PT-2026-2761 · Microsoft · Windows Admin Center
Ben Zamir
+2
·
Published
2026-01-13
·
Updated
2026-02-22
·
CVE-2026-20965
CVSS v3.1
7.5
7.5
High
| Base vector | Vector | AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H |
Name of the Vulnerable Software and Affected Versions
Windows Admin Center versions prior to 0.70.00
Description
The issue involves improper verification of cryptographic signatures within Windows Admin Center. Exploitation may allow an attacker with local administrator access to elevate privileges and potentially achieve tenant-wide remote code execution (RCE). The flaw resides in the Azure Single Sign-On (SSO) implementation, specifically related to the validation of Proof-of-Possession (PoP) tokens. Attackers can exploit this by mixing a stolen administrator access token with a forged PoP token to impersonate privileged users and move laterally across an entire Azure tenant. The vulnerability affects the validation of tokens used for authentication and authorization, potentially bypassing critical security mechanisms. The vulnerability allows an attacker to hijack token validation. The affected component uses two tokens: a
WAC.CheckAccess token and a PoP-bound token.Recommendations
Update Windows Admin Center to version 0.70.00 or later.
Monitor for suspicious
WAC [identity]@[tenant].onmicrosoft.com virtual accounts.
Monitor for unexpected access to port 6516.Fix
RCE
Improper Verification of Cryptographic Signature
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
BDU:2026-00475
CVE-2026-20965
Affected Products
Windows Admin Center
References · 15
- https://nvd.nist.gov/vuln/detail/CVE-2026-20965 · Security Note
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20965 · Vendor Advisory
- https://bdu.fstec.ru/vul/2026-00475 · Security Note
- https://twitter.com/CVEnew/status/2012669659879972881 · Twitter Post
- https://twitter.com/dailytechonx/status/2012233900265803780 · Twitter Post
- https://reddit.com/r/u_aalejos/comments/1qjairr/cve202620965_vulnerabilidad_cr%C3%ADtica_en_azure · Reddit Post
- https://cymulate.com/blog/cve-2026-20965-azure-windows-admin-center-tenant-wide-rce · Reddit Post
- https://twitter.com/jedisct1/status/2013922739996836185 · Twitter Post
- https://twitter.com/_r_netsec/status/2011826483640353176 · Twitter Post
- https://twitter.com/blueteamsec1/status/2024645572947562907 · Twitter Post
- https://twitter.com/transilienceai/status/2014541749209743632 · Twitter Post
- https://twitter.com/autumn_good_35/status/2012159448404619452 · Twitter Post
- https://twitter.com/ThreatSynop/status/2012136580413059341 · Twitter Post
- https://twitter.com/eyalestrin/status/2012803538876039346 · Twitter Post
- https://twitter.com/_r_netsec/status/2025619872974258226 · Twitter Post