BigTech CompaniesCybersecurityNewswireTechnology

Critical Windows Admin Center Flaw Exposed by Microsoft (CVE-2026-26119)

▼ Summary

– Microsoft disclosed a privilege-escalation vulnerability (CVE-2026-26119) in its Windows Admin Center management platform.
– The flaw, discovered in July 2025, stems from improper authentication and was patched in early December 2025 with version 2511.
– It can be exploited remotely with low effort and low privileges, allowing an attacker to gain the rights of the user running the application.
– Microsoft assesses exploitation as “more likely” due to the potential for reliable exploit code and historical targeting of similar flaws.
– Organizations are urged to apply the patch immediately, as the vulnerability could, under certain conditions, lead to a full domain compromise.

Microsoft has issued a critical security update for a recently disclosed privilege-escalation vulnerability found within Windows Admin Center. This browser-based management platform is a cornerstone for IT teams overseeing Windows environments, including servers, clients, Hyper-V infrastructure, and Active Directory systems. The flaw, now patched, could have allowed attackers with initial access to significantly elevate their privileges on affected systems.

The vulnerability, tracked as CVE-2026-26119, was originally identified by security researcher Adrea Pierini of Semperis in July of last year. Microsoft addressed the issue with the release of Windows Admin Center version 2511 in early December 2025, but public disclosure of the threat only occurred recently. This cautious timeline underscores the serious nature of the bug and the operational criticality of the Admin Center tool itself.

Technical specifics remain limited, but the assigned Common Vulnerability Scoring System metrics reveal concerning characteristics. The flaw stems from improper authentication and can be exploited remotely with low complexity. Crucially, it requires no user interaction and only low-level privileges, meaning an attacker needs only valid basic credentials to begin an attack. Successful exploitation would grant the attacker the same rights as the user running the vulnerable application.

Microsoft assesses that exploitation is “more likely” due to the potential for reliable exploit code to be developed, a risk amplified by the historical targeting of similar vulnerabilities in active campaigns. The company strongly advises administrators to prioritize this update. Researcher Pierini emphasized the potential gravity, noting that under specific conditions, this issue could enable a full domain compromise originating from a standard user account.

For organizations relying on Windows Admin Center, immediate action is essential. While many may have already applied the version 2511 update as part of routine maintenance, any remaining instances running older software must be upgraded without delay. Procrastination increases the risk as threat actors analyze the public patch to develop and deploy working exploits. Ensuring your management tools are current is a fundamental step in protecting broader network integrity.

(Source: HelpNet Security)

Topics

windows admin center 95% privilege escalation 90% security vulnerability 88% cve-2026-26119 85% vulnerability disclosure 80% patch release 78% cvss score 75% remote exploitation 72% domain compromise 70% microsoft advisory 68%