PT-2026-7412 · Microsoft · Windows
Published
2026-02-10
·
Updated
2026-03-10
·
CVE-2026-21533
CVSS v3.1
7.8
7.8
High
| Base vector | Vector | AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
Name of the Vulnerable Software and Affected Versions
Microsoft Windows versions prior to February 2026 Patch Tuesday updates
Description
An issue exists in Microsoft Windows Remote Desktop Services due to improper privilege management. This allows an authorized attacker to elevate privileges, potentially gaining SYSTEM-level access. The vulnerability is actively exploited in the wild, with reports of exploitation dating back to December 2025. The vulnerability is being sold on dark web forums for approximately $220,000. Exploitation requires no user interaction. The flaw stems from flawed privilege handling in RDS components. The vulnerability allows an attacker to modify service configuration keys to escalate privileges. It impacts confidentiality, integrity, and availability.
Recommendations
Apply the February 2026 Patch Tuesday updates to all affected systems.
Prioritize updates on RDS-enabled servers.
Hunt for suspicious RDS-related registry and service modifications.
Consider disabling Remote Desktop Services if not required.
Fix
RCE
LPE
Improper Privilege Management
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
BDU:2026-01701
CVE-2026-21533
Affected Products
Windows
References · 49
- https://safe-surf.ru/specialists/bulletins-nkcki/729091 · Security Note
- https://bdu.fstec.ru/vul/2026-01701 · Security Note
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21533 · Security Note
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21533 · Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2026-21533 · Security Note
- https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-21533 · Vendor Advisory
- https://twitter.com/nxtgen579255/status/2030807720195178563 · Twitter Post
- https://twitter.com/VaultEdgeIT/status/2021683206706077891 · Twitter Post
- https://twitter.com/AIengineerlife/status/2026304605458665602 · Twitter Post
- https://twitter.com/The_Cyber_News/status/2021454025523437592 · Twitter Post
- https://reddit.com/r/Action1/comments/1r18ofk/february_patch_tuesday_overview · Reddit Post
- https://twitter.com/ThreatSynop/status/2021426210597650629 · Twitter Post
- https://twitter.com/ptdbugs/status/2031328065746309313 · Twitter Post
- https://twitter.com/grok/status/2030629289738014972 · Twitter Post
- https://twitter.com/dailytechonx/status/2021646687333183878 · Twitter Post