Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-20875: CWE-476: NULL Pointer Dereference in Microsoft Windows 10 Version 1809

0
High
VulnerabilityCVE-2026-20875cvecve-2026-20875cwe-476
Published: Tue Jan 13 2026 (01/13/2026, 17:56:35 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows 10 Version 1809

Description

Null pointer dereference in Windows Local Security Authority Subsystem Service (LSASS) allows an unauthorized attacker to deny service over a network.

AI-Powered Analysis

AILast updated: 01/27/2026, 19:24:04 UTC

Technical Analysis

CVE-2026-20875 is a vulnerability classified under CWE-476 (NULL Pointer Dereference) affecting Microsoft Windows 10 Version 1809 (build 10.0.17763.0). The flaw exists in the Local Security Authority Subsystem Service (LSASS), a core Windows component responsible for enforcing security policies, handling authentication, and managing user logins. The vulnerability allows an unauthenticated attacker to send specially crafted network requests that trigger a null pointer dereference within LSASS, causing the service to crash. This results in a denial of service condition, disrupting authentication services and potentially forcing system reboots or service outages. The CVSS v3.1 base score is 7.5 (high), reflecting the remote attack vector (network), low attack complexity, no privileges or user interaction required, and impact limited to availability (no confidentiality or integrity loss). The vulnerability was reserved in December 2025 and published in January 2026, with no known exploits in the wild or patches released yet. LSASS is critical for Windows security, so its failure can severely impact system stability and availability. This vulnerability is particularly concerning for systems exposed to untrusted networks or internet-facing services that rely on Windows authentication mechanisms.

Potential Impact

For European organizations, this vulnerability poses a significant risk to availability of Windows 10 Version 1809 systems, especially those acting as domain controllers, authentication servers, or providing critical network services dependent on LSASS. Denial of service attacks could disrupt business operations, prevent user logins, and cause downtime in enterprise environments. Sectors such as finance, healthcare, government, and critical infrastructure that rely heavily on Windows authentication services may experience operational disruptions. The lack of confidentiality or integrity impact reduces risks of data breaches but does not mitigate the operational impact of service outages. Organizations with legacy systems still running Windows 10 Version 1809 are particularly vulnerable, as this version is older and may not be widely patched. The absence of known exploits provides a window for proactive mitigation, but the ease of exploitation and no requirement for authentication increase the urgency to address exposure.

Mitigation Recommendations

Until an official patch is released, European organizations should implement specific mitigations to reduce exposure: 1) Restrict network access to LSASS-related services by implementing strict firewall rules and network segmentation to limit incoming traffic to trusted sources only. 2) Disable or restrict unnecessary remote authentication protocols and services that interact with LSASS, such as Remote Desktop or legacy authentication methods, if not required. 3) Monitor network traffic for unusual or malformed packets targeting authentication services to detect potential exploitation attempts. 4) Employ intrusion detection/prevention systems (IDS/IPS) with updated signatures to identify attempts to exploit null pointer dereference vulnerabilities. 5) Plan and prioritize upgrading or patching affected Windows 10 Version 1809 systems as soon as a patch becomes available or consider migrating to a supported Windows version with active security updates. 6) Maintain regular backups and incident response plans to quickly recover from potential denial of service incidents. These targeted actions go beyond generic advice by focusing on network-level controls and legacy system management specific to this vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
microsoft
Date Reserved
2025-12-03T05:54:20.387Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69668ae1a60475309f9ae172

Added to database: 1/13/2026, 6:11:45 PM

Last enriched: 1/27/2026, 7:24:04 PM

Last updated: 2/3/2026, 5:45:57 PM

Views: 50

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats