Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-20847: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in Microsoft Windows 10 Version 1809

0
Medium
VulnerabilityCVE-2026-20847cvecve-2026-20847cwe-200
Published: Tue Jan 13 2026 (01/13/2026, 17:56:28 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows 10 Version 1809

Description

Exposure of sensitive information to an unauthorized actor in Windows Shell allows an authorized attacker to perform spoofing over a network.

AI-Powered Analysis

AILast updated: 01/13/2026, 19:14:04 UTC

Technical Analysis

CVE-2026-20847 is a vulnerability classified under CWE-200 (Exposure of Sensitive Information) affecting Microsoft Windows 10 Version 1809 (build 17763.0). The issue resides in the Windows Shell component, where an authorized attacker can exploit the flaw over a network to perform spoofing attacks by exposing sensitive information. The vulnerability does not require user interaction but does require the attacker to have some level of privileges on the system (PR:L). The attack complexity is low (AC:L), meaning it is relatively straightforward to exploit once access is obtained. The vulnerability impacts confidentiality (C:H) but does not affect integrity or availability. The scope is unchanged (S:U), indicating the vulnerability affects only the vulnerable component and does not propagate to other components. The CVSS vector also indicates the exploitability is network-based (AV:N) and the exploit code maturity is official (RL:O) with confirmed remediation (RC:C), although no patch links are currently provided. There are no known exploits in the wild at this time. The vulnerability allows an attacker to gather sensitive information that could facilitate further attacks, such as spoofing network communications or impersonating trusted entities, potentially leading to targeted phishing or man-in-the-middle attacks. Since Windows 10 Version 1809 is an older release, many organizations may have moved to newer versions, but legacy systems remain vulnerable.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to confidentiality, as sensitive information exposure can lead to further exploitation such as network spoofing and impersonation attacks. Organizations relying on Windows 10 Version 1809, especially in sectors like finance, healthcare, and critical infrastructure, could see increased risk of targeted attacks leveraging this flaw. The lack of impact on integrity and availability reduces the risk of direct system compromise or denial of service, but the exposure of sensitive data can facilitate lateral movement or social engineering attacks. Given the network-based attack vector and low complexity, attackers with limited privileges could exploit this vulnerability remotely if they gain initial access. This is particularly concerning for organizations with legacy systems that have not been updated or segmented properly. The absence of known exploits in the wild provides a window for proactive mitigation, but complacency could lead to exploitation once exploit code becomes available.

Mitigation Recommendations

1. Upgrade all Windows 10 Version 1809 systems to a supported and patched version of Windows 10 or later to eliminate the vulnerability. 2. Implement strict network segmentation and access controls to limit exposure of vulnerable systems to untrusted networks. 3. Monitor network traffic for unusual spoofing or man-in-the-middle patterns that could indicate exploitation attempts. 4. Enforce the principle of least privilege to reduce the ability of attackers to gain the required privileges for exploitation. 5. Use endpoint detection and response (EDR) tools to detect suspicious activities related to Windows Shell or network spoofing attempts. 6. Educate IT staff about this vulnerability and ensure timely application of security updates once patches are released. 7. Consider deploying network-level protections such as intrusion detection/prevention systems (IDS/IPS) configured to detect spoofing behaviors. 8. Maintain an inventory of legacy systems and prioritize their upgrade or isolation from critical network segments.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
microsoft
Date Reserved
2025-12-03T05:54:20.377Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69668adea60475309f9ae0a6

Added to database: 1/13/2026, 6:11:42 PM

Last enriched: 1/13/2026, 7:14:04 PM

Last updated: 1/14/2026, 6:15:21 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats