Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Ukrainian National Sentenced to 5 Years in North Korea IT Worker Fraud Case

March 1, 2026

FBI Reports 1,900 ATM Jackpotting Incidents Since 2020, $20M Lost in 2025

March 1, 2026

Former Google Engineers Indicted Over Trade Secret Transfers to Iran

February 28, 2026
Facebook X (Twitter) Instagram
Sunday, March 1
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»Microsoft Patches CVE-2026-26119 Privilege Escalation in Windows Admin Center
News

Microsoft Patches CVE-2026-26119 Privilege Escalation in Windows Admin Center

Team-CWDBy Team-CWDFebruary 28, 2026No Comments2 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


Microsoft has disclosed a now-patched security flaw in Windows Admin Center that could allow an attacker to escalate their privileges.

Windows Admin Center is a locally deployed, browser-based management tool set that lets users manage their Windows Clients, Servers, and Clusters without the need for connecting to the cloud.

The high-severity vulnerability, tracked as CVE-2026-26119, carries a CVSS score of 8.8 out of a maximum of 10.0

“Improper authentication in Windows Admin Center allows an authorized attacker to elevate privileges over a network,” Microsoft said in an advisory released on February 17, 2026. “The attacker would gain the rights of the user that is running the affected application.”

Microsoft credited Semperis researcher Andrea Pierini with discovering and reporting the vulnerability. It’s worth mentioning that the security issue was patched by the tech giant in Windows Admin Center version 2511 released in December 2025. 

While the Windows maker makes no mention of this vulnerability being exploited in the wild, it has been tagged with an “Exploitation More Likely” assessment.

Technical details related to CVE-2026-26119 are presently under wraps, but that could change soon. In a post shared on LinkedIn, Pierini said the vulnerability could “allow a full domain compromise starting from a standard user” under certain conditions.



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleThreatsDay Bulletin: OpenSSL RCE, Foxit 0-Days, Copilot Leak, AI Password Flaws & 20+ Stories
Next Article INTERPOL Operation Red Card 2.0 Arrests 651 in African Cybercrime Crackdown
Team-CWD
  • Website

Related Posts

News

Ukrainian National Sentenced to 5 Years in North Korea IT Worker Fraud Case

March 1, 2026
News

FBI Reports 1,900 ATM Jackpotting Incidents Since 2020, $20M Lost in 2025

March 1, 2026
News

Former Google Engineers Indicted Over Trade Secret Transfers to Iran

February 28, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Our Picks

Why LinkedIn is a hunting ground for threat actors – and how to protect yourself

January 16, 2026

Watch out for SVG files booby-trapped with malware

September 22, 2025

In memoriam: David Harley

November 12, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.