Cyber Posture

CVE-2026-26148

High

Published: 10 March 2026

Published
10 March 2026
Modified
13 March 2026
KEV Added
Patch
CVSS Score 8.1 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
EPSS Score 0.0006 17.5th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.

Security Summary

CVE-2026-26148, published on 2026-03-10, is a vulnerability involving external initialization of trusted variables or data stores in Azure Entra ID. This flaw, classified under CWE-454 (External Initialization of Trusted Variables or Data Stores) and NVD-CWE-noinfo, carries a CVSS v3.1 base score of 8.1 (AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H), indicating high severity due to its potential for significant confidentiality, integrity, and availability impacts with a changed scope.

An unauthorized attacker with local access (AV:L) can exploit this vulnerability despite requiring no privileges (PR:N). The attack demands high complexity (AC:H) and no user interaction (UI:N), but successful exploitation enables privilege escalation locally, resulting in high impacts across confidentiality, integrity, and availability (C:H/I:H/A:H) within a changed scope (S:C).

For mitigation details, refer to the official advisory at https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26148.

Details

CWE(s)
CWE-454NVD-CWE-noinfo

Affected Products

microsoft
azure ad ssh login extension for linux
1.0.0 — 1.0.033370002

MITRE ATT&CK Enterprise Techniques

T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
Why these techniques?

The vulnerability enables local privilege escalation through exploitation, directly mapping to T1068: Exploitation for Privilege Escalation.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References