Privilege Escalation Vulnerability in Windows Remote Desktop by Microsoft
CVE-2026-21533
Key Information:
- Vendor
Microsoft
- Vendor
- CVE Published:
- 10 February 2026
Badges
What is CVE-2026-21533?
CVE-2026-21533 is a privilege escalation vulnerability found in Microsoftโs Windows Remote Desktop service. Windows Remote Desktop is a widely used application that enables users to connect to and manage remote machines over a network. This vulnerability arises from improper privilege management within the service, which can be exploited by an attacker who has already gained access to the system. By exploiting this vulnerability, an authorized user can elevate their privileges locally, allowing them to gain higher levels of access to the system than intended. This can lead to unauthorized actions, including but not limited to the manipulation of system settings, access to sensitive data, or the installation of malicious software, thereby posing a significant risk to organizations' security and data integrity.
Potential Impact of CVE-2026-21533
-
Unauthorized Access to Sensitive Data: An attacker who successfully exploits this vulnerability may gain access to confidential information stored on the system, which could include sensitive employee data, proprietary company information, or personal identifiable information (PII) of customers.
-
System Compromise: By escalating their privileges, attackers can install unauthorized applications or malware, leading to broader system compromise. This could result in further exploitation of network resources and the establishment of backdoors for ongoing access.
-
Operational Disruption: Elevated privileges can allow an attacker to modify critical system functions or interrupt services, potentially leading to downtime and affecting the overall operations of an organization. Such disruptions can have immediate financial consequences and long-term reputational damage.
CISA has reported CVE-2026-21533
CISA provides regional cyber and physical services to support security and resilience across the United States. CISA monitor the most dangerious vulnerabilities and have identifed CVE-2026-21533 as being exploited but is not known by the CISA to be used in ransomware campaigns. This is subject to change at pace
The CISA's recommendation is: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.
Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.
Affected Version(s)
Windows 10 Version 1607 32-bit Systems 10.0.14393.0 < 10.0.14393.8868
Windows 10 Version 1809 32-bit Systems 10.0.17763.0 < 10.0.17763.8389
Windows 10 Version 21H2 32-bit Systems 10.0.19044.0 < 10.0.19044.6937
References
CVSS V3.1
Timeline
- ๐
Vulnerability started trending
- ๐พ
Exploit known to exist
- ๐ฆ
CISA Reported
Vulnerability published
Vulnerability Reserved