THREAT ADVISORY Zero-Day Windows Remote Desktop Services Elevation of Privilege CVE-2026-21533 February 11, 2026

DOWNLOAD PDF

Executive Summary

THREAT ADVISORY

A critical zero-day vulnerability, tracked as CVE-2026-21533, has been identified in Windows Remote Desktop Services (RDS). This flaw allows authenticated attackers with low-level access to escalate privileges to SYSTEM level on affected systems. The vulnerability stems from improper privilege management, enabling attackers to modify RDS service configuration registry keys and replace them with attacker-controlled values, potentially adding new users to the Administrators group.

Discovered by CrowdStrike’s Advanced Research Team and patched by Microsoft on February 10, 2026, as part of Patch Tuesday, this vulnerability has been confirmed as actively exploited in the wild. Exploitation requires local access, but no user interaction, making it ideal for post-compromise scenarios in environments with RDS enabled, such as servers used for remote administration.

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added CVE-2026-21533 to its Known Exploited Vulnerabilities (KEV) Catalog, mandating federal agencies to apply mitigations by March 3, 2026, or discontinue use of affected products. While no specific threat actor attribution is publicly available, the nature of the exploit suggests use by opportunistic cybercriminals or advanced persistent threats (APTs) for lateral movement and persistence in breached networks. Organizations with exposed RDS services are urged to patch immediately and implement defensive measures to prevent escalation.

CVSS 3.1 Score: 7.8 (High)

Exploitation Status:

Detected in the wild (functional exploit code maturity).

Technical Details

CVE-2026-21533 is an elevation-of-privilege vulnerability classified under CWE-269 (Improper Privilege Management). It affects the RDS component in multiple Windows versions, primarily servers where RDS is enabled for remote access. The flaw allows an attacker with initial low-privileged access (e.g., via a compromised user account) to manipulate registry keys associated with RDS service configurations. This can lead to arbitrary code execution at SYSTEM level, compromising the confidentiality, integrity, and availability of the system.

Affected Systems

The vulnerability impacts a wide range of Windows operating systems, including both client and server editions. Below is a comprehensive list of affected builds:

 

Operating System Build Number Architecture
Windows Server 2025 10.0.26100.32370 x64 (Server Core)
Windows 11 24H2 10.0.26100.7840 x64/ARM64
Windows Server 2022 10.0.20348.4773 x64 (Server Core, 23H2 Edition)
Windows 11 23H2 10.0.22631.6649 x64/ARM64
Windows Server 2019 10.0.17763.8389 x64 (Server Core)
Windows 10 22H2 10.0.19045.6937 x86/x64/ARM64
Windows Server 2016 10.0.14393.8868 x64 (Server Core)
Windows Server 2012 R2 6.3.9600.23022 x64 (Server Core)
Windows Server 2012 Various x64 (Server Core)
Windows 10 21H2/1607/1809 Various x86/x64/ARM64
Windows 11 25H2/26H1 Various x64/ARM64

All systems with RDS enabled are vulnerable. Legacy deployments (e.g., Windows Server 2012) are particularly at risk due to slower patching cycles.

Exploitation Mechanism

Exploitation involves an exploit binary that targets RDS registry keys, replacing legitimate configurations with malicious ones. This enables privilege escalation without requiring additional user input. While the vulnerability is labeled “remote” in name, it is strictly local in vector, often chained with initial access methods like RDP brute-forcing or phishing. Proof-of-concept (PoC) exploit binaries have been observed, but no public PoC code is available as of February 11, 2026.

Attribution and Threat Actors

No specific threat actor groups have been publicly attributed to exploiting CVE-2026-21533. However, CrowdStrike notes that threat actors in possession of the exploit binaries are likely to accelerate usage or sales in the near term. Given the vulnerability’s utility for post-exploitation, it aligns with tactics used by ransomware affiliates and APTs focused on Windows environments.

Historical context from 2025 threat reports indicates similar privilege escalation flaws (e.g., in Fortinet products) were exploited by groups like Qilin for initial access and ransomware deployment. State-sponsored actors, such as Russia’s APT28 (Fancy Bear), have been observed exploiting comparable Microsoft vulnerabilities (e.g., CVE-2026-21509) in coordinated campaigns. While not directly linked, these patterns suggest potential adoption by sophisticated actors for lateral movement in enterprise networks.

General trends in 2026 threat landscapes highlight increased automation in vulnerability exploitation, with AI-assisted tools enabling rapid chaining of flaws like this one. Ransomware remains a top concern, with groups leveraging such escalations for data exfiltration and encryption.

Indicators of Compromise (IOCs)

As of February 11, 2026, no publicly disclosed IOCs (e.g., file hashes, IP addresses, or registry artifacts) are available for CVE-2026-21533 exploits. However, organizations should monitor for anomalous activity such as:

  • Unexpected modifications to RDS-related registry keys (e.g., under HKLM\SYSTEM\CurrentControlSet\Services\TermService).
  • Creation of new administrative users or groups via escalated privileges.
  • Suspicious processes spawning from RDS components.

Organizations should deploy endpoint detection and response (EDR) tools to flag privilege escalation attempts. If exploitation is suspected, forensic analysis of registry changes and process logs is recommended.

Tactics, Techniques, and Procedures (TTPs)

This vulnerability maps to MITRE ATT&CK Framework:

  • TA0004 – Privilege Escalation: T1068 – Exploitation for Privilege Escalation (primary technique, involving local exploit of RDS flaws).
  • TA0003 – Persistence: T1543.003 – Create or Modify System Process: Windows Service (modification of service configurations for persistent access).
  • TA0008 – Lateral Movement: T1021.001 – Remote Desktop Protocol (often chained with RDP for initial access leading to escalation).

Attackers may chain this with other zero-days from the February 2026 Patch Tuesday (e.g., CVE-2026-21519 in Desktop Window Manager) for full compromise. In broader 2026 trends, automated tools enable rapid reconnaissance and exploitation, reducing time-to-compromise.

Recommendations

  1. Patch Immediately: Apply the February 2026 security updates via Windows Update or the Microsoft Update Catalog. Relevant KB articles include KB5075899 (Windows Server 2025) and others listed in the Microsoft Security Update Guide. Test patches in staging environments to avoid disrupting RDS-dependent services.
  2. Disable Unnecessary Services: Turn off RDS if not required or restrict it to trusted networks using firewalls and VPNs.
  3. Implement Least Privilege: Enforce strict access controls and monitor for unauthorized privilege changes.
  4. Deploy Monitoring: Use EDR/XDR solutions to detect registry modifications and anomalous escalations. Enable logging for RDS events.
  5. Network Segmentation: Isolate RDS servers to limit lateral movement post-breach.
  6. Backup and Recovery: Maintain offline backups and test incident response plans for ransomware scenarios.
  7. Stay Informed: Monitor CISA KEV updates and vendor advisories for emerging IOCs or PoCs.

For federal entities, compliance with Binding Operational Directive (BOD) 22-01 is required. If active exploitation is detected, isolate affected systems and report to relevant authorities (e.g., CISA via report@cisa.gov).

CONTACT US