Microsoft Patches CVE-2026-26119 Privilege Escalation in Windows Admin Center
好的,我现在需要帮用户总结这篇文章的内容,控制在100字以内,而且不需要用“文章内容总结”这样的开头。首先,我得通读一下文章,抓住主要信息。 文章讲的是微软披露了一个已经被修复的Windows Admin Center的安全漏洞。这个漏洞的编号是CVE-2026-26119,CVSS评分8.8分,属于高危漏洞。攻击者可以利用这个漏洞提升权限,进而控制用户的系统。微软提到这个漏洞是因为身份验证不当导致的,并且已经修复在2025年12月发布的版本中。此外,虽然没有公开利用的案例,但评估显示被利用的可能性较高。 接下来,我需要把这些信息浓缩到100字以内。重点包括:微软披露漏洞、CVE编号、CVSS评分、攻击者权限提升、修复版本和可能被利用的情况。 然后组织语言,确保简洁明了。比如:“微软披露Windows Admin Center存在高危漏洞(CVE-2026-26119),CVSS评分8.8分。该漏洞允许攻击者通过网络提升权限并控制受影响应用用户账户。已修复于2025年12月版本中。” 这样既涵盖了关键点,又符合字数要求。 最后检查一下是否遗漏了重要信息,比如研究人员Andrea Pierini的名字和可能的全域控制情况是否需要提及?考虑到字数限制,可能暂时不包含这些细节。 总结下来,确保内容准确、简洁,并且符合用户的要求。 </think> 微软披露Windows Admin Center存在高危漏洞(CVE-2026-26119),CVSS评分8.8分。该漏洞允许攻击者通过网络提升权限并控制受影响应用用户账户。已修复于2025年12月版本中。 2026-2-19 17:40:0 Author: thehackernews.com(查看原文) 阅读量:3 收藏

Vulnerability / Network Security

Microsoft has disclosed a now-patched security flaw in Windows Admin Center that could allow an attacker to escalate their privileges.

Windows Admin Center is a locally deployed, browser-based management tool set that lets users manage their Windows Clients, Servers, and Clusters without the need for connecting to the cloud.

The high-severity vulnerability, tracked as CVE-2026-26119, carries a CVSS score of 8.8 out of a maximum of 10.0

"Improper authentication in Windows Admin Center allows an authorized attacker to elevate privileges over a network," Microsoft said in an advisory released on February 17, 2026. "The attacker would gain the rights of the user that is running the affected application."

Microsoft credited Semperis researcher Andrea Pierini with discovering and reporting the vulnerability. It's worth mentioning that the security issue was patched by the tech giant in Windows Admin Center version 2511 released in December 2025. 

While the Windows maker makes no mention of this vulnerability being exploited in the wild, it has been tagged with an "Exploitation More Likely" assessment.

Technical details related to CVE-2026-26119 are presently under wraps, but that could change soon. In a post shared on LinkedIn, Pierini said the vulnerability could "allow a full domain compromise starting from a standard user" under certain conditions.

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


文章来源: https://thehackernews.com/2026/02/microsoft-patches-cve-2026-26119.html
如有侵权请联系:admin#unsafe.sh