Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-20852: CWE-266: Incorrect Privilege Assignment in Microsoft Windows 10 Version 1809

0
High
VulnerabilityCVE-2026-20852cvecve-2026-20852cwe-266
Published: Tue Jan 13 2026 (01/13/2026, 17:56:29 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows 10 Version 1809

Description

Incorrect privilege assignment in Windows Hello allows an unauthorized attacker to perform tampering locally.

AI-Powered Analysis

AILast updated: 01/13/2026, 19:01:38 UTC

Technical Analysis

CVE-2026-20852 is a vulnerability categorized under CWE-266 (Incorrect Privilege Assignment) affecting Microsoft Windows 10 Version 1809 (build 17763.0). The flaw resides in the Windows Hello component, which is responsible for biometric authentication and user identity verification. Due to improper privilege assignment, an unauthorized local attacker can manipulate system components or data without needing prior authentication or user interaction. The vulnerability has a CVSS 3.1 base score of 7.7, indicating high severity, with attack vector being local (AV:L), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction (UI:N). The impact affects confidentiality and integrity (C:H/I:H) but not availability (A:N). This means an attacker with local access can potentially access or modify sensitive information or system settings, undermining system security and trustworthiness. Although no known exploits are reported in the wild, the vulnerability represents a significant risk for environments where Windows 10 Version 1809 is still operational, especially in enterprise or critical infrastructure contexts. The lack of available patches at the time of reporting necessitates interim mitigations to restrict local access and monitor for suspicious activity. The vulnerability was reserved in December 2025 and published in January 2026, reflecting recent discovery and disclosure.

Potential Impact

For European organizations, this vulnerability poses a significant risk where Windows 10 Version 1809 is deployed, particularly in sectors handling sensitive data such as finance, healthcare, government, and critical infrastructure. Unauthorized local tampering can lead to data breaches, unauthorized data modification, and potential disruption of security controls relying on Windows Hello for authentication. Confidentiality and integrity of sensitive information may be compromised, leading to regulatory compliance issues under GDPR and other data protection laws. The local attack vector means insider threats or attackers with physical or remote local access (e.g., via compromised terminals) can exploit this vulnerability. Organizations with legacy systems or delayed patching cycles are especially vulnerable. The absence of known exploits reduces immediate risk but does not eliminate the threat, as attackers may develop exploits over time. The impact is heightened in environments where Windows Hello is used extensively for secure authentication, as trust in biometric authentication can be undermined.

Mitigation Recommendations

Since no official patches are currently available, European organizations should implement strict local access controls to limit who can physically or remotely access Windows 10 Version 1809 systems. Employing endpoint detection and response (EDR) solutions to monitor for unusual privilege escalation or tampering activities is critical. Disabling or restricting Windows Hello usage temporarily, where feasible, can reduce attack surface. Organizations should enforce strong user account management policies, including least privilege principles and regular auditing of local accounts. Network segmentation can help isolate vulnerable systems from critical assets. Additionally, organizations should prepare for rapid deployment of patches once released by Microsoft and maintain an up-to-date asset inventory to identify affected systems. User education about the risks of local access compromise and insider threats is also recommended. Finally, consider upgrading to a supported and patched Windows version to eliminate exposure to this vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
microsoft
Date Reserved
2025-12-03T05:54:20.377Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69668ae0a60475309f9ae0f7

Added to database: 1/13/2026, 6:11:44 PM

Last enriched: 1/13/2026, 7:01:38 PM

Last updated: 1/14/2026, 5:04:03 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats