leads to an error message about "unreadable content" -- at that time, a malicious file has already been created in an Office-trusted location. With 0patch enabled, the same process produces no file in the Office-trusted location.


 

 

Micropatch Availability

Micropatches were written for the following 32-bit and 64-bit security-adopted Microsoft Office versions:

  1. Microsoft Office 2019 click-to-run - updated with all available updates (version 2508, build 19127.20302)
  2. Microsoft Office 2016 click-to-run - updated with all available updates (version 2508, build 19127.20302)
  3. Microsoft Office 2013 - updated with all available updates
  4. Microsoft Office 2010 - updated with all available updates 

Office 2016 and 2019 volume license received an official patch from Microsoft. 

Micropatches have already been distributed to, and applied on, all affected online computers with 0patch Agent in PRO or Enterprise accounts (unless Enterprise group settings prevented that).

Vulnerabilities like these get discovered on a regular basis, and attackers know about them all. If you're using Windows that aren't receiving official security updates anymore, 0patch will make sure these vulnerabilities won't be exploited on your computers - and you won't even have to know or care about these things. 

We'd like to thank  Alberto Bruscino for sharing vulnerability details and POC, which allowed us to create a patch for this issue and protect our users.

If you're new to 0patch, create a free account in 0patch Central, start a free trial, then install and register 0patch Agent. Everything else will happen automatically. No computer reboot will be needed.

Did you know 0patch security-adopted Windows 10 and Office 2016 and 2019 when they went out of support in October 2025, allowing you to keep using them for at least 3 more years (5 years for Windows 10)? Read more about it here and here

To learn more about 0patch, please visit our Help Center.