Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-20805: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in Microsoft Windows 10 Version 1607

0
Medium
VulnerabilityCVE-2026-20805cvecve-2026-20805cwe-200
Published: Tue Jan 13 2026 (01/13/2026, 17:56:08 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows 10 Version 1607

Description

Exposure of sensitive information to an unauthorized actor in Desktop Windows Manager allows an authorized attacker to disclose information locally.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/02/2026, 00:34:55 UTC

Technical Analysis

CVE-2026-20805 is a vulnerability classified under CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor) affecting Microsoft Windows 10 Version 1607, specifically build 10.0.14393. The flaw resides in the Desktop Windows Manager (DWM), a core component responsible for rendering graphical user interfaces. An authorized attacker with low privileges on the local system can exploit this vulnerability to disclose sensitive information without requiring user interaction. The CVSS v3.1 base score is 5.5, reflecting medium severity, with attack vector local (AV:L), low attack complexity (AC:L), and privileges required low (PR:L). The vulnerability impacts confidentiality (C:H) but does not affect integrity or availability. The scope remains unchanged (S:U), meaning the impact is confined to the vulnerable component. No known exploits have been reported in the wild, and no patches are currently linked, indicating the need for vigilance and timely updates once available. This vulnerability could allow attackers who have gained limited access to a system to escalate their information gathering capabilities by accessing sensitive data managed or cached by the Desktop Windows Manager. Since the affected version is an older Windows 10 release (1607), systems that have not been upgraded or patched remain vulnerable. The technical details confirm the vulnerability was reserved in December 2025 and published in January 2026, indicating recent discovery and disclosure.

Potential Impact

The primary impact of CVE-2026-20805 is the unauthorized disclosure of sensitive information on affected Windows 10 Version 1607 systems. This can compromise confidentiality, potentially exposing user data, system information, or other sensitive content handled by the Desktop Windows Manager. Although the vulnerability does not affect system integrity or availability, the leakage of sensitive information can facilitate further attacks such as privilege escalation, lateral movement, or targeted espionage. Organizations relying on legacy Windows 10 systems, especially in environments with multiple users or shared access, face increased risk. The requirement for local access limits the threat to insiders or attackers who have already compromised a system to some extent. However, in high-security environments, even local information disclosure can have significant consequences. The absence of known exploits in the wild reduces immediate risk but does not eliminate the potential for future exploitation. Overall, the vulnerability poses a moderate risk that could impact confidentiality and operational security if left unmitigated.

Mitigation Recommendations

1. Upgrade affected systems to a supported and fully patched version of Windows 10 or later to eliminate exposure to this vulnerability. 2. Until patches are available, restrict local access to trusted users only, minimizing the risk of unauthorized local exploitation. 3. Implement strict access controls and user privilege management to reduce the likelihood of low-privilege attackers gaining access to vulnerable systems. 4. Monitor local system activity for unusual access patterns or attempts to exploit Desktop Windows Manager components. 5. Employ endpoint detection and response (EDR) solutions capable of identifying suspicious local information disclosure attempts. 6. Educate users and administrators about the risks of running outdated Windows versions and the importance of timely updates. 7. Once Microsoft releases a security update addressing this vulnerability, prioritize its deployment across all affected systems. 8. Consider network segmentation to isolate legacy systems and limit the impact of potential local compromises. These steps go beyond generic advice by focusing on controlling local access, monitoring, and proactive system upgrades specific to the affected Windows version and component.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
microsoft
Date Reserved
2025-12-03T05:54:20.371Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69668adaa60475309f9adf3a

Added to database: 1/13/2026, 6:11:38 PM

Last enriched: 3/2/2026, 12:34:55 AM

Last updated: 3/25/2026, 3:35:42 PM

Views: 519

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses