Cyber Posture

CVE-2026-21223

HighLPE

Published: 16 January 2026

Published
16 January 2026
Modified
22 February 2026
KEV Added
Patch
CVSS Score 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
EPSS Score 0.0003 8.0th percentile
Risk Priority 14 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-21223 is a high-severity Improper Privilege Management (CWE-269) vulnerability in Microsoft Edge Chromium. Its CVSS base score is 7.1 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Privilege Escalation (T1068); ranked at the 8.0th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploitation for Privilege Escalation (T1068) and 1 other technique.
Threat & Defense Details

Likely Mitigating ControlsAI

Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.

addresses: CWE-269

Policy addresses roles, responsibilities, and privilege management to prevent improper privilege assignments.

addresses: CWE-269

Access supervision ensures privileges are assigned and managed without improper escalation or retention.

addresses: CWE-269

Assigning group/role memberships and access authorizations (privileges) while reviewing accounts addresses improper privilege management.

addresses: CWE-269

Enforces proper privilege management by requiring all decisions through the verified reference monitor.

addresses: CWE-269

By mandating division of duties across roles, the control enforces proper privilege management and prevents a single entity from controlling an entire sensitive process.

addresses: CWE-269

Implements core proper privilege management by restricting to only required rights.

addresses: CWE-269

Policy requires training on privilege management and least privilege, making it harder to exploit improper privilege management weaknesses.

addresses: CWE-269

Training covers proper privilege management practices, making incorrect privilege assignments less likely.

MITRE ATT&CK Enterprise TechniquesAI

T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
T1548.002 Bypass User Account Control Privilege Escalation
Adversaries may bypass UAC mechanisms to elevate process privileges on system.
Why these techniques?

Improper privilege management in Edge enables local bypass of a security feature with low privileges, directly facilitating exploitation for privilege escalation and UAC bypass mechanisms.

Confidence: MEDIUM · MITRE ATT&CK Enterprise v18.1

NVD Description

Improper privilege management in Microsoft Edge (Chromium-based) allows an authorized attacker to bypass a security feature locally.

Deeper analysisAI

CVE-2026-21223 is an improper privilege management vulnerability affecting Microsoft Edge (Chromium-based), published on 2026-01-16T22:16:25.983. It enables an authorized attacker to bypass a security feature locally and is classified under CWE-269: Improper Privilege Management. The vulnerability has a CVSS v3.1 base score of 7.1, reflecting attack vector (AV:L), low attack complexity (AC:L), low privileges required (PR:L), no user interaction (UI:N), unchanged scope (S:U), high confidentiality impact (C:H), high integrity impact (I:H), and no availability impact (A:N).

The attack requires local access and low-level privileges, allowing exploitation with low complexity and no user interaction. A successful attacker can achieve high confidentiality and integrity impacts by bypassing the security feature, potentially leading to unauthorized data access or modification within the affected Edge environment.

Mitigation details are available in the Microsoft Security Response Center advisory at https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21223.

Details

CWE(s)

Affected Products

microsoft
edge chromium
≤ 144.0.3719.82

CVEs Like This One

CVE-2025-21283Same product: Microsoft Edge Chromium
CVE-2025-21342Same product: Microsoft Edge Chromium
CVE-2025-21408Same product: Microsoft Edge Chromium
CVE-2025-21279Same product: Microsoft Edge Chromium
CVE-2025-49758Same vendor: Microsoft
CVE-2025-21360Same vendor: Microsoft
CVE-2026-21533Same vendor: Microsoft
CVE-2025-21287Same vendor: Microsoft
CVE-2025-59247Same vendor: Microsoft
CVE-2025-21343Same vendor: Microsoft

References