Skip to content
Threat Feed
high advisory

CVE-2026-41086: Windows Admin Center Privilege Escalation via Improper Access Control

CVE-2026-41086 describes an improper access control vulnerability in Windows Admin Center, allowing an authorized attacker to elevate privileges over a network.

CVE-2026-41086 is a high-severity vulnerability affecting Windows Admin Center (WAC). The vulnerability stems from improper access control mechanisms within WAC, potentially allowing an authorized attacker to elevate their privileges on the network. An attacker with existing authorized access to WAC could leverage this flaw to gain higher-level control over connected systems. This could enable them to perform unauthorized actions, potentially compromising the confidentiality, integrity, and availability of managed resources. The specific versions of Windows Admin Center affected are not detailed in the source.

Attack Chain

  1. Attacker gains initial authorized access to Windows Admin Center, potentially through compromised credentials or other legitimate access methods.
  2. Attacker identifies the improper access control vulnerability (CVE-2026-41086) within WAC.
  3. Attacker crafts a malicious request or utilizes a tool to exploit the vulnerability. This may involve manipulating API calls or exploiting flaws in WAC’s authorization checks.
  4. The crafted request bypasses the intended access controls, allowing the attacker to access restricted functionality or resources.
  5. Attacker leverages the elevated privileges to perform unauthorized actions on connected systems, such as installing software, modifying configurations, or accessing sensitive data.
  6. Attacker may use the compromised system as a pivot point to gain access to other systems on the network, further expanding their reach.
  7. Attacker establishes persistence on the compromised system to maintain unauthorized access, even after system restarts.
  8. The attacker’s final objective is to gain complete control over the targeted network and exfiltrate sensitive data.

Impact

Successful exploitation of CVE-2026-41086 could allow an authorized attacker to escalate their privileges within a network managed by Windows Admin Center. This could lead to unauthorized access to sensitive data, system compromise, and potentially full network takeover. The scope of the impact depends on the extent of the attacker’s access and the sensitivity of the data managed by WAC.

Recommendation

  • Apply the patch released by Microsoft to address CVE-2026-41086 on all Windows Admin Center installations as soon as possible (reference: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-41086).
  • Review and enforce strong access control policies for Windows Admin Center to minimize the risk of unauthorized access.
  • Implement the Sigma rule “Detect Suspicious WAC API Access” to detect potential exploitation attempts (reference: rule below).
  • Monitor network traffic for suspicious activity related to Windows Admin Center, such as unusual API calls or data transfers.

Detection coverage 2

Detect Suspicious WAC API Access

medium

Detects suspicious access to Windows Admin Center APIs, potentially indicating exploitation of CVE-2026-41086.

sigma tactics: privilege_escalation techniques: T1068 sources: webserver

Detect WAC PowerShell API Abuse

high

Detects potential abuse of the Windows Admin Center PowerShell API, which could indicate privilege escalation attempts related to CVE-2026-41086.

sigma tactics: privilege_escalation techniques: T1059.001 sources: webserver

Detection queries are available on the platform. Get full rules →