Microsoft Edge Elevation Service exposes a privileged COM...
Moderate severity
Unreviewed
Published
Jan 17, 2026
to the GitHub Advisory Database
•
Updated Jan 17, 2026
Description
Published by the National Vulnerability Database
Jan 16, 2026
Published to the GitHub Advisory Database
Jan 17, 2026
Last updated
Jan 17, 2026
Microsoft Edge Elevation Service exposes a privileged COM interface that inadequately validates the privileges of the calling process. A standard (non‑administrator) local user can invoke the IElevatorEdge interface method LaunchUpdateCmdElevatedAndWait, causing the service to execute privileged update commands as LocalSystem.
This allows a non‑administrator to enable or disable Windows Virtualization‑Based Security (VBS) by modifying protected system registry keys under HKLM\SYSTEM\CurrentControlSet\Control\DeviceGuard. Disabling VBS weakens critical platform protections such as Credential Guard, Hypervisor‑protected Code Integrity (HVCI), and the Secure Kernel, resulting in a security feature bypass.
References