Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-1680: CWE-250 Execution with Unnecessary Privileges in Edgemo (Danoffice IT) Local Admin Service

0
High
VulnerabilityCVE-2026-1680cvecve-2026-1680cwe-250
Published: Fri Jan 30 2026 (01/30/2026, 06:00:31 UTC)
Source: CVE Database V5
Vendor/Project: Edgemo (Danoffice IT)
Product: Local Admin Service

Description

Improper access control in the WCF endpoint in Edgemo (now owned by Danoffice IT) Local Admin Service 1.2.7.23180 on Windows allows a local user to escalate their privileges to local administrator via direct communication with the LocalAdminService.exe named pipe, bypassing client-side group membership restrictions.

AI-Powered Analysis

AILast updated: 01/30/2026, 06:42:10 UTC

Technical Analysis

CVE-2026-1680 is a vulnerability classified under CWE-250 (Execution with Unnecessary Privileges) affecting Edgemo (now owned by Danoffice IT) Local Admin Service version 1.2.7.23180 running on Windows platforms. The root cause is improper access control in the Windows Communication Foundation (WCF) endpoint of the Local Admin Service. Specifically, the service exposes a named pipe (LocalAdminService.exe) that local users can communicate with directly. This direct communication bypasses client-side group membership checks intended to restrict access to authorized users only. As a result, any local user with access to the system can escalate their privileges to local administrator without authentication or user interaction. The vulnerability has a CVSS 4.0 base score of 7.1, indicating high severity, with metrics showing local attack vector, low attack complexity, no privileges required initially, and no user interaction needed. The impact on confidentiality is minimal, but integrity and availability are highly compromised because an attacker gaining local admin rights can manipulate system configurations, install malicious software, or disrupt services. Although no public exploits are currently known, the vulnerability's nature makes it a significant risk in environments where multiple users have local access or where attackers can gain limited user access through other means. The vulnerability was published on January 30, 2026, and no patches or mitigations have been officially released yet, increasing the urgency for organizations to implement compensating controls.

Potential Impact

For European organizations, this vulnerability poses a substantial risk, especially in environments where Edgemo Local Admin Service is deployed on Windows systems. The ability for a local user to escalate privileges to administrator can lead to full system compromise, unauthorized access to sensitive data, and disruption of critical services. This is particularly concerning for sectors such as government, finance, healthcare, and critical infrastructure, where elevated privileges can facilitate lateral movement, data exfiltration, or sabotage. The vulnerability could be exploited by malicious insiders or attackers who have gained initial foothold with limited user rights. Given the lack of authentication and user interaction requirements, exploitation is straightforward once local access is obtained. The absence of known exploits in the wild currently reduces immediate risk but does not eliminate the threat, as proof-of-concept exploits could emerge rapidly. European organizations must consider the potential for targeted attacks leveraging this vulnerability, especially in multi-user or shared workstation environments.

Mitigation Recommendations

Since no official patches are currently available, European organizations should implement the following specific mitigations: 1) Restrict local user access to systems running Edgemo Local Admin Service to trusted personnel only, minimizing the attack surface. 2) Employ application whitelisting and endpoint protection solutions to detect and block unauthorized attempts to communicate with the LocalAdminService.exe named pipe. 3) Use Windows security policies to limit named pipe access permissions, ensuring only authorized service accounts and administrators can interact with the pipe. 4) Monitor event logs and system behavior for unusual access patterns or privilege escalation attempts related to the Local Admin Service. 5) Consider isolating or disabling the Local Admin Service on non-essential systems until a patch is released. 6) Engage with Danoffice IT for updates on patches or official mitigations and apply them promptly once available. 7) Conduct internal audits to identify systems running the vulnerable version and prioritize remediation efforts accordingly.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
NCSC-FI
Date Reserved
2026-01-30T05:57:27.965Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 697c4f63ac0632022232629e

Added to database: 1/30/2026, 6:27:47 AM

Last enriched: 1/30/2026, 6:42:10 AM

Last updated: 1/30/2026, 8:49:32 AM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats