Windows Push Notifications Vulnerability: Local Privilege Escalation Risk
The National Vulnerability Database (NVD) recently detailed CVE-2026-26167, a high-severity vulnerability impacting Windows Push Notifications. This flaw, rated with a CVSS score of 8.8, stems from a classic race condition scenario (CWE-362) involving concurrent execution using shared resources with improper synchronization.
According to the National Vulnerability Database, an authorized attacker can exploit this weakness to elevate privileges locally. The underlying issue is also classified under CWE-416, Use After Free, which often accompanies race conditions, leading to unpredictable system states and potential privilege escalation. While specific affected products weren’t detailed by the National Vulnerability Database, the mention of Windows Push Notifications suggests a broad impact across various Windows operating systems.
Related ATT&CK Techniques
🛡️ Detection Rules
2 rules · 5 SIEM formats2 auto-generated detection rules for this incident, mapped to MITRE ATT&CK. Available in Sigma, Splunk SPL, Sentinel KQL, Elastic Lucene, and QRadar AQL.
Privilege Escalation Attempt Detection
Get this rule in your SIEM's native format — copy, paste, detect. No manual conversion.
2 Sigma rules mapped to the ATT&CK techniques from this breach — pick your SIEM and get a ready-to-paste query.
Get Detection Rules →Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-26167 | Privilege Escalation | Windows Push Notifications |
| CVE-2026-26167 | Race Condition | Concurrent execution using shared resource with improper synchronization |