New Windows RPC Vulnerability Lets Attackers Escalate Privileges to SYSTEM


A newly disclosed Windows RPC vulnerability called PhantomRPC can let attackers escalate privileges from low-privileged service accounts to SYSTEM or Administrator-level access. Kaspersky presented the research at Black Hat Asia 2026 and said Microsoft has not issued a patch or CVE for the issue.

PhantomRPC affects how Windows Remote Procedure Call handles connections when a legitimate RPC server is unavailable. Instead of exploiting a memory corruption bug, the attack abuses Windows RPC architecture and allows a malicious local process to impersonate a fake server endpoint.

Kaspersky researcher Haidar Kabibo said the technique likely applies to all Windows versions, since it targets architectural behavior in RPC rather than a single vulnerable component. The attack still requires the compromised process to hold impersonation rights, such as SeImpersonatePrivilege.

How PhantomRPC works

Windows RPC lets one process call functions exposed by another process, even when both run in different security contexts. Microsoft describes RPC as a technology for building client and server programs, while Kaspersky notes that Windows uses it heavily across system DLLs and services.

PhantomRPC appears when a privileged Windows process tries to contact an RPC server that is offline, disabled, or unavailable. Kaspersky found that an attacker who already controls a process running as Network Service or Local Service can create a fake RPC server that exposes the expected interface and endpoint.

When the privileged client connects to the fake endpoint, the attacker’s server can call RpcImpersonateClient. Microsoft’s documentation says an RPC server thread can use this function to impersonate the active client. In PhantomRPC scenarios, that client can run as SYSTEM or as an administrator.

Malicious RPC Server (Kaspersky)

Five attack paths shown by Kaspersky

Kaspersky demonstrated five exploitation paths. Some require a trigger, some wait for user activity, and one relies on background service behavior.

Attack pathTriggerResult described by Kaspersky
Group Policy Clientgpupdate.exe /forceNetwork Service to SYSTEM
Microsoft Edge startupAdministrator launches EdgeNetwork Service to Administrator
WDI background serviceAutomatic polling every 5 to 15 minutesNetwork Service to SYSTEM
ipconfig.exe and DHCP ClientAdministrator runs ipconfig.exeLocal Service to Administrator
w32tm.exe and Windows TimeAdministrator runs w32tm.exeLocal Service to Administrator

The Group Policy path abuses calls to TermService, the Remote Desktop service. If TermService is unavailable, a fake RPC server can mimic the TermService endpoint and impersonate the SYSTEM-level Group Policy Client after gpupdate.exe /force runs.

The Edge path needs a high-privileged user to launch msedge.exe. Kaspersky found that Edge startup can trigger an RPC call to TermService with a high impersonation level, which lets the fake server impersonate the administrator-level client.

Background services increase the risk

The WDI scenario raises concern because it does not require user interaction. Kaspersky found that the Diagnostic System Host service periodically makes RPC calls to TermService every 5 to 15 minutes, and those calls can allow escalation to SYSTEM when the attacker’s fake endpoint receives them.

The DHCP and Windows Time scenarios show that PhantomRPC does not only affect TermService. In the DHCP case, ipconfig.exe can trigger an internal RPC request when the DHCP Client service is unavailable. In the Windows Time case, w32tm.exe first tries to connect to a nonexistent named pipe, \PIPE\W32TIME, which an attacker can expose through a malicious RPC server.

That pattern matters for defenders. Kaspersky warned that many more paths may exist because Windows services and DLLs rely on RPC across the operating system.

Microsoft classified the issue as moderate

Kaspersky said it reported the issue to the Microsoft Security Response Center on September 19, 2025. Microsoft responded 20 days later and classified the issue as moderate severity because exploitation requires the originating process to already have SeImpersonatePrivilege.

Kaspersky said Microsoft did not assign a CVE and closed the case without immediate tracking or a scheduled patch. The security firm published the research after the disclosure embargo ended and said it would avoid releasing instructions that could enable mass exploitation.

The decision may frustrate defenders because Network Service and Local Service commonly hold impersonation-related capabilities in Windows environments. Attackers who compromise a service running under those identities may use PhantomRPC as a post-exploitation escalation route.

What defenders should monitor

Kaspersky recommends ETW-based RPC monitoring to detect suspicious failures when privileged clients attempt to contact unavailable RPC servers. The research focuses on RPC stop events, especially cases involving RPC_S_SERVER_UNAVAILABLE, high-privileged client processes, and high impersonation levels.

Security teams should also reduce unnecessary use of SeImpersonatePrivilege. Kaspersky warns that organizations sometimes grant it to custom or third-party services that do not strictly need it, which increases the local privilege escalation risk.

Recommended actions include:

  • Enable ETW-based RPC monitoring.
  • Watch for RPC_S_SERVER_UNAVAILABLE events from privileged processes.
  • Identify services that expose unavailable RPC endpoints.
  • Enable legitimate services where feasible, so attackers cannot hijack expected endpoints.
  • Restrict SeImpersonatePrivilege to processes that truly require it.
  • Review custom services running as Network Service or Local Service.
  • Test exposure with Kaspersky’s PhantomRPC research tools in controlled environments.

Why PhantomRPC matters

PhantomRPC gives attackers a way to turn limited local compromise into SYSTEM-level access under specific conditions. That makes it useful after an attacker already lands on a machine through another bug, weak service configuration, exposed web application, or compromised third-party process.

The issue also shows why architectural bugs can create long-term risk. A single patch may not close every possible abuse path if the weakness appears across many RPC-dependent services and DLLs.

For enterprises, the practical response starts with visibility. Teams should know which services run with impersonation rights, which RPC endpoints regularly fail, and which disabled services create endpoint gaps attackers can imitate.

Summary

  1. Kaspersky disclosed PhantomRPC at Black Hat Asia 2026.
  2. The issue affects Windows RPC architecture and can enable local privilege escalation.
  3. Attackers need control of a process with impersonation rights, such as Network Service or Local Service.
  4. Kaspersky demonstrated five attack paths involving Group Policy, Edge, WDI, DHCP, and Windows Time.
  5. Microsoft classified the issue as moderate, assigned no CVE, and did not issue an immediate patch.

FAQ

What is PhantomRPC?

PhantomRPC is a Windows RPC privilege escalation technique disclosed by Kaspersky. It abuses RPC behavior when legitimate servers are unavailable and lets a fake RPC server impersonate privileged clients.

Does PhantomRPC allow remote code execution?

No. Kaspersky describes PhantomRPC as a local privilege escalation technique. Attackers first need control of a local process with impersonation rights.

Does PhantomRPC affect all Windows versions?

Kaspersky said the technique likely affects all Windows versions because it stems from RPC architecture rather than one vulnerable component.

Has Microsoft patched PhantomRPC?

Microsoft has not issued a patch or CVE, according to Kaspersky. Microsoft classified the issue as moderate because exploitation requires SeImpersonatePrivilege.

Readers help support VPNCentral. We may get a commission if you buy through our links. Tooltip Icon

Read our disclosure page to find out how can you help VPNCentral sustain the editorial team Read more

User forum

0 messages