Windows Message Queuing Privilege Escalation

HIGH (7.8)

Threat Intelligence

Low Risk
EPSS Score: 0.09% chance of exploitation (percentile: 26%)
🔍 Detection Tools: None available in major open-source tools
⚔️ Exploit Availability: No public exploits found

How we test →

What is it?

Windows Message Queuing is a service that enables applications to send and receive messages between processes. This vulnerability allows an authorized attacker to elevate privileges locally by exploiting improper input validation in the Windows Message Queuing.

Am I affected?

You're affected if you use Improper. Specific version info not stated in the advisory.

How to fix

  1. Apply the security update from Microsoft Security Update Guide - Microsoft Security Response Center (https://www.microsoft.com/en-us/security/updates-guide).
  2. Immediate mitigations:
  3. Disable Windows Message Queuing service until the patch is applied.
  4. Restrict network access to your system to prevent unauthorized message queueing.

References