CVE-2026-27914
Published: 14 April 2026
Summary
CVE-2026-27914 is a high-severity Improper Access Control (CWE-284) vulnerability in Microsoft Windows 10 21H2. Its CVSS base score is 7.8 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Privilege Escalation (T1068); ranked at the 18.9th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 AC-3 (Access Enforcement) and AC-6 (Least Privilege).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Timely identification, reporting, and correction of the improper access control flaw in MMC directly prevents local privilege escalation exploitation.
Enforcing least privilege restricts low-privileged local users from escalating to higher privileges via the MMC vulnerability.
Proper access enforcement mechanisms address the core improper access control issue in MMC that enables privilege escalation.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
CVE describes a local improper access control flaw in MMC that is directly exploitable by a low-privileged attacker for privilege escalation (CWE-284, AV:L/PR:L), matching the definition of T1068 Exploitation for Privilege Escalation.
NVD Description
Improper access control in Microsoft Management Console allows an authorized attacker to elevate privileges locally.
Deeper analysisAI
CVE-2026-27914 is an improper access control vulnerability in the Microsoft Management Console (MMC), published on 2026-04-14T18:16:59.180. It affects the MMC component, with a CVSS v3.1 base score of 7.8 (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) and is linked to CWE-284.
A local attacker with low privileges (PR:L) can exploit this vulnerability through low-complexity means (AC:L) with no user interaction (UI:N). Successful exploitation enables local privilege escalation, resulting in high impacts to confidentiality, integrity, and availability (C:H/I:H/A:H).
The Microsoft Security Response Center (MSRC) advisory at https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27914 provides guidance on this vulnerability.
Details
- CWE(s)