Source: Cyber Security News
Author: Guru Baran
URL: https://cybersecuritynews.com/new-windows-rpc-vulnerability/
ONE SENTENCE SUMMARY:
PhantomRPC exploits Windows RPC design to impersonate privileged clients via spoofed offline endpoints, enabling SYSTEM escalation across versions.
MAIN POINTS:
- Kaspersky disclosed PhantomRPC at Black Hat Asia 2026 as an architectural Windows RPC weakness.
- Vulnerability impacts rpcrt4.dll behavior when clients contact unavailable or disabled RPC servers.
- RPC runtime fails to authenticate that the responding server is the intended legitimate endpoint.
- Attackers can stand up a fake RPC server to intercept privileged connection attempts.
- RpcImpersonateClient enables the malicious server to assume the privileged client’s security context.
- gpupdate coercion abuses disabled TermService to gain SYSTEM via Group Policy Client RPC calls.
- Microsoft Edge startup can trigger TermService RPC leading to Network Service-to-Administrator escalation.
- WdiSystemHost periodically polls TermService, allowing opportunistic SYSTEM escalation without user interaction.
- DHCP disabled plus ipconfig-triggered RPC can elevate Local Service to Administrator.
- Microsoft closed the report without CVE or patch, citing SeImpersonatePrivilege prerequisites.
TAKEAWAYS:
- Monitor ETW for RPC_S_SERVER_UNAVAILABLE events paired with high impersonation-level connections.
- Reduce hijack opportunities by keeping commonly targeted services enabled where operationally feasible.
- Minimize SeImpersonatePrivilege assignments to only essential built-in components.
- Audit systems for privileged RPC clients contacting optional or disabled endpoints.
- Use Kaspersky’s PhantomRPC GitHub tools to test and map exploitable RPC call patterns.