Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-20805: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in Microsoft Windows 10 Version 1809

0
Medium
VulnerabilityCVE-2026-20805cvecve-2026-20805cwe-200
Published: Tue Jan 13 2026 (01/13/2026, 17:56:08 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows 10 Version 1809

Description

CVE-2026-20805 is a medium severity vulnerability in Microsoft Windows 10 Version 1809 affecting the Desktop Windows Manager component. It allows an authorized local attacker with low privileges to disclose sensitive information without user interaction. The vulnerability does not impact system integrity or availability but poses a confidentiality risk by exposing sensitive data. There are no known exploits in the wild, and no patches have been linked yet. The attack requires local access and privileges, limiting its scope but still posing a risk in environments where multiple users share systems or where privilege escalation is possible. European organizations using Windows 10 Version 1809 should be aware of this vulnerability, especially in sectors handling sensitive data. Mitigation involves restricting local access, monitoring for suspicious activity, and applying updates once available. Countries with high Windows 10 enterprise usage and critical infrastructure reliance on this OS version are most at risk.

AI-Powered Analysis

AILast updated: 02/05/2026, 08:35:36 UTC

Technical Analysis

CVE-2026-20805 is a vulnerability classified under CWE-200, indicating an exposure of sensitive information to unauthorized actors. It specifically affects the Desktop Windows Manager (DWM) component in Microsoft Windows 10 Version 1809 (build 10.0.17763.0). The flaw allows an attacker who already has authorized local access with low privileges (PR:L) to disclose sensitive information from the system without requiring any user interaction (UI:N). The vulnerability does not allow modification of data or disruption of system availability but compromises confidentiality (C:H). The attack vector is local (AV:L), meaning remote exploitation is not feasible without prior access. The vulnerability has a CVSS v3.1 base score of 5.5, categorized as medium severity. No known exploits have been reported in the wild, and no official patches have been linked yet, though the vulnerability is publicly disclosed and documented. The exposure likely arises from improper access control or information leakage within the DWM process, which manages graphical output and window composition on Windows. Given that DWM runs with system privileges and interacts with user sessions, sensitive graphical or system information could be leaked to unauthorized local users. This vulnerability is particularly relevant in multi-user environments or where attackers can gain low-level access through other means. The lack of user interaction requirement increases the risk of automated local attacks. Organizations running Windows 10 Version 1809 should monitor for suspicious local activity and prepare to deploy patches once available.

Potential Impact

For European organizations, the primary impact of CVE-2026-20805 is the potential unauthorized disclosure of sensitive information on affected Windows 10 Version 1809 systems. This could include exposure of graphical session data or other sensitive information managed by the Desktop Windows Manager. Confidentiality breaches could lead to leakage of intellectual property, personal data, or credentials, which may facilitate further attacks such as privilege escalation or lateral movement. The vulnerability does not affect system integrity or availability, so direct disruption or data manipulation is unlikely. However, in sectors such as finance, healthcare, government, and critical infrastructure, even limited information disclosure can have significant regulatory and operational consequences. The requirement for local access limits the threat to environments where attackers can gain physical or remote desktop access with low privileges, such as shared workstations, virtual desktop infrastructure (VDI), or compromised user accounts. Organizations with legacy systems still running Windows 10 Version 1809 are at higher risk, especially if they have not applied recent security updates or have weak local access controls. The absence of known exploits reduces immediate risk but does not eliminate the threat, as attackers may develop exploits once the vulnerability details are widely known.

Mitigation Recommendations

1. Restrict local access to Windows 10 Version 1809 systems, especially in shared or multi-user environments, to trusted personnel only. 2. Implement strict user privilege management to minimize the number of users with local access and ensure principle of least privilege is enforced. 3. Monitor local system logs and user activity for unusual access patterns or attempts to access Desktop Windows Manager components. 4. Use endpoint detection and response (EDR) tools to detect potential exploitation attempts or anomalous behavior related to DWM processes. 5. Prepare to deploy official patches or security updates from Microsoft as soon as they become available; track Microsoft security advisories closely. 6. Consider upgrading affected systems to a more recent and supported Windows version where this vulnerability is not present or has been fixed. 7. In virtualized or remote desktop environments, enforce strong session isolation and access controls to prevent unauthorized local access. 8. Educate users about the risks of local privilege misuse and enforce policies to prevent unauthorized physical or remote access to workstations.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
microsoft
Date Reserved
2025-12-03T05:54:20.371Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69668adaa60475309f9adf3a

Added to database: 1/13/2026, 6:11:38 PM

Last enriched: 2/5/2026, 8:35:36 AM

Last updated: 2/6/2026, 4:51:47 PM

Views: 433

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats