Microsoft Patches Critical Privilege Escalation Flaw in Windows Admin Center
#Vulnerabilities

Microsoft Patches Critical Privilege Escalation Flaw in Windows Admin Center

Security Reporter
2 min read

Microsoft has addressed CVE-2026-26119, a high-severity privilege escalation vulnerability in Windows Admin Center that could enable attackers to gain domain-level access under certain conditions.

Featured image

Microsoft has patched a critical privilege escalation vulnerability in Windows Admin Center (WAC) that could allow attackers to compromise entire domains under specific conditions. Tracked as CVE-2026-26119 with a CVSS score of 8.8, the flaw affects the browser-based management tool used to administer Windows environments without cloud connectivity.

Vulnerability Mechanics and Impact

According to Microsoft's advisory, the flaw stems from "improper authentication" that enables authorized attackers to elevate privileges over a network. Successful exploitation grants attackers the same rights as the user running the affected application. Andrea Pierini, the Semperis researcher who discovered the vulnerability, warned on LinkedIn that this could "allow a full domain compromise starting from a standard user" when combined with specific environmental factors.

While technical details remain undisclosed, security experts note that privilege escalation flaws in management tools like Windows Admin Center are particularly dangerous because they often run with elevated permissions. A compromised admin console could serve as a gateway to domain controllers, Active Directory systems, and critical infrastructure.

Patch Status and Exploit Probability

The fix was silently deployed in Windows Admin Center version 2511 released in December 2025. Microsoft's February 2026 disclosure confirms the vulnerability carries an "Exploitation More Likely" assessment, indicating heightened risk despite no current observed attacks. This delayed disclosure suggests Microsoft waited until sufficient users had updated before publicizing the flaw.

Actionable Mitigation Steps

  1. Immediate Patching: Update to Windows Admin Center version 2511 or newer from the official update portal
  2. Privilege Minimization: Run WAC with least-privilege accounts to contain potential damage
  3. Network Segmentation: Isolate admin center traffic from standard user networks
  4. Activity Monitoring: Audit authentication logs for unusual privilege escalation attempts

"Management consoles like WAC are crown jewels for attackers," notes Pierini. "This patch should be prioritized by any organization using on-premises Windows administration tools." Security teams should also review related systems for signs of compromise, as attackers often chain multiple vulnerabilities for domain-wide access.

This case underscores the critical importance of maintaining update discipline for administrative tools, which often have broader access than standard enterprise applications. Organizations using Windows Admin Center should treat this patch as urgent given the domain compromise potential.

Comments

Loading comments...