CVE-2026-26183

HIGH

Remote Access Management service/API (RPC server) Elevation of Privilege Vulnerability

Title source: cna
STIX 2.1

Description

Improper access control in Windows RPC API allows an authorized attacker to elevate privileges locally.

Scores

CVSS v3 7.8
EPSS 0.0004
EPSS Percentile 13.7%
Attack Vector LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

CISA SSVC

Vulnrichment
Exploitation none
Automatable no
Technical Impact total

Details

CWE
CWE-284
Status published
Products (19)
Microsoft/Windows Server 2012 6.2.9200.0 - 6.2.9200.26026
Microsoft/Windows Server 2012 (Server Core installation) 6.2.9200.0 - 6.2.9200.26026
Microsoft/Windows Server 2012 R2 6.3.9600.0 - 6.3.9600.23132
Microsoft/Windows Server 2012 R2 (Server Core installation) 6.3.9600.0 - 6.3.9600.23132
Microsoft/Windows Server 2016 10.0.14393.0 - 10.0.14393.9060
Microsoft/Windows Server 2016 (Server Core installation) 10.0.14393.0 - 10.0.14393.9060
Microsoft/Windows Server 2019 10.0.17763.0 - 10.0.17763.8644
Microsoft/Windows Server 2019 (Server Core installation) 10.0.17763.0 - 10.0.17763.8644
Microsoft/Windows Server 2022 10.0.20348.0 - 10.0.20348.5020
Microsoft/Windows Server 2022, 23H2 Edition (Server Core installation) 10.0.25398.0 - 10.0.25398.2274
... and 9 more
Published Apr 14, 2026
Tracked Since Apr 14, 2026