Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Fri, 13 Mar 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | NVD-CWE-Other |
Tue, 10 Mar 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 10 Mar 2026 17:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Authentication bypass using an alternate path or channel in Azure Windows Virtual Machine Agent allows an authorized attacker to elevate privileges locally. | |
| Title | Arc Enabled Servers - Azure Connected Machine Agent Elevation of Privilege Vulnerability | |
| First Time appeared |
Microsoft
Microsoft arc Enabled Servers Azure Connected Machine Agent |
|
| Weaknesses | CWE-288 | |
| CPEs | cpe:2.3:a:microsoft:arc_enabled_servers_azure_connected_machine_agent:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Microsoft
Microsoft arc Enabled Servers Azure Connected Machine Agent |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: microsoft
Published:
Updated: 2026-04-14T16:36:39.995Z
Reserved: 2026-02-11T15:52:13.911Z
Link: CVE-2026-26117
Updated: 2026-03-10T18:39:48.729Z
Status : Analyzed
Published: 2026-03-10T18:18:41.017
Modified: 2026-03-13T20:14:21.453
Link: CVE-2026-26117
No data.
OpenCVE Enrichment
Updated: 2026-03-20T14:34:02Z