• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

Microsoft Patches CVE-2026-26119 Privilege Escalation in Windows Admin Center

You are here: Home / General Cyber Security News / Microsoft Patches CVE-2026-26119 Privilege Escalation in Windows Admin Center
February 19, 2026

Microsoft has disclosed a now-patched security flaw in Windows Admin Center that could allow an attacker to escalate their privileges.

Windows Admin Center is a locally deployed, browser-based management tool set that lets users manage their Windows Clients, Servers, and Clusters without the need for connecting to the cloud.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


The high-severity vulnerability, tracked as CVE-2026-26119, carries a CVSS score of 8.8 out of a maximum of 10.0

“Improper authentication in Windows Admin Center allows an authorized attacker to elevate privileges over a network,” Microsoft said in an advisory released on February 17, 2026. “The attacker would gain the rights of the user that is running the affected application.”

Cybersecurity

Microsoft credited Semperis researcher Andrea Pierini with discovering and reporting the vulnerability. It’s worth mentioning that the security issue was patched by the tech giant in Windows Admin Center version 2511 released in December 2025. 

While the Windows maker makes no mention of this vulnerability being exploited in the wild, it has been tagged with an “Exploitation More Likely” assessment.

Technical details related to CVE-2026-26119 are presently under wraps, but that could change soon. In a post shared on LinkedIn, Pierini said the vulnerability could “allow a full domain compromise starting from a standard user” under certain conditions.

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


Some parts of this article are sourced from:
thehackernews.com

Previous Post: «promptspy android malware abuses google gemini to automate recent apps persistence PromptSpy Android Malware Abuses Google Gemini to Automate Recent-Apps Persistence

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Microsoft Patches CVE-2026-26119 Privilege Escalation in Windows Admin Center
  • PromptSpy Android Malware Abuses Google Gemini to Automate Recent-Apps Persistence
  • ThreatsDay Bulletin: OpenSSL RCE, Foxit 0-Days, Copilot Leak, AI Password Flaws & 20+ Stories
  • From Exposure to Exploitation: How AI Collapses Your Response Window
  • Fake IPTV Apps Spread Massiv Android Malware Targeting Mobile Banking Users
  • CRESCENTHARVEST Campaign Targets Iran Protest Supporters With RAT Malware
  • Citizen Lab Finds Cellebrite Tool Used on Kenyan Activist’s Phone in Police Custody
  • Grandstream GXP1600 VoIP Phones Exposed to Unauthenticated Remote Code Execution
  • Critical Flaws Found in Four VS Code Extensions with Over 125 Million Installs
  • Cybersecurity Tech Predictions for 2026: Operating in a World of Permanent Instability

Copyright © TheCyberSecurity.News, All Rights Reserved.