CVE-2026-21223: CWE-269: Improper Privilege Management in Microsoft Microsoft Edge (Chromium-based)
Microsoft Edge Elevation Service exposes a privileged COM interface that inadequately validates the privileges of the calling process. A standard (non‑administrator) local user can invoke the IElevatorEdge interface method LaunchUpdateCmdElevatedAndWait, causing the service to execute privileged update commands as LocalSystem. This allows a non‑administrator to enable or disable Windows Virtualization‑Based Security (VBS) by modifying protected system registry keys under HKLM\SYSTEM\CurrentControlSet\Control\DeviceGuard. Disabling VBS weakens critical platform protections such as Credential Guard, Hypervisor‑protected Code Integrity (HVCI), and the Secure Kernel, resulting in a security feature bypass.
AI Analysis
Technical Summary
CVE-2026-21223 is a vulnerability categorized under CWE-269 (Improper Privilege Management) affecting the Microsoft Edge Elevation Service in the Chromium-based Microsoft Edge browser, specifically version 1.0.0.0. The vulnerability arises because the Elevation Service exposes a privileged COM interface (IElevatorEdge) that fails to properly validate the privileges of the calling process. A local user without administrative rights can invoke the interface method LaunchUpdateCmdElevatedAndWait, which causes the Elevation Service to execute update commands with LocalSystem privileges. This escalation allows the attacker to modify protected registry keys under HKLM\SYSTEM\CurrentControlSet\Control\DeviceGuard, effectively enabling or disabling Windows Virtualization-Based Security (VBS). VBS is a critical security feature that leverages hardware virtualization to isolate and protect key system components, including Credential Guard, Hypervisor-protected Code Integrity (HVCI), and the Secure Kernel. Disabling VBS undermines these protections, potentially allowing credential theft, code integrity bypass, and kernel-level attacks. The vulnerability has a CVSS 3.1 base score of 5.1, reflecting medium severity, with attack vector local, low attack complexity, no privileges required, and no user interaction needed. No patches or known exploits are currently reported. The flaw's exploitation scope is limited to local users but can have a broad impact on system security by disabling foundational protection mechanisms.
Potential Impact
For European organizations, this vulnerability poses a significant risk to endpoint security, especially in environments that rely on Windows Virtualization-Based Security to protect sensitive data and maintain system integrity. Disabling VBS can lead to the bypass of Credential Guard, increasing the risk of credential theft and lateral movement within corporate networks. The weakening of Hypervisor-protected Code Integrity and the Secure Kernel can allow attackers to execute unauthorized code at the kernel level, potentially leading to persistent and stealthy compromises. Organizations in sectors with high security requirements, such as finance, healthcare, and critical infrastructure, may face increased exposure to advanced persistent threats if this vulnerability is exploited. Additionally, the local attack vector means that insider threats or attackers who gain limited local access can escalate privileges and disable critical security features, complicating incident response and recovery efforts.
Mitigation Recommendations
To mitigate this vulnerability, organizations should first ensure that all systems are updated with the latest security patches from Microsoft once they become available. Until patches are released, restrict local user access to systems where possible, especially limiting standard user accounts from executing untrusted code or accessing the Microsoft Edge Elevation Service. Employ application control policies to prevent unauthorized invocation of COM interfaces related to the Elevation Service. Monitor registry changes under HKLM\SYSTEM\CurrentControlSet\Control\DeviceGuard for unauthorized modifications indicative of VBS being disabled. Implement endpoint detection and response (EDR) solutions capable of detecting suspicious privilege escalation attempts and registry tampering. Additionally, enforce the principle of least privilege rigorously and conduct regular audits of local user permissions. Consider deploying additional layers of security such as network segmentation and multi-factor authentication to reduce the risk of local attackers gaining initial access.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden, Belgium, Poland, Finland
CVE-2026-21223: CWE-269: Improper Privilege Management in Microsoft Microsoft Edge (Chromium-based)
Description
Microsoft Edge Elevation Service exposes a privileged COM interface that inadequately validates the privileges of the calling process. A standard (non‑administrator) local user can invoke the IElevatorEdge interface method LaunchUpdateCmdElevatedAndWait, causing the service to execute privileged update commands as LocalSystem. This allows a non‑administrator to enable or disable Windows Virtualization‑Based Security (VBS) by modifying protected system registry keys under HKLM\SYSTEM\CurrentControlSet\Control\DeviceGuard. Disabling VBS weakens critical platform protections such as Credential Guard, Hypervisor‑protected Code Integrity (HVCI), and the Secure Kernel, resulting in a security feature bypass.
AI-Powered Analysis
Technical Analysis
CVE-2026-21223 is a vulnerability categorized under CWE-269 (Improper Privilege Management) affecting the Microsoft Edge Elevation Service in the Chromium-based Microsoft Edge browser, specifically version 1.0.0.0. The vulnerability arises because the Elevation Service exposes a privileged COM interface (IElevatorEdge) that fails to properly validate the privileges of the calling process. A local user without administrative rights can invoke the interface method LaunchUpdateCmdElevatedAndWait, which causes the Elevation Service to execute update commands with LocalSystem privileges. This escalation allows the attacker to modify protected registry keys under HKLM\SYSTEM\CurrentControlSet\Control\DeviceGuard, effectively enabling or disabling Windows Virtualization-Based Security (VBS). VBS is a critical security feature that leverages hardware virtualization to isolate and protect key system components, including Credential Guard, Hypervisor-protected Code Integrity (HVCI), and the Secure Kernel. Disabling VBS undermines these protections, potentially allowing credential theft, code integrity bypass, and kernel-level attacks. The vulnerability has a CVSS 3.1 base score of 5.1, reflecting medium severity, with attack vector local, low attack complexity, no privileges required, and no user interaction needed. No patches or known exploits are currently reported. The flaw's exploitation scope is limited to local users but can have a broad impact on system security by disabling foundational protection mechanisms.
Potential Impact
For European organizations, this vulnerability poses a significant risk to endpoint security, especially in environments that rely on Windows Virtualization-Based Security to protect sensitive data and maintain system integrity. Disabling VBS can lead to the bypass of Credential Guard, increasing the risk of credential theft and lateral movement within corporate networks. The weakening of Hypervisor-protected Code Integrity and the Secure Kernel can allow attackers to execute unauthorized code at the kernel level, potentially leading to persistent and stealthy compromises. Organizations in sectors with high security requirements, such as finance, healthcare, and critical infrastructure, may face increased exposure to advanced persistent threats if this vulnerability is exploited. Additionally, the local attack vector means that insider threats or attackers who gain limited local access can escalate privileges and disable critical security features, complicating incident response and recovery efforts.
Mitigation Recommendations
To mitigate this vulnerability, organizations should first ensure that all systems are updated with the latest security patches from Microsoft once they become available. Until patches are released, restrict local user access to systems where possible, especially limiting standard user accounts from executing untrusted code or accessing the Microsoft Edge Elevation Service. Employ application control policies to prevent unauthorized invocation of COM interfaces related to the Elevation Service. Monitor registry changes under HKLM\SYSTEM\CurrentControlSet\Control\DeviceGuard for unauthorized modifications indicative of VBS being disabled. Implement endpoint detection and response (EDR) solutions capable of detecting suspicious privilege escalation attempts and registry tampering. Additionally, enforce the principle of least privilege rigorously and conduct regular audits of local user permissions. Consider deploying additional layers of security such as network segmentation and multi-factor authentication to reduce the risk of local attackers gaining initial access.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- microsoft
- Date Reserved
- 2025-12-11T21:02:05.732Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 696ab2f1b22c7ad868f75ddc
Added to database: 1/16/2026, 9:51:45 PM
Last enriched: 2/1/2026, 8:06:02 AM
Last updated: 2/7/2026, 10:44:55 AM
Views: 194
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2082: OS Command Injection in D-Link DIR-823X
MediumCVE-2026-2080: Command Injection in UTT HiPER 810
HighCVE-2026-2079: Improper Authorization in yeqifu warehouse
MediumCVE-2026-1675: CWE-1188 Initialization of a Resource with an Insecure Default in brstefanovic Advanced Country Blocker
MediumCVE-2026-1643: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ariagle MP-Ukagaka
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.