Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-20805: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in Microsoft Windows 10 Version 1809

0
Medium
VulnerabilityCVE-2026-20805cvecve-2026-20805cwe-200
Published: Tue Jan 13 2026 (01/13/2026, 17:56:08 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows 10 Version 1809

Description

Exposure of sensitive information to an unauthorized actor in Desktop Windows Manager allows an authorized attacker to disclose information locally.

AI-Powered Analysis

AILast updated: 01/13/2026, 19:32:06 UTC

Technical Analysis

CVE-2026-20805 is a vulnerability identified in the Desktop Windows Manager (DWM) component of Microsoft Windows 10 Version 1809 (build 10.0.17763.0). The issue is classified under CWE-200, indicating exposure of sensitive information to unauthorized actors. Specifically, the vulnerability allows an attacker who already has authorized local access with low privileges to disclose sensitive information from the system without requiring any user interaction. The CVSS v3.1 base score is 5.5, reflecting a medium severity level, with the vector indicating local attack vector (AV:L), low attack complexity (AC:L), requiring privileges (PR:L), no user interaction (UI:N), unchanged scope (S:U), and high impact on confidentiality (C:H) but no impact on integrity (I:N) or availability (A:N). The vulnerability does not have any known exploits in the wild at this time. The lack of patch links suggests that either a patch is pending or that mitigation requires upgrading to a newer Windows version. The vulnerability's impact is limited to confidentiality breaches, where sensitive data managed or displayed by the Desktop Windows Manager could be exposed to unauthorized local users. Since exploitation requires local access and privileges, remote exploitation is not feasible, reducing the attack surface. However, in environments where multiple users share systems or where attackers can gain local footholds, this vulnerability could lead to unauthorized data disclosure. The Desktop Windows Manager is responsible for rendering graphical user interfaces and managing visual effects, so the sensitive information exposure could relate to graphical session data or memory contents accessible through DWM processes.

Potential Impact

For European organizations, the primary impact of CVE-2026-20805 is the potential unauthorized disclosure of sensitive information on systems running Windows 10 Version 1809. This could include corporate data, user credentials, or other confidential information accessible through the Desktop Windows Manager. Organizations in sectors with strict data protection requirements, such as finance, healthcare, and government, could face compliance risks under GDPR if sensitive personal or business data is exposed. The requirement for local access and privileges limits the risk to insider threats or attackers who have already compromised user accounts or physical access. Legacy systems still running Windows 10 1809, especially in industrial control systems or critical infrastructure, may be vulnerable to data leakage that could aid further attacks. Although the vulnerability does not affect system integrity or availability, the confidentiality breach could facilitate espionage, intellectual property theft, or lateral movement within networks. The absence of known exploits reduces immediate risk but does not eliminate the need for remediation, as attackers could develop exploits over time.

Mitigation Recommendations

To mitigate CVE-2026-20805, European organizations should prioritize upgrading affected systems from Windows 10 Version 1809 to a supported and patched version of Windows 10 or Windows 11. If upgrading is not immediately feasible, organizations should implement strict access controls to limit local user privileges and prevent unauthorized local access. Employing endpoint detection and response (EDR) solutions can help monitor for suspicious local activity indicative of exploitation attempts. Network segmentation and the use of virtual desktop infrastructure (VDI) can reduce the risk of local privilege escalation and data exposure. Additionally, organizations should audit and harden user account permissions, disable unnecessary local accounts, and enforce strong physical security controls to prevent unauthorized physical access. Regularly reviewing and applying Microsoft security advisories and updates is critical once patches become available. Finally, educating users about the risks of local privilege misuse and maintaining robust incident response plans will help contain potential breaches stemming from this vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
microsoft
Date Reserved
2025-12-03T05:54:20.371Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69668adaa60475309f9adf3a

Added to database: 1/13/2026, 6:11:38 PM

Last enriched: 1/13/2026, 7:32:06 PM

Last updated: 1/14/2026, 5:30:52 AM

Views: 10

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats