Skip to main content
Mallory

Windows Admin Center flaws exposed hybrid Azure and on-prem environments to takeover

identity-authentication-vulnerabilitycloud-service-vulnerabilityinternet-facing-service-vulnerabilitywidely-deployed-product-advisorycredential-access-method
Updated April 23, 2026 at 01:08 PM2 sources
Share:
Windows Admin Center flaws exposed hybrid Azure and on-prem environments to takeover

Get Ahead of Threats Like This

Know if you're exposed. Before adversaries strike.

Researchers disclosed multiple vulnerabilities in Microsoft Windows Admin Center (WAC) that could let attackers compromise hybrid environments spanning Azure and on-premises infrastructure. Cymulate said one exploit chain enabled unauthenticated, one-click remote code execution when a victim visited a malicious URL, combining response-based cross-site scripting, insecure redirect handling, and insecure credential storage to steal credentials, run arbitrary PowerShell commands, and capture Azure tokens. The issues affected both Azure-integrated and on-prem deployments, with the most severe risk falling on self-managed on-prem WAC instances that could be used to execute commands on managed servers and pivot into cloud resources.

Additional flaws presented at Black Hat Asia were tracked as CVE-2025-64669, CVE-2026-20965, CVE-2026-23660, and CVE-2026-32196, including a non-write-protected on-prem WAC directory and weaknesses in proof-of-possession token validation that could allow token reuse or forgery and takeover of tenant VMs. Microsoft said Azure-managed instances received server-side fixes after responsible disclosure, and the company has patched the broader set of vulnerabilities with no evidence of active exploitation. Researchers urged organizations to update on-prem WAC immediately, remove outdated exposed instances, and treat both cloud and on-prem management planes as tier-zero assets because WAC can serve as a bidirectional path between the two environments.

Timeline

  1. Apr 23, 2026

    Cymulate publicly discloses WAC exploit chain and hybrid-cloud risks

    At Black Hat Asia, Cymulate researchers publicly disclosed the Windows Admin Center vulnerabilities and described how they could enable one-click unauthenticated RCE, credential theft, token abuse, and movement between on-premises and Azure environments. They warned that on-premises deployments were especially exposed and urged organizations to update and verify no outdated instances remained accessible.

  2. Apr 23, 2026

    Microsoft patches four Windows Admin Center vulnerabilities

    Microsoft patched four vulnerabilities affecting Windows Admin Center in hybrid Azure and on-premises environments, including CVE-2025-64669, CVE-2026-20965, CVE-2026-23660, and CVE-2026-32196. Reporting states there was no indication of active exploitation at the time of disclosure.

  3. Aug 22, 2025

    Microsoft applies server-side fixes to Azure-managed WAC instances

    After the responsible disclosure, Microsoft deployed server-side mitigations for Azure-managed Windows Admin Center instances, automatically protecting cloud customers. The fixes addressed the Azure side of the disclosed attack chain.

  4. Aug 22, 2025

    Cymulate responsibly discloses Windows Admin Center flaws to Microsoft

    Cymulate Research Labs reported a critical Windows Admin Center vulnerability chain to Microsoft under responsible disclosure. The disclosure date is explicitly given as August 22, 2025.

See the full picture in Mallory

Mallory subscribers get deeper analysis on every story, including:

Impact Assessment

Who’s affected and how

Technical Details

Deep-dive technical analysis

Response Recommendations

Actionable next steps for your team

Indicators of Compromise

IPs, domains, hashes, and more

AI Threads

Ask questions and take action on every story

Advanced Filters

Filter by topic, classification, timeframe

Scheduled Alerts

Get matching stories delivered automatically

Related Stories

Critical Privilege Escalation in Windows Admin Center (CVE-2026-26119)

Critical Privilege Escalation in Windows Admin Center (CVE-2026-26119)

Microsoft disclosed and patched a **critical elevation-of-privilege vulnerability** in *Windows Admin Center (WAC)* tracked as **CVE-2026-26119**. The issue is caused by **improper authentication** (`CWE-287`) and is rated **CVSS 8.8** with a network attack vector (`CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H`). An attacker with **low/limited existing privileges** could exploit the flaw over the network to gain elevated privileges equivalent to the user context running WAC, which is particularly high impact given WAC’s role in centralized administration of Windows servers. Microsoft’s advisory indicates the vulnerability was newly published in its Security Update Guide and is addressed via an **official Windows Admin Center security update**; organizations are advised to apply the update promptly. Public reporting also notes Microsoft has **not observed active exploitation** at the time of disclosure, but assesses exploitation as **more likely** due to low attack complexity and typical enterprise exposure of WAC deployments; no public PoC was noted. Microsoft credited **Andrea Pierini (Semperis)** for responsible disclosure.

1 months ago
Local Privilege Escalation Vulnerabilities in Windows Management Tools

Local Privilege Escalation Vulnerabilities in Windows Management Tools

A critical vulnerability in the JumpCloud Remote Assist for Windows agent (CVE-2025-34352) allows a standard user on a company-managed device to gain full, persistent SYSTEM-level control. The flaw, discovered by XM Cyber, arises from the agent's uninstallation process, which performs privileged file operations in a user-controlled temporary folder. This enables local users to exploit the uninstall routine to overwrite or delete sensitive system files, resulting in either local privilege escalation or denial of service. Over 180,000 organizations using JumpCloud are potentially at risk until the issue is remediated. Separately, Microsoft’s Windows Admin Center (WAC) is affected by a local privilege escalation vulnerability (CVE-2025-64669) due to insecure directory permissions on `C:\ProgramData\WindowsAdminCenter`. Standard users can write to this directory, which is also accessed by services running with elevated privileges, allowing attackers to exploit extension uninstall mechanisms or DLL hijacking to obtain SYSTEM-level access. Both vulnerabilities highlight the risks posed by improper privilege separation and insecure file system permissions in widely deployed Windows management tools.

1 months ago
Microsoft Discloses Critical Azure MCP Server and AKS Authentication Flaws

Microsoft Discloses Critical Azure MCP Server and AKS Authentication Flaws

Microsoft disclosed two high-severity vulnerabilities affecting hosted Azure services: **CVE-2026-32211** in **Azure MCP Server** and **CVE-2026-33105** in **Azure Kubernetes Service (AKS)**. The Azure MCP Server issue is an information disclosure flaw tied to **missing authentication for a critical function** (`CWE-306`), allowing an unauthenticated attacker to access sensitive information over the network. Its CVSS v3.1 vector, `AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N`, indicates remote exploitation with no privileges or user interaction required. Microsoft also published **CVE-2026-33105**, an **improper authorization** vulnerability in AKS mapped to `CWE-285`, which could let an unauthenticated attacker **elevate privileges** remotely. The CVSS v3.1 vector, `AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H`, reflects potential high impact across confidentiality, integrity, and availability. Both entries were identified as affecting **exclusively hosted services** and point defenders to Microsoft’s MSRC advisories for service-specific remediation and exposure assessment.

1 months ago

Get Ahead of Threats Like This

Mallory continuously monitors global threat intelligence and correlates it with your attack surface. Know if you're exposed. Before adversaries strike.

Windows Admin Center flaws exposed hybrid Azure and on-prem environments to takeover | Mallory