Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-20843: CWE-284: Improper Access Control in Microsoft Windows 10 Version 1809

0
High
VulnerabilityCVE-2026-20843cvecve-2026-20843cwe-284
Published: Tue Jan 13 2026 (01/13/2026, 17:56:52 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows 10 Version 1809

Description

Improper access control in Windows Routing and Remote Access Service (RRAS) allows an authorized attacker to elevate privileges locally.

AI-Powered Analysis

AILast updated: 01/13/2026, 19:14:29 UTC

Technical Analysis

CVE-2026-20843 is a vulnerability classified under CWE-284 (Improper Access Control) found in the Windows Routing and Remote Access Service (RRAS) component of Microsoft Windows 10 Version 1809 (build 10.0.17763.0). The flaw allows an attacker who already has some level of local privileges to escalate their privileges further, potentially to SYSTEM level, without requiring user interaction. The vulnerability stems from insufficient access control checks within RRAS, which is responsible for routing and remote access capabilities on Windows systems. Exploitation requires local access and some privileges, but no user interaction is needed, making it a potent vector for privilege escalation attacks. The CVSS v3.1 score of 7.8 reflects high impact on confidentiality, integrity, and availability, with low attack complexity and low privileges required. While no public exploits are known yet, the vulnerability's nature suggests it could be leveraged by attackers to gain full control over affected systems, enabling lateral movement, data exfiltration, or disruption of services. The vulnerability was reserved in December 2025 and published in January 2026, but no official patches have been linked at this time.

Potential Impact

For European organizations, this vulnerability poses a significant risk, especially to enterprises and critical infrastructure entities that rely on Windows 10 Version 1809 with RRAS enabled. Successful exploitation can lead to full system compromise, allowing attackers to access sensitive data, disrupt services, or move laterally within networks. This is particularly concerning for sectors such as finance, healthcare, government, and telecommunications, where confidentiality and availability are paramount. The requirement for local access limits remote exploitation but insider threats or compromised endpoints could be leveraged to exploit this vulnerability. The lack of known exploits currently provides a window for proactive mitigation, but the high severity score indicates that once exploited, the consequences could be severe, including data breaches and operational disruptions.

Mitigation Recommendations

1. Restrict local access to systems running Windows 10 Version 1809, especially those with RRAS enabled, to trusted personnel only. 2. Disable the Routing and Remote Access Service on systems where it is not required to reduce the attack surface. 3. Implement strict endpoint security controls and monitoring to detect unusual privilege escalation attempts or suspicious RRAS activity. 4. Apply least privilege principles to user accounts to minimize the privileges available to potential attackers. 5. Prepare to deploy patches promptly once Microsoft releases them for this vulnerability. 6. Conduct regular audits of RRAS configurations and access controls to ensure they adhere to security best practices. 7. Use application whitelisting and behavior-based detection tools to identify exploitation attempts. 8. Educate IT staff about the vulnerability and encourage vigilance for signs of compromise related to privilege escalation.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
microsoft
Date Reserved
2025-12-03T05:54:20.376Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69668adea60475309f9ae0a0

Added to database: 1/13/2026, 6:11:42 PM

Last enriched: 1/13/2026, 7:14:29 PM

Last updated: 1/14/2026, 5:36:39 AM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats