Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-20823: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in Microsoft Windows 10 Version 1809

0
Medium
VulnerabilityCVE-2026-20823cvecve-2026-20823cwe-200
Published: Tue Jan 13 2026 (01/13/2026, 17:56:17 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows 10 Version 1809

Description

CVE-2026-20823 is a medium-severity vulnerability in Microsoft Windows 10 Version 1809 that allows an authorized local attacker to expose sensitive information via Windows File Explorer. The flaw involves improper handling of sensitive data, leading to unauthorized disclosure without requiring user interaction. Exploitation requires low privileges and local access but does not impact system integrity or availability. No known public exploits exist yet, and no patches have been released. The vulnerability affects a widely used Windows version, which remains in use in some European organizations. Attackers could leverage this to gain insight into confidential information stored or accessed through File Explorer. Mitigation involves restricting local access, monitoring for suspicious activity, and upgrading to supported Windows versions. Countries with significant enterprise Windows 10 1809 deployments and critical infrastructure are most at risk. Overall, the vulnerability poses a moderate risk primarily to confidentiality in environments where legacy Windows 10 systems persist.

AI-Powered Analysis

AILast updated: 02/05/2026, 08:39:24 UTC

Technical Analysis

CVE-2026-20823 is a vulnerability classified under CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor) affecting Microsoft Windows 10 Version 1809 (build 10.0.17763.0). The issue arises from Windows File Explorer improperly exposing sensitive information to an attacker who already has local access and low-level privileges on the system. The vulnerability does not require user interaction and can be exploited with low complexity, but it does not allow modification or disruption of system operations, limiting its impact to confidentiality breaches only. The CVSS v3.1 base score of 5.5 reflects this medium severity, with attack vector local (AV:L), low attack complexity (AC:L), and privileges required (PR:L). The scope remains unchanged (S:U), and the impact is high on confidentiality (C:H), none on integrity (I:N) and availability (A:N). No public exploits or patches are currently known or available, indicating the vulnerability is newly disclosed and not yet weaponized in the wild. The vulnerability likely involves improper access control or information leakage in File Explorer components, potentially exposing file metadata, directory structures, or cached content that should remain protected. Since Windows 10 Version 1809 is an older release, many organizations may have migrated to newer versions, but some legacy systems remain in operation, especially in industrial, governmental, or specialized environments. The vulnerability requires local access, so attackers must have some foothold or physical access to the machine, limiting remote exploitation. However, once exploited, attackers can gather sensitive information that could facilitate further attacks or data exfiltration.

Potential Impact

For European organizations, the primary impact of CVE-2026-20823 is the unauthorized disclosure of sensitive information on affected Windows 10 Version 1809 systems. This can lead to breaches of confidentiality, potentially exposing personal data, intellectual property, or internal operational details. Sectors such as finance, healthcare, government, and critical infrastructure, which often retain legacy systems for compatibility reasons, are particularly vulnerable. The vulnerability could aid attackers in reconnaissance or lateral movement within networks if local access is obtained, increasing the risk of subsequent attacks. Although the vulnerability does not affect system integrity or availability, the exposure of sensitive data can have regulatory consequences under GDPR and other privacy laws, leading to fines and reputational damage. The lack of available patches means organizations must rely on compensating controls until updates are provided or systems are upgraded. The medium severity rating indicates a moderate risk that should not be ignored, especially in environments where local access controls are weak or insider threats exist.

Mitigation Recommendations

To mitigate CVE-2026-20823, European organizations should prioritize upgrading affected Windows 10 Version 1809 systems to supported and patched Windows versions, as this vulnerability is specific to an older release. Until upgrades are feasible, implement strict local access controls, including enforcing strong authentication and limiting user privileges to reduce the risk of unauthorized local access. Employ endpoint detection and response (EDR) solutions to monitor for suspicious activity related to File Explorer or unusual local access patterns. Disable or restrict features in File Explorer that are not essential, potentially reducing the attack surface. Conduct regular audits of systems to identify legacy Windows 10 1809 installations and plan their phased retirement. Educate users about the risks of local access vulnerabilities and enforce policies to prevent unauthorized physical or remote access to endpoints. Additionally, segment networks to limit lateral movement opportunities if local access is compromised. Maintain up-to-date backups and incident response plans to quickly address any data exposure incidents. Finally, monitor Microsoft security advisories for forthcoming patches and apply them promptly once released.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
microsoft
Date Reserved
2025-12-03T05:54:20.374Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69668adba60475309f9adfa3

Added to database: 1/13/2026, 6:11:39 PM

Last enriched: 2/5/2026, 8:39:24 AM

Last updated: 2/6/2026, 12:48:19 AM

Views: 17

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats