Windows CVE-2026-2636 PoC Released: Low-Privileged BSOD Crash Exploit


A public proof-of-concept exploit now exists for CVE-2026-2636 in Windows Common Log File System (CLFS) driver. Any low-privileged user can trigger an unrecoverable Blue Screen of Death (BSOD) crash. Ricardo Narvaja of Fortra discovered this denial-of-service flaw during CLFS research.

The issue lies in improper flag validation in CLFS!CClfsRequest::ReadLogPagingIo within CLFS.sys (version 10.0.22621.5037). Attackers craft an I/O Request Packet (IRP) with both IRP_PAGING_IO and IRP_INPUT_OPERATION flags disabled. This sends the driver down a faulty path straight to nt!KeBugCheckEx, the kernel panic handler.

Microsoft fixed it silently in the September 2025 cumulative update for Windows 11 2024 LTSC and Windows Server 2025. Windows 11 25H2 includes the patch from launch. Older versions like Windows 11 23H2 remain exposed.

Technical Breakdown

The PoC uses just two standard Windows API calls from user space. First, CreateLogFile grabs a valid .blf log file handle. Then, ReadFile targets that handle immediately. CLFS expects paging or input flags set for such reads. With flags off (AL=0x0), it mishandles the request.

This triggers a deterministic crash chain. KERNELBASE!ReadFile escalates to nt!NtReadFile, through CLFS dispatch routines, ending in KeBugCheckEx. No elevated privileges, binaries, or heap spraying needed. CVSS score sits at 5.5 due to local attack vector but high impact.

The flag value 0x42 lacks public Microsoft documentation. This gap aided the unexpected behavior. Core Security blog confirms reproducibility across tested setups.

The PoC triggers nt!KeBugCheckEx is causing a system crash (source: coresecurity )

Exploit Simplicity

Attackers need no special tools. A simple script runs the API sequence. Shared enterprise systems face high risk from untrusted local users. Kiosks and multi-user workstations become prime targets.

Fortra’s analysis shows the BSOD hits instantly. Systems enter unrecoverable state, halting all operations. Recovery demands full reboot.

CLFS vulnerabilities recur often. Past flaws include CVE-2022-37969, CVE-2023-28252, CVE-2024-6768, and ransomware-hit CVE-2025-29824. All trace to CLFS.sys.

meaning of IRP_PAGING_IO (source: coresecurity)

Affected Versions and Fixes

Windows VersionStatusFix Details
Windows 11 23H2VulnerableApply Sept 2025 update or later
Windows 11 2024 LTSCPatchedSeptember 2025 cumulative
Windows Server 2025PatchedSeptember 2025 cumulative
Windows 11 25H2PatchedShips with fix

Mitigation Steps

  • Deploy September 2025 or newer cumulative updates now.
  • Upgrade supported systems to Windows 11 2024 LTSC or 25H2.
  • Limit local logon rights on critical machines.
  • Monitor ReadFile calls against CLFS log handles.
  • Audit multi-user environments first.

FAQ

What causes CVE-2026-2636 BSOD?

CLFS driver mishandles ReadFile on log handles with disabled paging/input flags.

Who found it?

Ricardo Narvaja from Fortra. PoC published via Core Security.

Which Windows versions suffer?

Windows 11 23H2 and earlier; fixed in Sept 2025 updates.

How easy is exploitation?

Two API calls from low-priv user space. No admin rights needed.

What is the CVSS score?

5.5 (Medium), local vector, high denial-of-service impact.

How to patch?

Install latest cumulative updates; prioritize unpatched 23H2 systems.

Readers help support VPNCentral. We may get a commission if you buy through our links. Tooltip Icon

Read our disclosure page to find out how can you help VPNCentral sustain the editorial team Read more

User forum

0 messages