Who's on the line? Exploiting RCE in Windows Telephony Servi... #1785
+62
−0
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
🤖 Automated Content Update
This PR was automatically generated by the HackTricks News Bot based on a technical blog post.
📝 Source Information
🎯 Content Summary
Vulnerability: CVE-2026-20931 (fixed in January 13, 2026 Patch Tuesday) in the Windows Telephony service (
TapiSrv, implementation intapisrv.dll). When Windows is configured in TAPI server mode, an authenticated remote client (connects via SMB to thetapsrvnamed pipe) can turn TAPI’s remote asynchronous-event “pull” model into an arbitrary controlled 4-byte (DWORD) write to a chosen pre-existing fi...🔧 Technical Details
Unvalidated “mailslot” path → arbitrary file write: If a service treats a user-supplied string as a mailslot path and calls
CreateFileW(path, GENERIC_WRITE, ..., OPEN_EXISTING)without enforcing the\\*\MAILSLOT\namespace (or otherwise verifying it is a mailslot), an attacker can pass a normal filesystem path. If the service later writes protocol/event data to that handle, this becomes a write-where primitive into any existing file writable by the service account. If the data written is a fixed-size field (e.g., a singleDWORD), any attacker-controlled protocol field mapped to that value becomes a controlled small write primitive.Deterministic event generation to repeat small writes: When an event-driven protocol makes it hard to trigger arbitrary events, look for helper routines that always emit an event under controllable conditions (e.g., “notify highest priority recipient”). Control recipient selection by...
🤖 Agent Actions
Summary:
Files Modified/Created:
This PR was automatically created by the HackTricks Feed Bot. Please review the changes carefully before merging.