analyst @ nohacky :~/briefings $
cat / briefings / cve-2026-26119-wac-domain-takeover
analyst@nohacky:~/briefings/cve-2026-26119-windows-admin-center-privilege-escalation-domain-compromise.html
reading mode 14 min read
category Vulnerability
published Mar 2026
read_time 14 min
author NoHacky

CVE-2026-26119: How a Windows Admin Center Auth Flaw Becomes a Domain Takeover

An improperly authenticated API in Windows Admin Center allows a low-privilege attacker to silently borrow the elevated rights of the WAC service process — and in environments where that service runs as a domain administrator, the result is full domain compromise from a single set of stolen credentials.

Management consoles occupy a uniquely dangerous position in enterprise networks. They exist specifically to reach everything — every server, every configuration, every administrative function — from a single interface. That capability, so valuable to IT teams, is exactly what makes them high-value targets. CVE-2026-26119 is a high-severity improper authentication vulnerability in Windows Admin Center (WAC) that demonstrates this risk with uncomfortable clarity. Quietly patched in December 2025 and publicly disclosed on February 17, 2026, the flaw carries a CVSS 3.1 base score of 8.8 and a Microsoft aggregate severity of Critical. The researcher who discovered it described the potential outcome plainly: under certain conditions, a standard domain user could achieve full domain compromise.

The Architecture That Makes WAC Dangerous to Compromise

To understand why CVE-2026-26119 matters, it helps to understand what Windows Admin Center actually is and where it sits in an enterprise environment. WAC is Microsoft's browser-based server management platform, introduced as a modern replacement for the aging MMC snap-in model. It consolidates administration of Windows Server roles, Hyper-V hosts, failover clusters, virtual machines, and Active Directory-joined systems into a single locally hosted web interface.

The key phrase there is "locally hosted." WAC does not run as a cloud service. Organizations typically deploy it on a dedicated bastion host, jump server, or privileged admin workstation. That host communicates directly and persistently with every server it manages — which means the WAC process is almost always running with a service account that holds administrative rights across a significant portion of the managed estate. In many enterprise deployments, that service account is a domain administrator or carries equivalent standing privileges.

This deployment pattern is not a misconfiguration. It is the expected design for a tool that needs to reach every managed server without prompting for credentials on each operation. But it does mean that whatever security boundary WAC presents to the outside world is the only thing standing between an attacker with basic credentials and the full administrative scope of that service account.

warning

The blast radius of a WAC authentication bypass scales directly with the privileges of the WAC service account. Organizations running WAC as a domain admin have effectively staked their entire directory on the correctness of WAC's authentication logic.

The Vulnerability: CWE-287 and What It Means in Practice

CVE-2026-26119 is classified under CWE-287: Improper Authentication. The NVD entry identifies the affected product as Windows Admin Center version 1809.0, with versions prior to 2.6.4 (released as part of WAC version 2511 in December 2025) being vulnerable. Full technical exploitation details remain under responsible disclosure restrictions as of this writing, but the CVSS vector communicates the core attack surface precisely.

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Attack Vector:        Network     — reachable remotely without local access
Attack Complexity:    Low         — no special conditions or race needed
Privileges Required:  Low         — valid but non-admin credentials sufficient
User Interaction:     None        — no victim action required
Scope:                Unchanged   — impact stays within WAC's privilege context
Confidentiality:      High
Integrity:            High
Availability:         High

Base Score: 8.8 (High) / Microsoft Aggregate: Critical

The gap between the CVSS base score of 8.8 and Microsoft's own Critical aggregate severity rating is worth noting. CVSS base scores measure the technical characteristics of a vulnerability in isolation. Microsoft's aggregate severity incorporates real-world deployment context — including the fact that WAC is commonly configured with domain-level service account privileges. A flaw that reaches High on its own technical merits reaches Critical when you account for the environment in which it typically lives.

The root mechanism is an authorization re-validation failure. WAC's internal logic authenticates a user at login but does not properly verify that user's authorization level when processing certain sensitive API operations. The process executes those operations using its own elevated service context rather than the caller's actual permission level. An attacker with any valid WAC login can craft or replay requests that trigger privileged management functions the service account is empowered to perform, regardless of what the attacker's own account is permitted to do.

critical

Microsoft has assessed CVE-2026-26119 as "Exploitation More Likely." No confirmed in-the-wild exploitation has been reported, but Microsoft's own guidance notes that reliable exploit code could be developed and that similar authentication bypass vulnerabilities in management tools have historically been targeted once public details emerge.

From Low-Privilege Login to Domain Admin: The Attack Path

The discovery was made by Andrea Pierini, a Senior Incident Response Consultant at Semperis, an identity security firm specializing in Active Directory threat detection and recovery. Pierini is a well-regarded Windows internals researcher with a history of privilege escalation discoveries including LocalPotato (CVE-2023-21746) and JuicyPotatoNG. Following the public advisory on February 17, 2026, he described the potential impact directly: under certain conditions, this flaw could enable a full domain compromise starting from a standard user account.

While the precise exploitation steps remain restricted pending broader disclosure timelines, the CVSS vector and CWE classification allow a clear reconstruction of the attack path based on the vulnerability's documented characteristics.

The attacker begins with initial access — a low-privilege account that has any level of WAC login rights. This might be a help desk operator, a junior systems administrator, or any account compromised through phishing, credential stuffing, or password spray. Many IT organizations grant broad read or limited-write access to WAC across their operations staff, which means the pool of qualifying accounts is often larger than security teams assume.

With those credentials, the attacker authenticates to the WAC web interface normally. The session is established and the login succeeds. The attacker then crafts API requests targeting operations that should require elevated authorization — account creation, role assignment, Group Policy modification, or direct server management commands. Because WAC fails to re-validate the caller's authorization for these sensitive operations, the requests are executed using the WAC service account's rights rather than the attacker's limited permissions.

If the WAC service account holds domain administrator privileges, the attacker now has the ability to create or modify domain accounts, reset passwords for any identity in the directory, push Group Policy Objects to any machine in the domain, access data across managed servers, and establish persistent backdoor access through techniques like Golden Ticket attacks against the Kerberos KDC. The entire Active Directory forest becomes accessible.

note

This attack requires no malware deployment, no exploitation of a secondary vulnerability, and no victim interaction. A single authentication bypass in the management layer is sufficient to traverse from a low-privilege foothold to enterprise-wide administrative control.

The Disclosure Timeline and the Silent Patch Window

The timeline of CVE-2026-26119's discovery, remediation, and public acknowledgment tells a story that is relevant for any organization that relies on CVE feeds for patch prioritization.

Jul 2025    Andrea Pierini (Semperis) discovers CVE-2026-26119
Dec 2025    Microsoft patches the flaw in WAC version 2511 (v2.6.4)
            Fix ships without a public CVE advisory or security bulletin
Feb 17 2026 Microsoft publishes the MSRC advisory for CVE-2026-26119
Feb 19 2026 Security press coverage begins

The patch was available for roughly two months before Microsoft made the public advisory. Organizations that update WAC proactively and had already deployed version 2511 were protected. Organizations that rely on CVE publications or Microsoft's security update notifications to trigger patch prioritization had no signal during that window that a critical authentication bypass in their management console had already been fixed — and therefore needed installing.

This pattern of silent remediation followed by delayed disclosure is not unusual for vulnerabilities in highly privileged management infrastructure. The rationale is defensible: broadcasting the existence of a management-plane authentication bypass before organizations have had time to patch it creates an open invitation to exploitation. But the downstream effect is that organizations with reactive patch management cadences — those that respond to advisories rather than proactively tracking product version releases — carry unacknowledged risk during the silent window.

WAC's Broader Vulnerability History

CVE-2026-26119 does not exist in isolation. It is the third distinct privilege escalation vulnerability in Windows Admin Center to be patched within a two-month window by two independent research teams using entirely different attack techniques. That pattern warrants attention as a signal about the product's security posture rather than as a series of unrelated findings.

In December 2025, around the time Microsoft was silently patching CVE-2026-26119, Cymulate publicly disclosed CVE-2025-64669, a local privilege escalation flaw rooted in insecure directory permissions on C:\ProgramData\WindowsAdminCenter. The folder was writable by standard users, enabling two independent exploitation paths: abuse of WAC's extension uninstall mechanism through PowerShell script substitution, and DLL hijacking in the update mechanism. The DLL hijacking path required defeating a signature validation check, which Cymulate bypassed using a Time-of-Check Time-of-Use (TOCTOU) race condition — swapping in a malicious DLL after validation completed but before the updater loaded the file. Both paths escalated a standard user to SYSTEM.

In January 2026, Cymulate disclosed a third WAC flaw: CVE-2026-20965, targeting the Azure AD SSO integration in WAC's Azure extension. WAC failed to validate that the User Principal Name matched between the WAC.CheckAccess token and the Proof-of-Possession token, and overly permissive JIT network access rules left the WAC API port (6516) exposed to all source IPs. An attacker with local admin on a single WAC-managed Azure VM could exploit the token mismatch to execute commands on every WAC-managed machine across the tenant. Microsoft patched this via WAC Azure Extension version 0.70.00 on January 13, 2026.

Three vulnerabilities, two research teams, two months, three completely different attack techniques: a network-based authentication bypass, a local insecure-permissions race condition, and a cloud token validation failure. The variety of the attack surfaces suggests that WAC's security issues extend beyond isolated coding errors and reflect systematic weaknesses in how the product handles authentication, authorization, file system permissions, and inter-service token validation.

Remediation: Priority Actions for Defenders

If your organization runs Windows Admin Center, the following actions should be treated as urgent. The patch has been available since December 2025; the public advisory has been issued; and Microsoft's own assessment places exploitation as more likely than not.

Patch immediately

Update every WAC instance to version 2511 (internal version 2.6.4) or later. Do not stop at updating the instance you know about. Audit your environment for any WAC installations on admin workstations, jump servers, and bastion hosts that may have been deployed informally or outside your standard software management processes. Every unpatched instance is an open attack surface. Organizations managing WAC updates through WSUS or SCCM should verify that the Windows Admin Center product category is enabled in their update synchronization settings, as WAC is distributed as a standalone application rather than an OS component and requires explicit configuration to receive enterprise patch management coverage.

Audit service account privileges

Determine what rights the WAC service account holds. If it is a domain administrator, that configuration should be changed regardless of patch status. The correct model for WAC is least privilege: grant only the permissions needed for the specific management tasks WAC performs in your environment, implement just-in-time (JIT) elevation for operations that genuinely require domain-level access, and use just-enough-administration (JEA) constrained endpoints to restrict what the service account can actually do. Standing domain admin rights in a management service account are unnecessary risk that amplifies the severity of any future WAC vulnerability.

Restrict network access to WAC

WAC should never be reachable from general user networks or, under any circumstances, from the internet. Segment it behind a dedicated management VLAN, require VPN or zero-trust network access for connectivity, and limit which source IP addresses can reach the WAC listener. This does not mitigate CVE-2026-26119 directly — the attack vector is Network, meaning any route that can reach the WAC port is sufficient — but it reduces the population of potential attackers from anyone with any network access to only those already on the privileged management network.

Enable MFA for all WAC-connected accounts

Multi-factor authentication adds a barrier that prevents stolen credentials alone from being sufficient for initial WAC access. Because CVE-2026-26119 requires a valid authenticated session to exploit, requiring MFA for all accounts with WAC login rights reduces the risk of credential compromise translating directly into exploitation.

Review logs for retrospective exploitation indicators

The vulnerability existed and was patchable from December 2025 onward. If your environment was running an unpatched WAC instance during that window, hunt retrospectively for indicators of exploitation: unexpected administrative account creation, unusual role assignments without corresponding change tickets, Group Policy modifications outside of normal change windows, and anomalous authentication events or lateral movement originating from WAC management hosts. The attacker's actions, if any, would have appeared to originate from the WAC service account, not from the attacker's own credentials.

Key Takeaways

  1. Management plane tools carry amplified risk: CVE-2026-26119 is dangerous not because of sophisticated exploitation technique but because of where WAC sits in enterprise architecture. A single authentication flaw in a centralized management console can cascade into full domain compromise. Treat WAC, and tools like it, with the same security rigor you apply to domain controllers.
  2. Silent patches create hidden exposure windows: The two-month gap between Microsoft's December 2025 fix and the February 2026 advisory means organizations depending on CVE feeds for patch prioritization had no signal that critical remediation was waiting. Proactive version tracking for security-sensitive applications is not optional; it fills the gap between patch availability and public disclosure.
  3. Service account privilege accumulation is its own vulnerability: CVE-2026-26119 escalates from High to Critical specifically because WAC is commonly configured with domain administrator credentials. Least-privilege and JIT access for management service accounts should be treated as a baseline security control, not a hardening enhancement. Standing privilege in a management tool is an unacknowledged amplifier for every future flaw in that tool.
  4. WAC's vulnerability pattern requires strategic attention: Three privilege escalation vulnerabilities from two independent research teams, using three different attack techniques, patched in a two-month window, is a signal about systemic security weaknesses in the product's codebase. Factor this track record into your risk calculus when determining how WAC is deployed, segmented, and monitored in your environment, and monitor future WAC releases closely.

The fundamental lesson of CVE-2026-26119 is that the thing which makes a management tool valuable — centralized, high-privilege reach across an entire infrastructure — is precisely what makes it dangerous to compromise. Attackers understand this. They target management planes because a single foothold in the control layer outperforms dozens of individual endpoint compromises. Patch your WAC instances, audit your service account privileges, segment your management network, and treat your administrative tooling as the high-assurance infrastructure it actually is.

Sources: Microsoft Security AdvisoryThe Hacker NewsHelp Net SecuritySC MediaTechRepublicCymulate (CVE-2025-64669)Cymulate (CVE-2026-20965)NVD

— end of briefing