This is my analysis (and PoC) for CVE-2026-20817, a privilege escalation in the Windows Error Reporting service.
👉 https://itm4n.github.io/cve-2026-20817-wersvc-eop/
Credit goes to Denis Faiustov and Ruslan Sayfiev for the discovery.
TL;DR A low privilege user could send an ALPC message to the WER service and coerce it to start a WerFault.exe process as SYSTEM with user-controlled arguments and options. I did not achieve arbitrary code execution, but perhaps someone knows how this can be done? 🤷♂️
NetAskari believes a recent hack and leak from China's National Super Computer Center of China (NSCC) might be real
https://netaskari.substack.com/p/chinas-massive-data-leak-of-military
Has anyone ever heard of a security breach of a Fedramp moderate or higher authorized environment? I mean the parts that are authorized.
A vulnerability in a Linux enterprise app can allow attackers root access over devices
The issue impacts Himmelblau, an interoperability suite to integrate Linux with Entra ID and Intune networks.