Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-20846: CWE-126: Buffer Over-read in Microsoft Windows 10 Version 1607

0
High
VulnerabilityCVE-2026-20846cvecve-2026-20846cwe-126
Published: Tue Feb 10 2026 (02/10/2026, 17:51:49 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows 10 Version 1607

Description

Buffer over-read in Windows GDI+ allows an unauthorized attacker to deny service over a network.

AI-Powered Analysis

AILast updated: 02/18/2026, 08:29:33 UTC

Technical Analysis

CVE-2026-20846 is a buffer over-read vulnerability classified under CWE-126, found in the Windows Graphics Device Interface Plus (GDI+) component of Microsoft Windows 10 Version 1607 (build 10.0.14393.0). The vulnerability occurs due to improper bounds checking when processing certain graphical data, allowing an attacker to read beyond the intended buffer limits. This can lead to memory corruption that causes the targeted system or service to crash, resulting in a denial of service (DoS) condition. The vulnerability is exploitable remotely over a network without requiring any privileges or user interaction, making it particularly dangerous for exposed systems. The CVSS v3.1 base score is 7.5, reflecting high severity primarily due to the impact on availability and the ease of exploitation. While no exploits are currently known in the wild, the vulnerability's characteristics suggest that attackers could develop reliable DoS attacks targeting vulnerable Windows 10 Version 1607 systems. The affected version is an older Windows 10 release, which may still be in use in some enterprise environments due to legacy application dependencies or delayed upgrade cycles. The lack of available patches at the time of publication increases the urgency for organizations to implement interim mitigations and plan for upgrades. The vulnerability does not compromise confidentiality or integrity but can disrupt services and operations by causing system crashes or application failures related to GDI+ processing.

Potential Impact

The primary impact of CVE-2026-20846 is on system availability, as successful exploitation results in denial of service conditions. For European organizations, this can translate into downtime of critical services, disruption of business operations, and potential cascading effects in environments relying on Windows 10 Version 1607 systems. Sectors such as finance, healthcare, manufacturing, and government agencies that maintain legacy Windows 10 deployments are particularly vulnerable. The network-based attack vector means that exposed systems accessible via the internet or internal networks could be targeted remotely, increasing the risk of widespread disruption. Although the vulnerability does not affect confidentiality or integrity, the loss of availability can lead to operational delays, financial losses, and reputational damage. Additionally, organizations with strict regulatory requirements for uptime and service continuity may face compliance challenges if affected by this DoS vulnerability. The absence of known exploits in the wild currently reduces immediate risk but does not eliminate the threat, as attackers may develop exploits rapidly once the vulnerability details are public.

Mitigation Recommendations

1. Prioritize upgrading affected systems from Windows 10 Version 1607 to a supported and patched Windows version to eliminate the vulnerability. 2. If immediate upgrades are not feasible, implement network-level protections such as firewalls or intrusion prevention systems to block or monitor suspicious traffic targeting GDI+ services. 3. Restrict exposure of vulnerable systems to untrusted networks, especially the internet, by segmenting networks and applying strict access controls. 4. Monitor system logs and crash reports for signs of exploitation attempts or abnormal GDI+ related failures. 5. Employ application whitelisting and endpoint protection solutions that can detect anomalous behavior related to memory corruption or DoS attempts. 6. Engage with Microsoft support channels to obtain any available patches or workarounds as they are released. 7. Educate IT and security teams about the vulnerability specifics to ensure rapid response to any incidents. 8. Conduct regular vulnerability assessments and penetration testing focusing on legacy systems to identify and remediate similar risks proactively.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
microsoft
Date Reserved
2025-12-03T05:54:20.377Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 698b75fd4b57a58fa1209f9d

Added to database: 2/10/2026, 6:16:29 PM

Last enriched: 2/18/2026, 8:29:33 AM

Last updated: 2/21/2026, 12:19:32 AM

Views: 52

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats