CVE ID CVE-2026-20817
Full Title Windows Error Reporting Service Elevation of Privilege Vulnerability
Severity Important
CVSS Score 7.8 / 10 (HIGH)
Impact Elevation of Privilege (SYSTEM)
Attack Vector Local
Attack Complexity Low
Privileges Required Low (standard user)
User Interaction None
Exploited in Wild No
Public PoC Yes (post-patch)
MSRC Assessment Exploitation More Likely
Patched January 13, 2026 (January Patch Tuesday)
NVD Entry CVE-2026-20817

Affected Versions and Patches

OS / Version Patch KB
Windows 11 24H2 KB5074109
Windows 11 23H2 KB5073455
Windows 10 22H2 KB5073724
Windows Server 2025 KB5073379
Windows Server 2022 KB5073457
Windows Server 2022 23H2 KB5073450

A proof-of-concept exploit for CVE-2026-20817 just hit GitHub, and it's already making the rounds in security circles. This one targets the Windows Error Reporting (WER) service, specifically through an ALPC (Advanced Local Procedure Call) flaw that lets a local attacker jump straight to SYSTEM-level privileges. If you manage Windows machines in any capacity, this needs your attention right now.

What's the Vulnerability?

The Windows Error Reporting service runs as SYSTEM and uses ALPC to communicate between processes. CVE-2026-20817 exploits a flaw in how WER handles these interprocess calls. An attacker who already has local access (even as a low-privilege user) can abuse the WER service to escalate their permissions all the way to SYSTEM.

In plain terms: a standard user account can become a full administrator without triggering UAC prompts or needing any credentials.

The public PoC demonstrates the full chain from unprivileged user to SYSTEM shell. That means this isn't theoretical. It's working code, available to anyone who knows where to look.

Who's Affected?

This impacts most supported versions of Windows, including:

  • Windows 10 (all supported builds)
  • Windows 11 (22H2, 23H2, 24H2, 25H2)
  • Windows Server 2019, 2022, and 2025

If the Windows Error Reporting service is running (it is by default on nearly every Windows installation), you're exposed.

How to Fix It

Step 1: Install the latest Windows security updates

Open Settings, go to Windows Update, and check for updates. Microsoft addressed this in their January 2026 Patch Tuesday (released January 13, 2026). Install everything available and reboot.

# Check your current patch level
Get-HotFix | Sort-Object InstalledOn -Descending | Select-Object -First 5

Step 2: Verify the WER service configuration

While you're patching, confirm the WER service isn't set to something unexpected:

Get-Service -Name WerSvc | Select-Object Name, Status, StartType

On most workstations, the start type is Manual. If you don't rely on crash reporting, you can disable it temporarily as a mitigation while patching rolls out:

# Temporary mitigation only - re-enable after patching
Set-Service -Name WerSvc -StartupType Disabled
Stop-Service -Name WerSvc -Force

Step 3: Check for signs of exploitation

Look at recent Event Viewer entries under Application for anything unusual from the WER service:

Get-WinEvent -FilterHashtable @{LogName='Application'; ProviderName='Windows Error Reporting'} -MaxEvents 20 |
  Select-Object TimeCreated, Id, Message | Format-Table -Wrap

Unusual spikes in WER events, especially around the time of user logins, could indicate someone testing or using this exploit.

Why This One Matters

Local privilege escalation bugs don't get the same headlines as remote code execution, but they're the bread and butter of post-compromise activity. An attacker who gets onto a machine through phishing or a drive-by download starts as a regular user. CVE-2026-20817 is exactly the kind of bug they use to go from "I'm on the box" to "I own the box."

The public PoC makes this especially urgent. It lowers the skill bar significantly. You don't need to be a researcher to use it.

Bottom Line

Patch immediately. If you can't patch right away, disable the WER service as a stopgap. Monitor for unusual WER activity in your logs.

If your organization needs help rolling out patches or assessing exposure across your environment, reach out to our team for assistance.