Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-21223: CWE-269: Improper Privilege Management in Microsoft Microsoft Edge (Chromium-based)

0
Medium
VulnerabilityCVE-2026-21223cvecve-2026-21223cwe-269
Published: Fri Jan 16 2026 (01/16/2026, 21:28:30 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Microsoft Edge (Chromium-based)

Description

Microsoft Edge Elevation Service exposes a privileged COM interface that inadequately validates the privileges of the calling process. A standard (non‑administrator) local user can invoke the IElevatorEdge interface method LaunchUpdateCmdElevatedAndWait, causing the service to execute privileged update commands as LocalSystem. This allows a non‑administrator to enable or disable Windows Virtualization‑Based Security (VBS) by modifying protected system registry keys under HKLM\SYSTEM\CurrentControlSet\Control\DeviceGuard. Disabling VBS weakens critical platform protections such as Credential Guard, Hypervisor‑protected Code Integrity (HVCI), and the Secure Kernel, resulting in a security feature bypass.

AI-Powered Analysis

AILast updated: 02/01/2026, 08:06:02 UTC

Technical Analysis

CVE-2026-21223 is a vulnerability categorized under CWE-269 (Improper Privilege Management) affecting the Microsoft Edge Elevation Service in the Chromium-based Microsoft Edge browser, specifically version 1.0.0.0. The vulnerability arises because the Elevation Service exposes a privileged COM interface (IElevatorEdge) that fails to properly validate the privileges of the calling process. A local user without administrative rights can invoke the interface method LaunchUpdateCmdElevatedAndWait, which causes the Elevation Service to execute update commands with LocalSystem privileges. This escalation allows the attacker to modify protected registry keys under HKLM\SYSTEM\CurrentControlSet\Control\DeviceGuard, effectively enabling or disabling Windows Virtualization-Based Security (VBS). VBS is a critical security feature that leverages hardware virtualization to isolate and protect key system components, including Credential Guard, Hypervisor-protected Code Integrity (HVCI), and the Secure Kernel. Disabling VBS undermines these protections, potentially allowing credential theft, code integrity bypass, and kernel-level attacks. The vulnerability has a CVSS 3.1 base score of 5.1, reflecting medium severity, with attack vector local, low attack complexity, no privileges required, and no user interaction needed. No patches or known exploits are currently reported. The flaw's exploitation scope is limited to local users but can have a broad impact on system security by disabling foundational protection mechanisms.

Potential Impact

For European organizations, this vulnerability poses a significant risk to endpoint security, especially in environments that rely on Windows Virtualization-Based Security to protect sensitive data and maintain system integrity. Disabling VBS can lead to the bypass of Credential Guard, increasing the risk of credential theft and lateral movement within corporate networks. The weakening of Hypervisor-protected Code Integrity and the Secure Kernel can allow attackers to execute unauthorized code at the kernel level, potentially leading to persistent and stealthy compromises. Organizations in sectors with high security requirements, such as finance, healthcare, and critical infrastructure, may face increased exposure to advanced persistent threats if this vulnerability is exploited. Additionally, the local attack vector means that insider threats or attackers who gain limited local access can escalate privileges and disable critical security features, complicating incident response and recovery efforts.

Mitigation Recommendations

To mitigate this vulnerability, organizations should first ensure that all systems are updated with the latest security patches from Microsoft once they become available. Until patches are released, restrict local user access to systems where possible, especially limiting standard user accounts from executing untrusted code or accessing the Microsoft Edge Elevation Service. Employ application control policies to prevent unauthorized invocation of COM interfaces related to the Elevation Service. Monitor registry changes under HKLM\SYSTEM\CurrentControlSet\Control\DeviceGuard for unauthorized modifications indicative of VBS being disabled. Implement endpoint detection and response (EDR) solutions capable of detecting suspicious privilege escalation attempts and registry tampering. Additionally, enforce the principle of least privilege rigorously and conduct regular audits of local user permissions. Consider deploying additional layers of security such as network segmentation and multi-factor authentication to reduce the risk of local attackers gaining initial access.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
microsoft
Date Reserved
2025-12-11T21:02:05.732Z
Cvss Version
null
State
PUBLISHED

Threat ID: 696ab2f1b22c7ad868f75ddc

Added to database: 1/16/2026, 9:51:45 PM

Last enriched: 2/1/2026, 8:06:02 AM

Last updated: 2/7/2026, 10:44:55 AM

Views: 194

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats