Description
Improper link resolution before file access ('link following') in Azure Portal Windows Admin Center allows an authorized attacker to elevate privileges locally.
Published: 2026-05-20
Score: 7.8 High
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability is an improper link resolution before file access, also known as link following, in Azure Portal Windows Admin Center. This weakness allows an authorized user to execute operations with higher privileges than intended, effectively bypassing local security controls. By exploiting this flaw, an attacker can obtain privileged access and potentially compromise the entire system, leading to unauthorized modification, data disclosure, or denial of service for the compromised host.

Affected Systems

Microsoft Windows Admin Center in Azure Portal is affected. No specific version numbers are provided; administrators should verify that all installed instances receive the fix related to CVE-2026-42834.

Risk and Exploitability

The CVSS score of 7.8 classifies the vulnerability as high severity. The EPSS score is not available, but the lack of a listing in CISA’s KEV catalog suggests that there are no known public exploits at this time. The attack vector is local: it requires an attacker to have authorized access to the Azure Portal. However, because the flaw enables privilege escalation, the potential impact is significant, turning a legitimate user into a full administrative entity.

Generated by OpenCVE AI on May 20, 2026 at 15:06 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the Microsoft patch for Windows Admin Center in Azure Portal that addresses CVE-2026-42834.
  • Disable or restrict link following for file access within Azure Portal to ensure only authenticated paths are resolved.
  • Apply a least privilege model to Azure Portal user accounts, granting administrative rights only to users who truly need them.

Generated by OpenCVE AI on May 20, 2026 at 15:06 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 20 May 2026 18:30:00 +0000

Type Values Removed Values Added
First Time appeared Microsoft windows Admin Center
CPEs cpe:2.3:a:microsoft:windows_admin_center:*:*:*:*:*:azure:*:*
Vendors & Products Microsoft windows Admin Center

Wed, 20 May 2026 14:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 20 May 2026 13:15:00 +0000

Type Values Removed Values Added
Description Improper link resolution before file access ('link following') in Azure Portal Windows Admin Center allows an authorized attacker to elevate privileges locally.
Title Windows Admin Center in Azure Portal Elevation of Privilege Vulnerability
First Time appeared Microsoft
Microsoft azure Portal Windows Admin Center
Weaknesses CWE-59
CPEs cpe:2.3:a:microsoft:azure_portal_windows_admin_center:*:*:*:*:*:*:*:*
Vendors & Products Microsoft
Microsoft azure Portal Windows Admin Center
References
Metrics cvssV3_1

{'score': 7.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C'}


Subscriptions

Microsoft Azure Portal Windows Admin Center Windows Admin Center
cve-icon MITRE

Status: PUBLISHED

Assigner: microsoft

Published:

Updated: 2026-05-20T23:29:12.502Z

Reserved: 2026-04-30T14:51:12.703Z

Link: CVE-2026-42834

cve-icon Vulnrichment

Updated: 2026-05-20T13:41:52.420Z

cve-icon NVD

Status : Analyzed

Published: 2026-05-20T13:16:34.500

Modified: 2026-05-20T18:29:08.070

Link: CVE-2026-42834

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-20T15:15:06Z

Weaknesses