{"id":43800,"date":"2026-02-20T06:31:14","date_gmt":"2026-02-19T22:31:14","guid":{"rendered":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/02\/20\/microsoft-patches-cve-2026-26119-privilege-escalation-in-windows-admin-center\/"},"modified":"2026-02-20T06:31:14","modified_gmt":"2026-02-19T22:31:14","slug":"microsoft-patches-cve-2026-26119-privilege-escalation-in-windows-admin-center","status":"publish","type":"post","link":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/02\/20\/microsoft-patches-cve-2026-26119-privilege-escalation-in-windows-admin-center\/","title":{"rendered":"Microsoft Patches CVE-2026-26119 Privilege Escalation in Windows Admin Center"},"content":{"rendered":"<div style=\"clear: both;\"><a href=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiTYrWKU78qUjsLRxRje4c7MEejHM-e4bg7D2mFbFEomGbCI39Um78JNkCJKcjrcH2FYinO-dVUiV0_rB60jmErrc4lyMkYOK-qIX3HnYCFJ8aWfFwcnaZOHe_38JSgbLPnVqWrQaXhvbXmMCAaJpb6qnANjxjsqB3S4NM89kemycwHA8kDGlwrS-306oP8\/s1600\/windows-admin.jpg\" style=\"display: block; padding: 1em 0; text-align: center; clear: left; float: left;\"><img decoding=\"async\" border=\"0\" data-original-height=\"470\" data-original-width=\"900\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiTYrWKU78qUjsLRxRje4c7MEejHM-e4bg7D2mFbFEomGbCI39Um78JNkCJKcjrcH2FYinO-dVUiV0_rB60jmErrc4lyMkYOK-qIX3HnYCFJ8aWfFwcnaZOHe_38JSgbLPnVqWrQaXhvbXmMCAaJpb6qnANjxjsqB3S4NM89kemycwHA8kDGlwrS-306oP8\/s1600\/windows-admin.jpg\" alt=\"Microsoft Patches CVE-2026-26119 Privilege Escalation in Windows Admin Center\"\/><\/a><\/div>\n<p>Microsoft has disclosed a now-patched security flaw in Windows Admin Center that could allow an attacker to escalate their privileges.<\/p>\n<p><a href=\"https:\/\/learn.microsoft.com\/en-us\/windows-server\/manage\/windows-admin-center\/understand\/what-is\" rel=\"noopener\" target=\"_blank\">Windows Admin Center<\/a> is a locally deployed, browser-based management tool set that lets users manage their Windows Clients, Servers, and Clusters without the need for connecting to the cloud.<\/p>\n<p>The high-severity vulnerability, tracked as <strong>CVE-2026-26119<\/strong>, carries a CVSS score of 8.8 out of a maximum of 10.0<\/p>\n<p>&#8220;Improper authentication in Windows Admin Center allows an authorized attacker to elevate privileges over a network,&#8221; Microsoft <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-26119\" rel=\"noopener\" target=\"_blank\">said<\/a> in an advisory released on February 17, 2026. &#8220;The attacker would gain the rights of the user that is running the affected application.&#8221;<\/p>\n<p>Microsoft credited Semperis researcher Andrea Pierini with discovering and reporting the vulnerability. It&#8217;s worth mentioning that the security issue was patched by the tech giant in <a href=\"https:\/\/techcommunity.microsoft.com\/blog\/windows-admin-center-blog\/windows-admin-center-version-2511-is-now-generally-available\/4477048\" rel=\"noopener\" target=\"_blank\">Windows Admin Center version 2511<\/a> released in December 2025.&nbsp;<\/p>\n<p>While the Windows maker makes no mention of this vulnerability being exploited in the wild, it has been tagged with an &#8220;Exploitation More Likely&#8221; assessment.<\/p>\n<p>Technical details related to CVE-2026-26119 are presently under wraps, but that could change soon. In a post <a href=\"https:\/\/www.linkedin.com\/posts\/andrea-pierini_security-update-guide-microsoft-security-activity-7429838565871788033-B7IO\/\" rel=\"noopener\" target=\"_blank\">shared<\/a> on LinkedIn, Pierini said the vulnerability could &#8220;allow a full domain compromise starting from a standard user&#8221; under certain conditions.<\/p>\n<div><\/div>\n<div>Found this article interesting?  Follow us on <a href='https:\/\/news.google.com\/publications\/CAAqLQgKIidDQklTRndnTWFoTUtFWFJvWldoaFkydGxjbTVsZDNNdVkyOXRLQUFQAQ' rel='noopener' target='_blank'>Google News<\/a>, <a href='https:\/\/twitter.com\/thehackersnews' rel='noopener' target='_blank'>Twitter<\/a> and <a href='https:\/\/www.linkedin.com\/company\/thehackernews\/' rel='noopener' target='_blank'>LinkedIn<\/a> to read more exclusive content we post.<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Microsoft has disclosed a now-patched security flaw in Windows Admin Center that could allow an attacker to escalate their privileges.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6],"tags":[],"class_list":["post-43800","post","type-post","status-publish","format-standard","hentry","category-thehackernews"],"_links":{"self":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/43800","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/comments?post=43800"}],"version-history":[{"count":0,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/43800\/revisions"}],"wp:attachment":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/media?parent=43800"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/categories?post=43800"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/tags?post=43800"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}