{"id":106,"date":"2026-02-27T19:19:28","date_gmt":"2026-02-27T19:19:28","guid":{"rendered":"https:\/\/thedigitalfortress.us\/?p=106"},"modified":"2026-02-27T19:19:28","modified_gmt":"2026-02-27T19:19:28","slug":"microsoft-patches-cve-2026-26119-privilege-escalation-in-windows-admin-center","status":"publish","type":"post","link":"https:\/\/thedigitalfortress.us\/?p=106","title":{"rendered":"Microsoft Patches CVE-2026-26119 Privilege Escalation in Windows Admin Center"},"content":{"rendered":"<div>\n<p><span class=\"p-author\"><i class=\"icon-font icon-user\">\ue804<\/i><span class=\"author\">Ravie Lakshmanan<\/span><i class=\"icon-font icon-calendar\">\ue802<\/i><span class=\"author\">Feb 19, 2026<\/span><\/span><span class=\"p-tags\">Vulnerability \/ Network Security<\/span><\/p>\n<\/div>\n<div id=\"articlebody\">\n<div class=\"separator\" style=\"clear: both;\"><a href=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiTYrWKU78qUjsLRxRje4c7MEejHM-e4bg7D2mFbFEomGbCI39Um78JNkCJKcjrcH2FYinO-dVUiV0_rB60jmErrc4lyMkYOK-qIX3HnYCFJ8aWfFwcnaZOHe_38JSgbLPnVqWrQaXhvbXmMCAaJpb6qnANjxjsqB3S4NM89kemycwHA8kDGlwrS-306oP8\/s1700-e365\/windows-admin.jpg\" style=\"display: block;  text-align: center; clear: left; float: left;\"><\/a><\/div>\n<p>Microsoft has disclosed a now-patched security flaw in Windows Admin Center that could allow an attacker to escalate their privileges.<\/p>\n<p><a href=\"https:\/\/learn.microsoft.com\/en-us\/windows-server\/manage\/windows-admin-center\/understand\/what-is\" rel=\"noopener\" target=\"_blank\">Windows Admin Center<\/a> is a locally deployed, browser-based management tool set that lets users manage their Windows Clients, Servers, and Clusters without the need for connecting to the cloud.<\/p>\n<p>The high-severity vulnerability, tracked as <strong>CVE-2026-26119<\/strong>, carries a CVSS score of 8.8 out of a maximum of 10.0<\/p>\n<p>\u00abImproper authentication in Windows Admin Center allows an authorized attacker to elevate privileges over a network,\u00bb Microsoft <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-26119\" rel=\"noopener\" target=\"_blank\">said<\/a> in an advisory released on February 17, 2026. \u00abThe attacker would gain the rights of the user that is running the affected application.\u00bb<\/p>\n<div class=\"dog_two clear\">\n<div class=\"cf\"><a href=\"https:\/\/thehackernews.uk\/sse-customer-awards-d\" rel=\"nofollow noopener sponsored\" target=\"_blank\"><img loading=\"lazy\" decoding=\"async\" class=\"lazyload\" alt=\"Cybersecurity\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEg5Ij_-TeqFMEsRFzgRRFzSRlVK6oHCncN_eJ2fkOdsA_1tN9HQbAlEEife2Z2JUt1lPv4st5n9KZP84jGEYY9Up6BQ7QE-N5rs6OhzL5thxGzVxnMx3JH9cGRLi9S5Kl-iV5PgjBeTdkBLnv_inF8UUAo88iqdmgJuPIc_6qiPyUMXwFyZWbZvkZkcRXSw\/s728-e100\/gartner-d.jpg\" width=\"729\" height=\"91\"\/><\/a><\/div>\n<\/div>\n<p>Microsoft credited Semperis researcher Andrea Pierini with discovering and reporting the vulnerability. It&#8217;s worth mentioning that the security issue was patched by the tech giant in <a href=\"https:\/\/techcommunity.microsoft.com\/blog\/windows-admin-center-blog\/windows-admin-center-version-2511-is-now-generally-available\/4477048\" rel=\"noopener\" target=\"_blank\">Windows Admin Center version 2511<\/a> released in December 2025.\u00a0<\/p>\n<p>While the Windows maker makes no mention of this vulnerability being exploited in the wild, it has been tagged with an \u00abExploitation More Likely\u00bb assessment.<\/p>\n<p>Technical details related to CVE-2026-26119 are presently under wraps, but that could change soon. In a post <a href=\"https:\/\/www.linkedin.com\/posts\/andrea-pierini_security-update-guide-microsoft-security-activity-7429838565871788033-B7IO\/\" rel=\"noopener\" target=\"_blank\">shared<\/a> on LinkedIn, Pierini said the vulnerability could \u00aballow a full domain compromise starting from a standard user\u00bb under certain conditions.<\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>\ue804Ravie Lakshmanan\ue802Feb 19, 2026Vulnerability \/ Network Security Microsoft has disclosed a now-patched security flaw in Windows Admin Center that could allow an attacker to escalate their privileges. Windows Admin Center&hellip;<\/p>\n","protected":false},"author":1,"featured_media":107,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[129,308,304,306,147,57,305,307],"class_list":["post-106","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized","tag-admin","tag-center","tag-cve202626119","tag-escalation","tag-microsoft","tag-patches","tag-privilege","tag-windows"],"_links":{"self":[{"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/posts\/106","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=106"}],"version-history":[{"count":0,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/posts\/106\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/media\/107"}],"wp:attachment":[{"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=106"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=106"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=106"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}