CVE-2026-26154
Windows Server Update Service (WSUS) Tampering Vulnerability
CVSS Score
7.5
EPSS Score
0.0%
EPSS Percentile
0th
Improper input validation in Windows Server Update Service allows an unauthorized attacker to perform tampering over a network.
| Vendor | microsoft |
| Product | windows server 2012 |
| Ecosystems | |
| Industries | TechnologyEnterprise |
| Published | Apr 14, 2026 |
| Last Updated | Apr 16, 2026 |
Stay Ahead of the Next One
Get instant alerts for microsoft windows server 2012
Be the first to know when new high vulnerabilities affecting microsoft windows server 2012 are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Affected Versions
Microsoft / Windows Server 2012
6.2.9200.0 < 6.2.9200.26026
Microsoft / Windows Server 2012 (Server Core installation)
6.2.9200.0 < 6.2.9200.26026
Microsoft / Windows Server 2012 R2
6.3.9600.0 < 6.3.9600.23132
Microsoft / Windows Server 2012 R2 (Server Core installation)
6.3.9600.0 < 6.3.9600.23132
Microsoft / Windows Server 2016
10.0.14393.0 < 10.0.14393.9060
Microsoft / Windows Server 2016 (Server Core installation)
10.0.14393.0 < 10.0.14393.9060
Microsoft / Windows Server 2019
10.0.17763.0 < 10.0.17763.8644
Microsoft / Windows Server 2019 (Server Core installation)
10.0.17763.0 < 10.0.17763.8644
Microsoft / Windows Server 2022
10.0.20348.0 < 10.0.20348.5020
Microsoft / Windows Server 2022, 23H2 Edition (Server Core installation)
10.0.25398.0 < 10.0.25398.2274
Microsoft / Windows Server 2025
10.0.26100.0 < 10.0.26100.32690
Microsoft / Windows Server 2025 (Server Core installation)
10.0.26100.0 < 10.0.26100.32690