Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-20809: CWE-367: Time-of-check Time-of-use (TOCTOU) Race Condition in Microsoft Windows 10 Version 1809

0
High
VulnerabilityCVE-2026-20809cvecve-2026-20809cwe-367cwe-122
Published: Tue Jan 13 2026 (01/13/2026, 17:56:09 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows 10 Version 1809

Description

CVE-2026-20809 is a high-severity local privilege escalation vulnerability in Microsoft Windows 10 Version 1809 caused by a time-of-check to time-of-use (TOCTOU) race condition in the Windows Kernel Memory. An authorized attacker with local access can exploit this race condition to elevate privileges, potentially gaining full control over the affected system. The vulnerability does not require user interaction but does require local privileges to initiate the exploit. Although no known exploits are currently in the wild, the impact on confidentiality, integrity, and availability is high if exploited. This vulnerability affects a legacy Windows 10 version that is still in use in some environments, particularly in enterprise and industrial settings. European organizations using this version are at risk of targeted attacks aiming to escalate privileges and compromise critical systems. Mitigation involves applying patches once available, restricting local access, and monitoring for suspicious kernel-level activity. Countries with significant Windows 10 1809 usage and critical infrastructure relying on legacy systems, such as Germany, France, and the UK, are more likely to be affected. Given the high CVSS score of 7. 8 and the nature of the vulnerability, organizations should prioritize remediation to prevent potential exploitation.

AI-Powered Analysis

AILast updated: 02/05/2026, 08:36:06 UTC

Technical Analysis

CVE-2026-20809 is a vulnerability identified in Microsoft Windows 10 Version 1809 (build 10.0.17763.0) involving a time-of-check to time-of-use (TOCTOU) race condition within the Windows Kernel Memory management subsystem. This type of race condition occurs when a system checks a condition (such as access permissions) and then uses the resource based on that check, but an attacker manipulates the timing between these two operations to exploit the window of inconsistency. In this case, an authorized local attacker can exploit the race condition to elevate their privileges from a lower level to higher privileges, potentially SYSTEM level. The vulnerability requires local access and privileges to initiate but does not require user interaction, making it a potent vector for privilege escalation once initial access is obtained. The CVSS v3.1 score of 7.8 reflects the high impact on confidentiality, integrity, and availability, as successful exploitation can lead to full system compromise. No public exploits or patches are currently available, but the vulnerability is publicly disclosed and should be addressed promptly. The affected Windows 10 Version 1809 is an older release, but still widely deployed in certain enterprise and industrial environments, which increases the risk profile for organizations relying on legacy systems. The vulnerability is tracked under CWE-367 (Time-of-check Time-of-use race condition), highlighting the classic TOCTOU flaw in kernel memory operations.

Potential Impact

The impact of CVE-2026-20809 on European organizations is significant due to the potential for local attackers to escalate privileges and gain full control over affected Windows 10 Version 1809 systems. This can lead to unauthorized access to sensitive data, disruption of critical services, and the ability to deploy further malware or ransomware with elevated privileges. Organizations in sectors such as finance, healthcare, manufacturing, and government, which often use legacy Windows versions for compatibility reasons, are particularly at risk. The compromise of privileged accounts can undermine network security, facilitate lateral movement, and result in data breaches or operational downtime. Given the high confidentiality, integrity, and availability impact, exploitation could severely damage organizational reputation and incur regulatory penalties under GDPR if personal data is exposed. The lack of known exploits in the wild currently provides a window for proactive mitigation, but the risk remains high due to the ease of exploitation once local access is obtained.

Mitigation Recommendations

1. Apply security patches immediately once Microsoft releases an official update addressing CVE-2026-20809. Monitor Microsoft Security Advisories closely for patch availability. 2. Restrict local access to Windows 10 Version 1809 systems by enforcing strict access controls, limiting administrative privileges, and using multi-factor authentication for local logins. 3. Employ endpoint detection and response (EDR) solutions capable of monitoring kernel-level activities and detecting anomalous behavior indicative of TOCTOU exploitation attempts. 4. Where feasible, upgrade affected systems to a more recent, supported Windows version that includes security improvements and patches for known vulnerabilities. 5. Implement application whitelisting and privilege management to reduce the attack surface and prevent unauthorized code execution. 6. Conduct regular security audits and vulnerability assessments focusing on legacy systems to identify and remediate outdated software versions. 7. Educate IT staff and users about the risks of local privilege escalation and enforce policies to prevent unauthorized physical or remote access to critical systems.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
microsoft
Date Reserved
2025-12-03T05:54:20.372Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69668adaa60475309f9adf40

Added to database: 1/13/2026, 6:11:38 PM

Last enriched: 2/5/2026, 8:36:06 AM

Last updated: 2/6/2026, 8:14:13 PM

Views: 18

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats