Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-23660: CWE-284: Improper Access Control in Microsoft Windows Admin Center in Azure Portal

0
High
VulnerabilityCVE-2026-23660cvecve-2026-23660cwe-284
Published: Tue Mar 10 2026 (03/10/2026, 17:04:33 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows Admin Center in Azure Portal

Description

Improper access control in Azure Portal Windows Admin Center allows an authorized attacker to elevate privileges locally.

AI-Powered Analysis

AILast updated: 03/10/2026, 18:33:40 UTC

Technical Analysis

CVE-2026-23660 is an improper access control vulnerability classified under CWE-284, found in Microsoft Windows Admin Center integrated within the Azure Portal, specifically affecting version 1.0. The vulnerability allows an attacker who already has some level of authorized local access to escalate their privileges further, potentially gaining administrative control over the system or resources managed via Windows Admin Center. This escalation does not require user interaction, increasing the risk of automated or stealthy exploitation. The vulnerability arises from insufficient enforcement of access control mechanisms, permitting privilege elevation beyond intended boundaries. The CVSS 3.1 base score of 7.8 indicates a high-severity issue, with attack vector local (AV:L), low attack complexity (AC:L), requiring privileges (PR:L), no user interaction (UI:N), unchanged scope (S:U), and high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). While no public exploits have been reported yet, the vulnerability's nature suggests that attackers with local access could leverage it to compromise critical systems managed through Azure Portal's Windows Admin Center. This poses a significant risk to organizations relying on this management tool for their cloud and hybrid environments.

Potential Impact

The impact of CVE-2026-23660 is substantial for organizations using Windows Admin Center in Azure Portal. Successful exploitation allows attackers with limited local privileges to escalate to administrative levels, potentially leading to full system compromise. This can result in unauthorized access to sensitive data, modification or deletion of critical configurations, disruption of services, and further lateral movement within the network. Given the integration with Azure Portal, attackers might also gain control over cloud resources, increasing the risk of data breaches, service outages, and compliance violations. The vulnerability could be exploited in environments where multiple administrators or users have local access, increasing the attack surface. Organizations in sectors with stringent security requirements, such as finance, healthcare, government, and critical infrastructure, face heightened risks due to the potential for severe operational and reputational damage.

Mitigation Recommendations

To mitigate CVE-2026-23660, organizations should implement the following specific measures: 1) Immediately review and restrict local user privileges on systems running Windows Admin Center in Azure Portal, ensuring the principle of least privilege is enforced. 2) Monitor and audit access logs for unusual privilege escalation attempts or anomalous administrative activities. 3) Apply any available patches or updates from Microsoft as soon as they are released; if patches are not yet available, consider temporarily limiting access to Windows Admin Center or isolating affected systems. 4) Employ multi-factor authentication and strong access controls for Azure Portal and Windows Admin Center to reduce the risk of unauthorized local access. 5) Use endpoint detection and response (EDR) tools to detect suspicious behavior indicative of privilege escalation. 6) Conduct regular security assessments and penetration testing focused on access control mechanisms within the Azure management environment. 7) Educate administrators and users about the risks of privilege escalation and the importance of secure credential management. These targeted actions go beyond generic advice by focusing on controlling and monitoring local access and privilege boundaries specific to the affected product.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
microsoft
Date Reserved
2026-01-14T16:59:33.463Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69b05626ea502d3aa87d6882

Added to database: 3/10/2026, 5:34:30 PM

Last enriched: 3/10/2026, 6:33:40 PM

Last updated: 3/13/2026, 8:14:16 PM

Views: 22

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses