CVE-2026-1680: CWE-250 Execution with Unnecessary Privileges in Edgemo (Danoffice IT) Local Admin Service
Improper access control in the WCF endpoint in Edgemo (now owned by Danoffice IT) Local Admin Service 1.2.7.23180 on Windows allows a local user to escalate their privileges to local administrator via direct communication with the LocalAdminService.exe named pipe, bypassing client-side group membership restrictions.
AI Analysis
Technical Summary
CVE-2026-1680 is a vulnerability classified under CWE-250 (Execution with Unnecessary Privileges) affecting Edgemo (now owned by Danoffice IT) Local Admin Service version 1.2.7.23180 running on Windows platforms. The root cause is improper access control in the Windows Communication Foundation (WCF) endpoint of the Local Admin Service. Specifically, the service exposes a named pipe (LocalAdminService.exe) that local users can communicate with directly. This direct communication bypasses client-side group membership checks intended to restrict access to authorized users only. As a result, any local user with access to the system can escalate their privileges to local administrator without authentication or user interaction. The vulnerability has a CVSS 4.0 base score of 7.1, indicating high severity, with metrics showing local attack vector, low attack complexity, no privileges required initially, and no user interaction needed. The impact on confidentiality is minimal, but integrity and availability are highly compromised because an attacker gaining local admin rights can manipulate system configurations, install malicious software, or disrupt services. Although no public exploits are currently known, the vulnerability's nature makes it a significant risk in environments where multiple users have local access or where attackers can gain limited user access through other means. The vulnerability was published on January 30, 2026, and no patches or mitigations have been officially released yet, increasing the urgency for organizations to implement compensating controls.
Potential Impact
For European organizations, this vulnerability poses a substantial risk, especially in environments where Edgemo Local Admin Service is deployed on Windows systems. The ability for a local user to escalate privileges to administrator can lead to full system compromise, unauthorized access to sensitive data, and disruption of critical services. This is particularly concerning for sectors such as government, finance, healthcare, and critical infrastructure, where elevated privileges can facilitate lateral movement, data exfiltration, or sabotage. The vulnerability could be exploited by malicious insiders or attackers who have gained initial foothold with limited user rights. Given the lack of authentication and user interaction requirements, exploitation is straightforward once local access is obtained. The absence of known exploits in the wild currently reduces immediate risk but does not eliminate the threat, as proof-of-concept exploits could emerge rapidly. European organizations must consider the potential for targeted attacks leveraging this vulnerability, especially in multi-user or shared workstation environments.
Mitigation Recommendations
Since no official patches are currently available, European organizations should implement the following specific mitigations: 1) Restrict local user access to systems running Edgemo Local Admin Service to trusted personnel only, minimizing the attack surface. 2) Employ application whitelisting and endpoint protection solutions to detect and block unauthorized attempts to communicate with the LocalAdminService.exe named pipe. 3) Use Windows security policies to limit named pipe access permissions, ensuring only authorized service accounts and administrators can interact with the pipe. 4) Monitor event logs and system behavior for unusual access patterns or privilege escalation attempts related to the Local Admin Service. 5) Consider isolating or disabling the Local Admin Service on non-essential systems until a patch is released. 6) Engage with Danoffice IT for updates on patches or official mitigations and apply them promptly once available. 7) Conduct internal audits to identify systems running the vulnerable version and prioritize remediation efforts accordingly.
Affected Countries
Denmark, Finland, Sweden, Germany, United Kingdom, Netherlands
CVE-2026-1680: CWE-250 Execution with Unnecessary Privileges in Edgemo (Danoffice IT) Local Admin Service
Description
Improper access control in the WCF endpoint in Edgemo (now owned by Danoffice IT) Local Admin Service 1.2.7.23180 on Windows allows a local user to escalate their privileges to local administrator via direct communication with the LocalAdminService.exe named pipe, bypassing client-side group membership restrictions.
AI-Powered Analysis
Technical Analysis
CVE-2026-1680 is a vulnerability classified under CWE-250 (Execution with Unnecessary Privileges) affecting Edgemo (now owned by Danoffice IT) Local Admin Service version 1.2.7.23180 running on Windows platforms. The root cause is improper access control in the Windows Communication Foundation (WCF) endpoint of the Local Admin Service. Specifically, the service exposes a named pipe (LocalAdminService.exe) that local users can communicate with directly. This direct communication bypasses client-side group membership checks intended to restrict access to authorized users only. As a result, any local user with access to the system can escalate their privileges to local administrator without authentication or user interaction. The vulnerability has a CVSS 4.0 base score of 7.1, indicating high severity, with metrics showing local attack vector, low attack complexity, no privileges required initially, and no user interaction needed. The impact on confidentiality is minimal, but integrity and availability are highly compromised because an attacker gaining local admin rights can manipulate system configurations, install malicious software, or disrupt services. Although no public exploits are currently known, the vulnerability's nature makes it a significant risk in environments where multiple users have local access or where attackers can gain limited user access through other means. The vulnerability was published on January 30, 2026, and no patches or mitigations have been officially released yet, increasing the urgency for organizations to implement compensating controls.
Potential Impact
For European organizations, this vulnerability poses a substantial risk, especially in environments where Edgemo Local Admin Service is deployed on Windows systems. The ability for a local user to escalate privileges to administrator can lead to full system compromise, unauthorized access to sensitive data, and disruption of critical services. This is particularly concerning for sectors such as government, finance, healthcare, and critical infrastructure, where elevated privileges can facilitate lateral movement, data exfiltration, or sabotage. The vulnerability could be exploited by malicious insiders or attackers who have gained initial foothold with limited user rights. Given the lack of authentication and user interaction requirements, exploitation is straightforward once local access is obtained. The absence of known exploits in the wild currently reduces immediate risk but does not eliminate the threat, as proof-of-concept exploits could emerge rapidly. European organizations must consider the potential for targeted attacks leveraging this vulnerability, especially in multi-user or shared workstation environments.
Mitigation Recommendations
Since no official patches are currently available, European organizations should implement the following specific mitigations: 1) Restrict local user access to systems running Edgemo Local Admin Service to trusted personnel only, minimizing the attack surface. 2) Employ application whitelisting and endpoint protection solutions to detect and block unauthorized attempts to communicate with the LocalAdminService.exe named pipe. 3) Use Windows security policies to limit named pipe access permissions, ensuring only authorized service accounts and administrators can interact with the pipe. 4) Monitor event logs and system behavior for unusual access patterns or privilege escalation attempts related to the Local Admin Service. 5) Consider isolating or disabling the Local Admin Service on non-essential systems until a patch is released. 6) Engage with Danoffice IT for updates on patches or official mitigations and apply them promptly once available. 7) Conduct internal audits to identify systems running the vulnerable version and prioritize remediation efforts accordingly.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- NCSC-FI
- Date Reserved
- 2026-01-30T05:57:27.965Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 697c4f63ac0632022232629e
Added to database: 1/30/2026, 6:27:47 AM
Last enriched: 1/30/2026, 6:42:10 AM
Last updated: 1/30/2026, 8:49:32 AM
Views: 7
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-22277: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Dell UnityVSA
HighCVE-2026-25211: CWE-532 Insertion of Sensitive Information into Log File in llamastack Llama Stack
LowCVE-2026-25210: CWE-190 Integer Overflow or Wraparound in libexpat project libexpat
MediumCVE-2026-0963: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Arcadia Technology, LLC Crafty Controller
CriticalCVE-2026-0805: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Arcadia Technology, LLC Crafty Controller
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.