The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2021-36975

CVE-2021-36975: Windows 10 Win32k Privilege Escalation

CVE-2021-36975 is a privilege escalation vulnerability in the Windows 10 Win32k component that allows attackers to gain elevated system privileges. This article covers the technical details, affected versions, and mitigation.

Updated: May 16, 2026

CVE-2021-36975 Overview

CVE-2021-36975 is an elevation of privilege vulnerability in the Microsoft Windows Win32k kernel-mode driver. The flaw affects multiple supported Windows desktop and server releases, including Windows 10, Windows Server 2016, Windows Server 2019, and Windows Server 2022. A local, authenticated attacker who successfully exploits the issue can elevate from a low-integrity user context to SYSTEM-level privileges. Microsoft tracks the weakness under CWE-269: Improper Privilege Management. The CVE was published to the National Vulnerability Database on September 15, 2021.

Critical Impact

Successful exploitation grants SYSTEM privileges on the affected Windows host, providing full confidentiality, integrity, and availability impact on the targeted endpoint.

Affected Products

  • Microsoft Windows 10 (versions 1809, 1909, 2004, 20H2, 21H1)
  • Microsoft Windows Server 2016 and Windows Server 2019
  • Microsoft Windows Server 2022

Discovery Timeline

  • 2021-09-15 - CVE-2021-36975 published to NVD
  • 2024-11-21 - Last updated in NVD database

Technical Details for CVE-2021-36975

Vulnerability Analysis

The vulnerability resides in win32k.sys, the kernel-mode component that handles window management, graphical device interface operations, and user input. Win32k has historically been a frequent source of local privilege escalation flaws because it exposes a large syscall surface from user mode directly into kernel context. Microsoft classifies CVE-2021-36975 as an elevation of privilege issue mapped to [CWE-269], indicating improper privilege management during sensitive kernel operations. Exploitation results in code running at SYSTEM, which allows the attacker to disable security agents, install persistence, dump credentials, or pivot laterally.

Root Cause

The underlying weakness is improper privilege management within Win32k kernel routines reachable from user mode. Microsoft has not published low-level technical details for this issue. Based on the [CWE-269] classification and the local attack vector, the flaw allows a process running with standard user rights to perform an operation that should be reserved for higher-privileged contexts.

Attack Vector

Exploitation requires local access and low-privilege authenticated execution on the target system. No user interaction is needed beyond running the malicious code. Typical delivery paths include execution of a malicious binary after initial access through phishing, a drive-by download, or a compromised application. The attacker invokes the vulnerable Win32k path from a controlled process to obtain a SYSTEM token or arbitrary kernel read/write primitive.

No verified public proof-of-concept code has been published. The vulnerability mechanism is described in prose only — see the Microsoft Security Advisory CVE-2021-36975 for vendor-supplied details.

Detection Methods for CVE-2021-36975

Indicators of Compromise

  • Unexpected child processes of standard user applications running with NT AUTHORITY\SYSTEM integrity.
  • Creation or loading of unsigned drivers shortly after execution of an untrusted binary.
  • Suspicious calls into win32k.sys syscalls from non-GUI processes or short-lived console binaries.

Detection Strategies

  • Monitor for token manipulation patterns where a process token's User SID changes to SYSTEM mid-execution.
  • Hunt for newly spawned processes whose parent runs as a standard user but child runs as SYSTEM without going through services.exe or lsass.exe.
  • Correlate kernel crash events (BugCheck, Event ID 1001) with prior user-mode process activity, which may indicate failed exploitation attempts against Win32k.

Monitoring Recommendations

  • Enable and forward Windows Security, Sysmon, and kernel ETW providers to a centralized analytics pipeline for behavioral correlation.
  • Track installation of unpatched Windows builds across the fleet using authenticated vulnerability scanning.
  • Alert on disablement of endpoint protection services immediately following execution of an unsigned or newly introduced binary.

How to Mitigate CVE-2021-36975

Immediate Actions Required

  • Apply the September 2021 cumulative security updates from Microsoft to all affected Windows 10, Windows Server 2016, 2019, and 2022 systems.
  • Prioritize patching on multi-user systems, jump hosts, and developer workstations where local code execution by standard users is common.
  • Audit local administrator group membership and remove accounts that do not require elevated rights to reduce blast radius.

Patch Information

Microsoft addressed CVE-2021-36975 in the September 2021 Patch Tuesday release. Refer to the Microsoft Security Advisory CVE-2021-36975 for the specific KB articles aligned to each affected Windows build.

Workarounds

  • No vendor-supplied workaround is available. Applying the security update is the only supported mitigation.
  • Restrict the ability of untrusted users to execute arbitrary binaries through application control policies such as Windows Defender Application Control or AppLocker.
  • Enforce least-privilege execution and block macro and script-based initial access vectors to reduce the chance of local code execution.
bash
# Verify the September 2021 cumulative update is installed (PowerShell)
Get-HotFix | Where-Object { $_.InstalledOn -ge (Get-Date "2021-09-14") } | \
    Sort-Object InstalledOn -Descending | \
    Format-Table HotFixID, Description, InstalledOn

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypePrivilege Escalation

  • Vendor/TechWindows

  • SeverityHIGH

  • CVSS Score7.8

  • EPSS Probability0.21%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityHigh
  • CWE References
  • CWE-269
  • Vendor Resources
  • Microsoft Security Advisory CVE-2021-36975
  • Related CVEs
  • CVE-2026-41088: Windows 10 21h2 Privilege Escalation Flaw

  • CVE-2026-41095: Windows Server 2012 Privilege Escalation

  • CVE-2026-40382: Windows 10 1607 Privilege Escalation Flaw

  • CVE-2026-40397: Windows 10 1607 Privilege Escalation Flaw
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English