The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2026-25178

CVE-2026-25178: Windows 10 1607 Privilege Escalation Flaw

CVE-2026-25178 is a use-after-free privilege escalation vulnerability in Microsoft Windows 10 1607's Ancillary Function Driver for WinSock. Authorized attackers can exploit this locally to gain elevated privileges.

Updated: May 14, 2026

CVE-2026-25178 Overview

CVE-2026-25178 is a use-after-free vulnerability [CWE-416] in the Windows Ancillary Function Driver for WinSock (afd.sys). The flaw allows a locally authenticated attacker to elevate privileges to SYSTEM on affected Windows desktop and Server editions. Microsoft published the advisory on March 10, 2026.

The afd.sys driver is a kernel-mode component that brokers Winsock socket operations between user mode and the TCP/IP stack. Successful exploitation gives an attacker full control of the host, including the ability to install programs, modify data, and create new privileged accounts.

Critical Impact

A low-privileged local user can corrupt kernel memory through afd.sys and gain SYSTEM-level code execution, compromising confidentiality, integrity, and availability of the affected system.

Affected Products

  • Microsoft Windows 10 (versions 1607, 1809, 21H2, 22H2) across x86, x64, and ARM64
  • Microsoft Windows 11 (versions 23H2, 24H2, 25H2, 26H1) on x64 and ARM64
  • Microsoft Windows Server 2012, 2012 R2, 2016, 2019, 2022, 2022 23H2, and Server 2025

Discovery Timeline

  • 2026-03-10 - CVE-2026-25178 published to NVD and Microsoft releases security update
  • 2026-03-13 - Last updated in NVD database

Technical Details for CVE-2026-25178

Vulnerability Analysis

The vulnerability resides in the Ancillary Function Driver for WinSock, afd.sys, which exposes IOCTL interfaces consumed by user-mode Winsock clients. A use-after-free condition occurs when the driver references a kernel object after the underlying allocation has been released. Because the attack complexity is rated high, exploitation requires winning a race or arranging a specific allocation state before the freed object is reused.

Once triggered, an attacker can reclaim the freed memory with attacker-controlled data and influence subsequent driver operations. This leads to arbitrary kernel read or write primitives that can be chained to overwrite a token or callback pointer, yielding code execution in the kernel context.

Root Cause

The root cause is improper object lifetime management within afd.sys. A reference count or synchronization gap allows one code path to free an object while another path retains and uses a pointer to the same memory. The reused pointer then operates on memory whose contents have been replaced by another allocation.

Attack Vector

The attack vector is local. The adversary must already hold low privileges on the target, such as a standard interactive user or a constrained service account. Exploitation typically involves issuing crafted IOCTLs to \\Device\\Afd while manipulating socket state to race the driver into accessing the freed object. User interaction is not required, and the scope remains unchanged because the bug is contained to the local kernel boundary.

No public proof-of-concept code is currently available, and the vulnerability is not listed in the CISA Known Exploited Vulnerabilities catalog. See the Microsoft Security Update Guide for CVE-2026-25178 for vendor-confirmed technical details.

Detection Methods for CVE-2026-25178

Indicators of Compromise

  • Unexpected child processes spawned by non-administrative users with NT AUTHORITY\\SYSTEM integrity
  • Kernel bugchecks or KMODE_EXCEPTION_NOT_HANDLED crashes referencing afd.sys in memory dumps
  • Unsigned or unknown binaries opening handles to \\Device\\Afd followed by token manipulation
  • Anomalous IOCTL traffic to the AFD driver from non-network-oriented processes

Detection Strategies

  • Monitor for process token changes where a non-privileged process suddenly acquires the SYSTEM token, indicating token theft after kernel compromise
  • Hunt for sequences of NtCreateFile on \\Device\\Afd followed by NtDeviceIoControlFile from low-reputation binaries
  • Correlate kernel crash telemetry with subsequent privileged process creation events on the same host
  • Apply behavioral analytics to flag local privilege escalation chains that culminate in lsass.exe access or new local administrator account creation

Monitoring Recommendations

  • Enable Windows Event Log forwarding for Security channel events 4672, 4688, and 4732 and ship them to a centralized SIEM
  • Collect Sysmon Event ID 1 (process creation) and Event ID 10 (process access) to capture privilege transitions
  • Retain kernel minidumps from endpoints to support post-incident driver analysis
  • Track patch compliance for the March 2026 Microsoft security rollup across all Windows servers and workstations

How to Mitigate CVE-2026-25178

Immediate Actions Required

  • Deploy the March 2026 Microsoft security update referenced in the Microsoft Security Update Guide for CVE-2026-25178 to all affected Windows endpoints and servers
  • Prioritize patching multi-user systems such as terminal servers, VDI hosts, and developer workstations where low-privileged accounts are common
  • Audit local account membership and remove unnecessary interactive logon rights to reduce the population of users who could trigger the bug
  • Verify that endpoint protection is active and reporting on every host to detect post-exploitation behavior

Patch Information

Microsoft addressed the vulnerability through cumulative updates released for each supported Windows branch. Administrators should apply the relevant security update via Windows Update, Windows Server Update Services (WSUS), Microsoft Update Catalog, or their configuration management platform. Confirm installation by checking the build number against Microsoft's release notes for the affected SKU.

Workarounds

  • No official workaround replaces the patch; restrict local logon and remote desktop access to trusted administrators until the update is deployed
  • Enforce application allowlisting through Windows Defender Application Control or AppLocker to block unsigned binaries that could deliver the exploit
  • Enable Hypervisor-Protected Code Integrity (HVCI) and Credential Guard to raise the difficulty of kernel-mode exploitation
  • Increase logging verbosity on driver load events and kernel crashes to shorten detection time if exploitation is attempted
bash
# Verify patch installation status on Windows hosts
Get-HotFix | Sort-Object -Property InstalledOn -Descending | Select-Object -First 10

# Check current build to confirm the March 2026 update is applied
[System.Environment]::OSVersion.Version
(Get-ItemProperty 'HKLM:\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion').UBR

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypePrivilege Escalation

  • Vendor/TechWindows

  • SeverityHIGH

  • CVSS Score7.0

  • EPSS Probability0.04%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  • Impact Assessment
  • ConfidentialityHigh
  • IntegrityNone
  • AvailabilityHigh
  • CWE References
  • CWE-416
  • Vendor Resources
  • Microsoft Security Update CVE-2026-25178
  • Related CVEs
  • CVE-2026-41088: Windows 10 21h2 Privilege Escalation Flaw

  • CVE-2026-41095: Windows Server 2012 Privilege Escalation

  • CVE-2026-40382: Windows 10 1607 Privilege Escalation Flaw

  • CVE-2026-40397: Windows 10 1607 Privilege Escalation Flaw
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the Most Advanced Cybersecurity Platform

See how the world’s most intelligent, autonomous cybersecurity platform can protect your organization today and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English