CVE-2026-21223 Overview
Microsoft Edge Elevation Service exposes a privileged COM interface that inadequately validates the privileges of the calling process. A standard (non-administrator) local user can invoke the IElevatorEdge interface method LaunchUpdateCmdElevatedAndWait, causing the service to execute privileged update commands as LocalSystem.
This allows a non-administrator to enable or disable Windows Virtualization-Based Security (VBS) by modifying protected system registry keys under HKLM\SYSTEM\CurrentControlSet\Control\DeviceGuard. Disabling VBS weakens critical platform protections such as Credential Guard, Hypervisor-protected Code Integrity (HVCI), and the Secure Kernel, resulting in a security feature bypass.
Critical Impact
Local privilege escalation via improper COM interface validation allows non-privileged users to disable critical Windows security features including VBS, Credential Guard, and HVCI.
Affected Products
- Microsoft Edge Elevation Service
- Windows systems with Microsoft Edge installed
- Systems utilizing Virtualization-Based Security (VBS)
Discovery Timeline
- 2026-01-16 - CVE-2026-21223 published to NVD
- 2026-01-16 - Last updated in NVD database
Technical Details for CVE-2026-21223
Vulnerability Analysis
This vulnerability stems from improper privilege management (CWE-269) in the Microsoft Edge Elevation Service. The service exposes a COM interface (IElevatorEdge) that is designed to perform privileged operations on behalf of the Edge browser during update processes. However, the interface fails to adequately validate whether the calling process has sufficient privileges to request these elevated operations.
The LaunchUpdateCmdElevatedAndWait method allows callers to execute commands with LocalSystem privileges, which is the highest privilege level on Windows systems. By exploiting this flaw, a standard user without administrative rights can leverage the Elevation Service to modify protected registry keys that control Windows security features.
The impact is particularly severe because it enables attackers to disable Virtualization-Based Security, which serves as a foundational security layer for modern Windows protection mechanisms. When VBS is disabled, downstream protections including Credential Guard (which protects authentication credentials), HVCI (which ensures kernel code integrity), and the Secure Kernel are all compromised.
Root Cause
The root cause is improper privilege management in the COM interface implementation. The IElevatorEdge interface does not perform adequate authorization checks to verify that the calling process has the necessary privileges before executing elevated commands. This design flaw allows any local user to invoke privileged methods through the exposed COM interface, bypassing the principle of least privilege.
Attack Vector
The attack requires local access to the target system. An attacker with a standard user account can interact with the Edge Elevation Service's COM interface to invoke the LaunchUpdateCmdElevatedAndWait method. This method executes with LocalSystem privileges, enabling the attacker to modify protected registry keys under HKLM\SYSTEM\CurrentControlSet\Control\DeviceGuard.
The attack chain involves:
- A non-privileged local user instantiates the IElevatorEdge COM interface
- The attacker calls LaunchUpdateCmdElevatedAndWait with crafted parameters
- The Elevation Service executes the command with LocalSystem privileges
- Registry modifications disable VBS and associated security features
- System security posture is significantly weakened, facilitating further attacks
For detailed technical information, refer to the Microsoft Security Update CVE-2026-21223.
Detection Methods for CVE-2026-21223
Indicators of Compromise
- Unexpected modifications to registry keys under HKLM\SYSTEM\CurrentControlSet\Control\DeviceGuard
- Unusual COM interface calls to the Edge Elevation Service from non-browser processes
- Changes to VBS, Credential Guard, or HVCI configuration without administrator action
- Event logs showing elevation_service.exe executing unexpected commands
Detection Strategies
- Monitor for registry modifications to DeviceGuard-related keys, particularly EnableVirtualizationBasedSecurity, RequirePlatformSecurityFeatures, and HypervisorEnforcedCodeIntegrity
- Implement COM interface access monitoring for IElevatorEdge calls originating from processes other than legitimate Microsoft Edge components
- Enable Windows Security Event logging for privilege escalation attempts (Event IDs 4672, 4673)
- Deploy endpoint detection rules that alert on non-privileged processes interacting with the Edge Elevation Service
Monitoring Recommendations
- Configure SIEM rules to detect changes to VBS-related registry keys
- Establish baseline monitoring for Edge Elevation Service activity and alert on anomalies
- Review security audit logs for evidence of COM interface abuse
- Implement file integrity monitoring on critical Windows security configuration areas
How to Mitigate CVE-2026-21223
Immediate Actions Required
- Apply the latest Microsoft security updates for Microsoft Edge as soon as available
- Review and audit DeviceGuard registry settings to ensure VBS remains properly configured
- Restrict local user access where possible to reduce the attack surface
- Enable enhanced monitoring for Edge Elevation Service activities
Patch Information
Microsoft has released a security update addressing this vulnerability. Administrators should apply the patch through standard Windows Update mechanisms or deploy via enterprise patch management solutions. For detailed patch information, see the Microsoft Security Update CVE-2026-21223.
Workarounds
- Restrict access to the Edge Elevation Service by modifying DCOM permissions to limit which users can invoke the IElevatorEdge interface
- Implement application control policies to restrict execution of non-essential COM components
- Consider temporarily disabling the Edge Elevation Service in high-security environments until patching is complete (note: this may impact Edge auto-updates)
- Enable Secure Boot and ensure firmware-level protections are active to mitigate impact of VBS bypass
# Verify VBS status using PowerShell
Get-CimInstance -ClassName Win32_DeviceGuard -Namespace root\Microsoft\Windows\DeviceGuard | Select-Object VirtualizationBasedSecurityStatus, SecurityServicesRunning
# Check DeviceGuard registry configuration
reg query "HKLM\SYSTEM\CurrentControlSet\Control\DeviceGuard" /s
Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.


