Home Microsoft CVE-2026-26170
Back to Microsoft

CVE-2026-26170

Microsoft PowerShell

Microsoft CVSS 7.8 Updated April 16, 2026

Executive Risk Summary

"A vulnerability in Microsoft PowerShell allows an authorized attacker to elevate privileges locally, potentially leading to unauthorized access to sensitive data and systems. This vulnerability can be exploited by an attacker with valid credentials to gain elevated privileges."

Anticipated Attack Path

  1. 1. Initial Access: Authorized attacker gains access to the system
  2. 2. Privilege Escalation: Attacker exploits vulnerability in PowerShell to elevate privileges
  3. 3. Persistence: Attacker maintains access and potentially moves laterally within the system

Am I Vulnerable?

  • Verify PowerShell version and patch level
  • Monitor system logs for suspicious activity
  • Implement least privilege access controls for PowerShell

Operational Audit Arsenal

Target Type Process
Target Asset powershell.exe
Standard Path C:\Windows\System32\WindowsPowerShell\v1.0\
PowerShell
# 🛠️ Senior Engineer Universal Audit
# Target: powershell.exe (Process)
$Targets = 'powershell.exe'
$SearchPaths = @("$env:windir\System32", "$env:ProgramFiles", "${env:ProgramFiles(x86)}")

Get-ChildItem -Path $SearchPaths -Include $Targets -Recurse -ErrorAction SilentlyContinue | 
Select-Object FullName, @{Name="Version";Expression={$_.VersionInfo.ProductVersion}}

Patch Impact Forecast

Reboot Required Unlikely

Minimal, as the patch only updates the PowerShell component

Internal Work Notes

CVE-2026-26170: Microsoft PowerShell Privilege Escalation Vulnerability - Apply patch and verify PowerShell version to prevent unauthorized access

Technical Intelligence & Operational Utilities • Delivered Weekly

Intelligence Sources

Related Microsoft Threats

Data compiled from NVD, MSRC, and CISA KEV Catalog. Intelligence synthesized via AI. Scripts provided for diagnostic purposes under MIT License.