Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-20851: CWE-125: Out-of-bounds Read in Microsoft Windows 11 Version 24H2

0
Medium
VulnerabilityCVE-2026-20851cvecve-2026-20851cwe-125
Published: Tue Jan 13 2026 (01/13/2026, 17:56:29 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows 11 Version 24H2

Description

Out-of-bounds read in Capability Access Management Service (camsvc) allows an unauthorized attacker to disclose information locally.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/22/2026, 21:32:41 UTC

Technical Analysis

CVE-2026-20851 is a security vulnerability classified as CWE-125 (Out-of-bounds Read) affecting Microsoft Windows 11 Version 24H2, specifically build 10.0.26100.0. The flaw resides in the Capability Access Management Service (camsvc), a component responsible for managing access capabilities on the system. An out-of-bounds read occurs when the service reads memory outside the allocated buffer limits, which can lead to disclosure of sensitive information stored in adjacent memory areas. The vulnerability can be exploited by an unauthorized attacker with local access, without requiring any privileges or user interaction, making it a low-barrier attack vector in terms of access requirements. However, the scope is limited to local system access, and the vulnerability does not allow modification of data or disruption of service, only information disclosure. The CVSS v3.1 score of 6.2 reflects a medium severity, driven by high confidentiality impact but no impact on integrity or availability. No public exploits or patches have been reported as of the publication date (January 13, 2026). This vulnerability highlights the importance of secure memory handling in system services that manage access controls.

Potential Impact

The primary impact of CVE-2026-20851 is unauthorized local disclosure of sensitive information due to out-of-bounds memory reads. This can lead to leakage of potentially sensitive data such as credentials, tokens, or other protected information residing in memory near the accessed buffer. While the vulnerability does not allow privilege escalation or system disruption, information disclosure can aid attackers in further attacks or lateral movement within an organization. The requirement for local access limits the attack surface to insiders, compromised accounts, or attackers with physical or remote desktop access. Organizations with Windows 11 Version 24H2 deployed on endpoints, especially in environments with multiple users or shared access, face increased risk. The absence of known exploits reduces immediate threat but does not eliminate risk, as attackers may develop exploits in the future. Confidentiality breaches can have regulatory and reputational consequences depending on the data exposed.

Mitigation Recommendations

To mitigate CVE-2026-20851, organizations should implement strict local access controls, ensuring only trusted users have physical or remote access to Windows 11 24H2 systems. Employing endpoint protection solutions that monitor unusual local activity can help detect exploitation attempts. Until a patch is released, consider isolating sensitive systems or restricting access via group policies or network segmentation to reduce exposure. Regularly audit user accounts and permissions to minimize the number of users with local access. Enable and monitor Windows security event logs for suspicious behavior related to camsvc or memory access anomalies. Once Microsoft releases a security update addressing this vulnerability, prioritize prompt deployment of the patch. Additionally, educating users about the risks of unauthorized local access and enforcing strong authentication mechanisms can further reduce exploitation likelihood.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
microsoft
Date Reserved
2025-12-03T05:54:20.377Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69668ae0a60475309f9ae0f4

Added to database: 1/13/2026, 6:11:44 PM

Last enriched: 2/22/2026, 9:32:41 PM

Last updated: 3/25/2026, 10:40:28 AM

Views: 88

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses