CVE-2026-26119

Microsoft · Windows Admin Center

Improper authentication within Microsoft Windows Admin Center enables an authorized attacker to escalate privileges via network access. This flaw facilitates unauthorized administrative control.

Executive summary

A privilege escalation vulnerability in Microsoft Windows Admin Center allows authenticated attackers to elevate their permissions across a network, potentially compromising managed infrastructure.

Vulnerability

This vulnerability stems from improper authentication handling within the Windows Admin Center interface. An attacker who has already obtained authorized access to the network can exploit this flaw to elevate their privileges to a higher level than intended.

Business impact

A successful exploit of this vulnerability could allow a low-privileged user to gain administrative rights over the Windows Admin Center, leading to full control over connected servers and infrastructure. With a CVSS score of 8.8, the risk is classified as High, as it directly threatens the integrity of the management plane and could result in widespread system downtime or unauthorized configuration changes.

Remediation

Immediate Action: Apply the latest security updates provided by Microsoft for Windows Admin Center immediately to resolve the authentication logic error.

Proactive Monitoring: Review Windows Admin Center access logs for unusual login patterns or privilege changes and monitor network traffic for suspicious activity targeting management ports.

Compensating Controls: Restrict access to the Windows Admin Center interface using network-level access control lists (ACLs) or a VPN to ensure only trusted internal devices can reach the service.

Exploitation status

Public Exploit Available: false

Analyst recommendation

The high CVSS score of 8.8 underscores the critical nature of this privilege escalation flaw. Because Windows Admin Center is a gateway to broader server infrastructure, administrators must prioritize the application of the vendor-supplied patch. Immediate remediation is essential to prevent internal lateral movement and unauthorized administrative takeovers.