Researchers at SafeBreach Labs have publicly disclosed PhantomRPC, an undocumented local privilege escalation technique that exploits the Windows COM (Component Object Model) server activation subsystem to elevate from a standard user account to SYSTEM without exploiting a traditional memory corruption vulnerability, using legitimate Windows mechanisms that are not flagged by most endpoint detection and response tools. Microsoft has acknowledged the researcher report but has not issued a patch or committed to a remediation timeline.
How PhantomRPC Works
PhantomRPC targets the COM server activation infrastructure β the Windows subsystem responsible for instantiating COM objects when requested by applications. When a process requests activation of a COM class registered as a LocalServer (a COM server that runs as a separate process), the Windows COM infrastructure handles the activation request via the RPC-based COM Activator service.
The technique exploits a gap in how the COM Activator validates the identity of the requesting process against the security descriptor of the requested COM class. By constructing a specially crafted COM activation request that references a specific class of βout-of-processβ COM servers registered to SYSTEM-level services β combined with a token manipulation operation that the COM Activator performs during activation β an attacker can cause the activation process to launch a controlled payload in the context of a SYSTEM-level service process.
The critical characteristic that makes PhantomRPC particularly relevant to defenders and red teams is that it uses only documented Windows API calls in its execution path. There is no shellcode, no memory corruption, and no kernel-mode component. The technique is therefore not detected by signature-based EDR rules looking for memory exploitation patterns, and behavioural detection requires understanding of the specific COM activation sequence being abused.
Affected Windows Versions
PhantomRPC has been confirmed to work on:
- Windows 10 (all versions through current)
- Windows 11 (all versions)
- Windows Server 2019, 2022, 2025
The technique does not work on systems running in S mode (Windows 10 S/11 S) due to AppContainer restrictions on COM activation. It is also blocked by strict application control policies (WDAC in full enforcement mode) that prevent loading of the required COM server components.
Relevance for Red Teams and Defenders
PhantomRPC does not enable remote exploitation β it requires an attacker to already have local code execution as a standard user. In a penetration testing or red team context, this positions it as a reliable post-exploitation privilege escalation technique for use after phishing, web application exploitation, or credential abuse grants initial access.
For blue teams, the disclosure highlights a class of COM-based privilege escalation techniques that EDR vendors have not historically prioritised detection for. Published and community-contributed detection logic for PhantomRPC specifically is emerging, but generic COM-based LPE detection is not standard across most enterprise EDR configurations.
Red team relevance:
- Suitable for use after gaining standard user code execution via phishing or initial access payloads
- Does not require elevated privileges, special group membership, or vulnerable software beyond Windows itself
- Execution chain is sufficiently distinct from known EoP exploits that threat intelligence overlap with existing detections is low
Defender mitigations (until a patch is available):
- Enable and enforce Windows Defender Application Control (WDAC) β a WDAC policy in full enforcement mode blocks the COM server loading step that PhantomRPC requires; this is the most effective current mitigation
- Apply Microsoftβs COM hardening registry settings β the COM infrastructure has hardening settings available via Group Policy and registry that restrict out-of-process COM server instantiation; consult Microsoftβs COM security hardening documentation for the relevant keys
- Deploy EDR behavioural rules for anomalous COM activation patterns β work with your EDR vendor to determine whether PhantomRPC-specific detection logic is available; as of publication, several major EDR vendors have indicated rules are in development
- Monitor for unusual SYSTEM process spawning β process creation events where a SYSTEM-level parent spawns an unexpected child process are detectable; review current detection coverage for this parent-child pattern in your SIEM
- Include PhantomRPC in penetration testing scope β add this technique to your internal penetration testing and red team assessment scope to verify whether your defensive controls would detect a real attacker using it
Share this article