CVE-2026-26119: CWE-287: Improper Authentication in Microsoft Windows Admin Center
Improper authentication in Windows Admin Center allows an authorized attacker to elevate privileges over a network.
AI Analysis
Technical Summary
This vulnerability in Windows Admin Center (version 1809.0) is due to improper authentication mechanisms, enabling an attacker with some level of authorization to escalate privileges remotely. The CVSS 3.1 base score is 8.8, reflecting high impact on confidentiality, integrity, and availability. Microsoft has published an official fix for this vulnerability, as detailed in their security update guide.
Potential Impact
An attacker who is already authorized on the network can exploit this vulnerability to gain elevated privileges, potentially leading to full system compromise. The vulnerability affects confidentiality, integrity, and availability of the affected system. No known public exploits have been reported so far.
Mitigation Recommendations
Apply the official patch provided by Microsoft for Windows Admin Center version 1809.0 as detailed in the Microsoft security update guide (https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26119). This fix addresses the improper authentication issue and mitigates the risk of privilege escalation.
CVE-2026-26119: CWE-287: Improper Authentication in Microsoft Windows Admin Center
Description
Improper authentication in Windows Admin Center allows an authorized attacker to elevate privileges over a network.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
This vulnerability in Windows Admin Center (version 1809.0) is due to improper authentication mechanisms, enabling an attacker with some level of authorization to escalate privileges remotely. The CVSS 3.1 base score is 8.8, reflecting high impact on confidentiality, integrity, and availability. Microsoft has published an official fix for this vulnerability, as detailed in their security update guide.
Potential Impact
An attacker who is already authorized on the network can exploit this vulnerability to gain elevated privileges, potentially leading to full system compromise. The vulnerability affects confidentiality, integrity, and availability of the affected system. No known public exploits have been reported so far.
Mitigation Recommendations
Apply the official patch provided by Microsoft for Windows Admin Center version 1809.0 as detailed in the Microsoft security update guide (https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26119). This fix addresses the improper authentication issue and mitigates the risk of privilege escalation.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- microsoft
- Date Reserved
- 2026-02-11T15:52:13.911Z
- Cvss Version
- 3.1
- State
- PUBLISHED
- Remediation Level
- official-fix
- Vendor Advisory Urls
- [{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26119","vendor":"Microsoft"}]
Threat ID: 6994f69980d747be20df4365
Added to database: 2/17/2026, 11:15:37 PM
Last enriched: 5/12/2026, 5:16:57 AM
Last updated: 5/19/2026, 7:20:37 PM
Views: 1013
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.