Cyber Posture

CVE-2026-20965

High

Published: 13 January 2026

Published
13 January 2026
Modified
16 January 2026
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
EPSS Score 0.0003 8.2th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-20965 is a high-severity Improper Verification of Cryptographic Signature (CWE-347) vulnerability in Microsoft Windows Admin Center. Its CVSS base score is 7.5 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Privilege Escalation (T1068); ranked at the 8.2th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploitation for Privilege Escalation (T1068).
Threat & Defense Details

Likely Mitigating ControlsAI

Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.

addresses: CWE-347

Requires verification of digital signatures using organization-approved certificates before installation, directly preventing improper verification of cryptographic signatures.

addresses: CWE-347

Component authenticity commonly depends on cryptographic signatures; the control enforces proper verification of those signatures.

addresses: CWE-347

PKI certificates under an approved policy require cryptographic signature verification on issuance and validation.

addresses: CWE-347

Requires cryptographic signatures on authoritative data and support for verifying the chain of trust.

addresses: CWE-347

Mandates verification of cryptographic signatures (e.g., DNSSEC RRSIG) on resolution responses, addressing missing or bypassed signature checks.

addresses: CWE-347

Integrity tools commonly rely on cryptographic signatures whose improper validation this weakness covers.

addresses: CWE-347

Authenticity validation commonly relies on cryptographic signature or certificate checks that this control enforces.

MITRE ATT&CK Enterprise TechniquesAI

T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
Why these techniques?

Direct local privilege escalation via exploitation of improper cryptographic signature verification in Windows Admin Center.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

Improper verification of cryptographic signature in Windows Admin Center allows an authorized attacker to elevate privileges locally.

Deeper analysisAI

CVE-2026-20965 is an improper verification of cryptographic signature vulnerability affecting Windows Admin Center. Published on 2026-01-13, it is rated 7.5 on the CVSS 3.1 scale (AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H) and maps to CWE-347: Improper Verification of Cryptographic Signature. The flaw enables local privilege escalation due to inadequate signature checks within the software.

An authorized attacker with high privileges and local access to the system can exploit this vulnerability, though it requires high attack complexity and no user interaction. Successful exploitation allows privilege escalation, granting high-impact access to confidentiality, integrity, and availability, with a scope change to other privileged components.

Microsoft's advisory on the MSRC update guide at https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20965 provides details on mitigation and patches for this issue. Security practitioners should consult this reference for specific remediation steps.

Details

CWE(s)

Affected Products

microsoft
windows admin center
≤ 0.70.0.0

CVEs Like This One

CVE-2026-23660Same product: Microsoft Windows Admin Center
CVE-2026-26119Same product: Microsoft Windows Admin Center
CVE-2026-40372Same vendor: Microsoft
CVE-2025-60710Same vendor: Microsoft
CVE-2026-32090Same vendor: Microsoft
CVE-2026-27916Same vendor: Microsoft
CVE-2025-54914Same vendor: Microsoft
CVE-2025-21358Same vendor: Microsoft
CVE-2026-21244Same vendor: Microsoft
CVE-2026-24293Same vendor: Microsoft

References