theinfosecnews

CVE-2026-21533

CISA KEV

Published February 10, 2026 · Updated April 3, 2026

high

What This Means

# CVE-2026-21533: Windows RDS Privilege Escalation **What it is:** CVE-2026-21533 is a privilege escalation flaw in Microsoft Windows Remote Desktop Services that permits an authenticated local attacker to gain elevated system privileges through improper privilege management controls. **Impact:** An attacker with valid credentials can move from standard user access to SYSTEM or administrator level, enabling full system compromise, lateral movement, and persistence mechanisms. **Action items:** Monitor your Windows systems for exploitation attempts targeting RDS processes and services; apply Microsoft security patches when released; restrict RDS access to necessary users only; implement credential guard and enforce strong authentication on RDP endpoints; review privileged access logs for suspicious elevation activity.

Official Description+

Microsoft Windows Remote Desktop Services contains an improper privilege management vulnerability that could allow an authorized attacker to elevate privileges locally.

Affected Products

VendorProduct
MicrosoftWindows

Patch Status

Patch by 2026-03-03

Recommended Actions

  1. Check if your systems use any of the affected products listed above.
  2. Apply vendor patches immediately if available.
  3. This vulnerability is in CISA's Known Exploited Vulnerabilities catalog — prioritize remediation.
  4. Monitor vendor advisories for updates and additional mitigations.
  5. Review logs for indicators of compromise related to CVE-2026-21533.

Related Coverage

Vvulnerability

CVE-2026-21533: Windows Remote Desktop Services Privilege Escalation Exposes Systems to Full Compromise

CVE-2026-21533 is an improper privilege management vulnerability in Microsoft Windows Remote Desktop Services that allows an authenticated local attacker to escalate privileges to SYSTEM level. CISA has added it to the Known Exploited Vulnerabilities catalog with a mandatory patch deadline of March 3, 2026, for federal agencies. Organizations should apply Microsoft's patch immediately, restrict RDS access, enforce MFA on RDP endpoints, and monitor for privilege escalation indicators.

CISA KEV·52d ago·3 min read