Cyber Posture

CVE-2026-26183

HighLPE

Published: 14 April 2026

Published
14 April 2026
Modified
23 April 2026
KEV Added
Patch
CVSS Score 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0004 13.9th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-26183 is a high-severity Improper Access Control (CWE-284) vulnerability in Microsoft Windows Server 2012. Its CVSS base score is 7.8 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Privilege Escalation (T1068); ranked at the 13.9th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 AC-3 (Access Enforcement) and AC-6 (Least Privilege).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploitation for Privilege Escalation (T1068). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly enforces approved authorizations for logical access, addressing the improper access control flaw in the Windows RPC API that enables local privilege escalation.

prevent

Enforces least privilege principle to restrict low-privileged local accounts from gaining elevated access via the vulnerable RPC API.

prevent

Mandates timely identification, reporting, and correction of flaws like this CVE through patching or updates provided in MSRC guidance.

MITRE ATT&CK Enterprise TechniquesAI

T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
Why these techniques?

Improper access control in Windows RPC API directly enables local privilege escalation from a low-privileged authorized account (AV:L/PR:L), matching T1068 Exploitation for Privilege Escalation.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

Improper access control in Windows RPC API allows an authorized attacker to elevate privileges locally.

Deeper analysisAI

CVE-2026-26183 is an improper access control vulnerability in the Windows RPC API that allows an authorized attacker to elevate privileges locally. It affects Microsoft Windows systems and carries a CVSS v3.1 base score of 7.8 (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H), mapped to CWE-284: Improper Access Control. The vulnerability was published on 2026-04-14T18:16:55.187.

The attack requires local access with low privileges (PR:L) and can be exploited with low complexity (AC:L) and no user interaction (UI:N). A successful exploit grants the attacker high impacts on confidentiality, integrity, and availability (C:H/I:H/A:H), enabling local privilege escalation from an authorized but low-privileged account.

Mitigation guidance is available in the Microsoft Security Response Center advisory at https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26183.

Details

CWE(s)

Affected Products

microsoft
windows server 2012
all versions, r2
microsoft
windows server 2016
≤ 10.0.14393.9060
microsoft
windows server 2019
≤ 10.0.17763.8644
microsoft
windows server 2022
≤ 10.0.20348.5020
microsoft
windows server 2022 23h2
≤ 10.0.25398.2274
microsoft
windows server 2025
≤ 10.0.26100.32690

CVEs Like This One

CVE-2026-27912Same product: Microsoft Windows Server 2012
CVE-2026-21238Same product: Microsoft Windows Server 2012
CVE-2026-27914Same product: Microsoft Windows Server 2012
CVE-2026-20843Same product: Microsoft Windows Server 2012
CVE-2025-21293Same product: Microsoft Windows Server 2012
CVE-2026-25176Same product: Microsoft Windows Server 2012
CVE-2026-20929Same product: Microsoft Windows Server 2012
CVE-2025-21359Same product: Microsoft Windows Server 2012
CVE-2025-59230Same product: Microsoft Windows Server 2012
CVE-2026-0386Same product: Microsoft Windows Server 2012

References