Cyber Posture

CVE-2026-26154

High

Published: 14 April 2026

Published
14 April 2026
Modified
24 April 2026
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
EPSS Score 0.0026 48.9th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-26154 is a high-severity Improper Input Validation (CWE-20) vulnerability in Microsoft Windows Server 2012. Its CVSS base score is 7.5 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 48.9th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SC-5 (Denial-of-service Protection) and SI-10 (Information Input Validation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly mandates information input validation at system interfaces, comprehensively addressing the improper input validation flaw in WSUS that enables remote tampering and DoS.

prevent

Requires timely flaw remediation including patching the specific CVE as guided by MSRC, preventing exploitation of the vulnerability.

prevent

Protects against denial-of-service events matching the CVE's high availability impact from network-based invalid input exploitation.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1499.004 Application or System Exploitation Impact
Adversaries may exploit software vulnerabilities that can cause an application or system to crash and deny availability to users.
Why these techniques?

Improper input validation in network-accessible WSUS enables remote unauthenticated exploitation causing application DoS (tampering/availability impact), directly mapping to T1190 (exploit public-facing/internal app) and T1499.004 (application exploitation for DoS).

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

Improper input validation in Windows Server Update Service allows an unauthorized attacker to perform tampering over a network.

Deeper analysisAI

CVE-2026-26154 is an improper input validation vulnerability, mapped to CWE-20, affecting the Windows Server Update Service (WSUS). Published on 2026-04-14, it carries a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H), indicating network accessibility with low complexity, no privileges or user interaction required, and unchanged scope.

An unauthorized attacker can exploit this vulnerability remotely over the network to perform tampering. While the description highlights tampering capabilities, the CVSS metrics reflect no impact on confidentiality or integrity but a high impact on availability, enabling potential denial-of-service conditions.

The Microsoft Security Response Center advisory provides further details on this vulnerability, including mitigation guidance, at https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26154.

Details

CWE(s)

Affected Products

microsoft
windows server 2012
all versions, r2
microsoft
windows server 2016
≤ 10.0.14393.9060
microsoft
windows server 2019
≤ 10.0.17763.8644
microsoft
windows server 2022
≤ 10.0.20348.5020
microsoft
windows server 2022 23h2
≤ 10.0.25398.2274
microsoft
windows server 2025
≤ 10.0.26100.32690

CVEs Like This One

CVE-2026-33826Same product: Microsoft Windows Server 2012
CVE-2026-27913Same product: Microsoft Windows Server 2012
CVE-2026-27928Same product: Microsoft Windows Server 2016
CVE-2025-59287Same product: Microsoft Windows Server 2012
CVE-2025-21218Same product: Microsoft Windows Server 2012
CVE-2026-20856Same product: Microsoft Windows Server 2012
CVE-2025-54106Same product: Microsoft Windows Server 2012
CVE-2025-21309Same product: Microsoft Windows Server 2012
CVE-2025-49735Same product: Microsoft Windows Server 2012
CVE-2025-50163Same product: Microsoft Windows Server 2012

References