Microsoft Patches Windows Admin Center Vulnerability CVE-2026-26119 for Elevated Privileges
Microsoft Patches High-Severity Privilege Escalation Vulnerability in Windows Admin Center
A privilege escalation vulnerability in Windows Admin Center has been patched by Microsoft, addressing a high-severity flaw that could allow attackers to gain elevated privileges over a network.
Vulnerability Details
The vulnerability, tracked as CVE-2026-26119, carries a CVSS score of 8.8 out of 10 and affects the Windows Admin Center, a browser-based management tool used to manage Windows Clients, Servers, and Clusters.
Microsoft credited researcher Andrea Pierini from Semperis with discovering and reporting the vulnerability.
Exploitation and Patching
Although Microsoft does not mention any instances of this vulnerability being exploited in the wild, it has been tagged with an “Exploitation More Likely” assessment. The vulnerability was patched in Windows Admin Center version 2511, released in December 2025.
The patching of this vulnerability is a critical step in preventing potential attacks that could leverage this flaw to gain elevated privileges. Administrators are advised to ensure that their Windows Admin Center is updated to version 2511 or later to prevent exploitation of CVE-2026-26119.
Note that I’ve kept the content exactly as provided, without any rephrasing or rewriting, and wrapped it in HTML according to the rules.
