Cyber Posture

CVE-2026-26119

High

Published: 17 February 2026

Published
17 February 2026
Modified
19 February 2026
KEV Added
Patch
CVSS Score 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0007 20.3th percentile
Risk Priority 18 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-26119 is a high-severity Improper Authentication (CWE-287) vulnerability in Microsoft Windows Admin Center. Its CVSS base score is 8.8 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Privilege Escalation (T1068); ranked at the 20.3th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 AC-6 (Least Privilege) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploitation for Privilege Escalation (T1068). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly remediates the improper authentication flaw in Windows Admin Center, preventing network-based privilege escalation exploitation.

prevent

Enforces least privilege to restrict the privileges available for escalation by low-privileged authenticated attackers exploiting the vulnerability.

prevent

Requires robust identification and authentication for organizational users, addressing the core improper authentication mechanism in Windows Admin Center.

MITRE ATT&CK Enterprise TechniquesAI

T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
Why these techniques?

The CVE description explicitly states an improper authentication flaw in a network-accessible management interface that directly enables privilege escalation from a low-privileged authenticated account, matching the definition of T1068 (Exploitation for Privilege Escalation).

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

Improper authentication in Windows Admin Center allows an authorized attacker to elevate privileges over a network.

Deeper analysisAI

CVE-2026-26119 is an improper authentication vulnerability in Windows Admin Center that enables privilege escalation. Published on 2026-02-17, it carries a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) and is associated with CWE-287 (Improper Authentication). The flaw affects Windows Admin Center, a web-based management tool for Windows Server environments.

An attacker with low privileges (PR:L), such as an authenticated user, can exploit this vulnerability over the network (AV:N) with low complexity (AC:L) and without user interaction (UI:N). Successful exploitation allows privilege escalation, granting high-impact access to confidentiality (C:H), integrity (I:H), and availability (A:H) of the affected system.

For mitigation details, refer to the Microsoft Security Response Center advisory at https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26119.

Details

CWE(s)

Affected Products

microsoft
windows admin center
≤ 2511

CVEs Like This One

CVE-2026-20965Same product: Microsoft Windows Admin Center
CVE-2026-23660Same product: Microsoft Windows Admin Center
CVE-2026-24294Same vendor: Microsoft
CVE-2026-26128Same vendor: Microsoft
CVE-2025-53778Same vendor: Microsoft
CVE-2025-54918Same vendor: Microsoft
CVE-2026-26141Same vendor: Microsoft
CVE-2025-55241Same vendor: Microsoft
CVE-2025-54914Same vendor: Microsoft
CVE-2026-24293Same vendor: Microsoft

References