Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-20922: CWE-122: Heap-based Buffer Overflow in Microsoft Windows 10 Version 1607

0
High
VulnerabilityCVE-2026-20922cvecve-2026-20922cwe-122
Published: Tue Jan 13 2026 (01/13/2026, 17:56:40 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows 10 Version 1607

Description

Heap-based buffer overflow in Windows NTFS allows an authorized attacker to execute code locally.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/02/2026, 00:46:18 UTC

Technical Analysis

CVE-2026-20922 is a heap-based buffer overflow vulnerability identified in the NTFS file system driver of Microsoft Windows 10 Version 1607 (build 10.0.14393.0). The flaw arises from improper handling of heap memory during NTFS operations, which can lead to memory corruption. An attacker with authorized local access and limited privileges can exploit this vulnerability to execute arbitrary code with elevated privileges, potentially gaining full control over the affected system. The vulnerability does not require user interaction, increasing its risk in environments where local access is possible. The CVSS v3.1 base score is 7.8, reflecting high impact on confidentiality, integrity, and availability, with low attack complexity and requiring only limited privileges. No public exploits or proof-of-concept code have been reported yet, but the vulnerability is publicly disclosed and considered critical for legacy Windows 10 systems. The lack of available patches at the time of disclosure necessitates immediate attention to access controls and monitoring. This vulnerability is categorized under CWE-122, indicating a classic heap-based buffer overflow, a common and dangerous class of memory corruption bugs that can lead to arbitrary code execution and system compromise.

Potential Impact

The impact of CVE-2026-20922 is significant for organizations running Windows 10 Version 1607, especially those with legacy systems that have not been updated to newer Windows releases. Successful exploitation allows an attacker with local access and limited privileges to escalate their rights and execute arbitrary code, potentially leading to full system compromise. This can result in unauthorized data access, data modification, disruption of services, and deployment of persistent malware or ransomware. The vulnerability affects confidentiality, integrity, and availability simultaneously, making it a critical risk in environments where local user accounts are shared, or where insider threats exist. Although no public exploits are known, the ease of exploitation due to low complexity and no user interaction requirement increases the threat level. Organizations with sensitive data or critical infrastructure running this Windows version are at heightened risk of targeted attacks or insider misuse.

Mitigation Recommendations

To mitigate CVE-2026-20922, organizations should prioritize the following actions: 1) Apply official security patches from Microsoft immediately once they become available for Windows 10 Version 1607. 2) If patching is not immediately possible, restrict local access to trusted users only, minimizing the number of accounts with local login rights. 3) Implement strict privilege management policies to limit the ability of low-privileged users to perform NTFS operations that could trigger the vulnerability. 4) Employ endpoint detection and response (EDR) solutions to monitor for suspicious local activity indicative of exploitation attempts. 5) Conduct regular audits of local user accounts and remove or disable unnecessary accounts. 6) Consider upgrading legacy systems to supported Windows versions with ongoing security updates to reduce exposure. 7) Use application whitelisting and exploit mitigation technologies such as Data Execution Prevention (DEP) and Address Space Layout Randomization (ASLR) to hinder exploitation. 8) Educate IT staff about the vulnerability and ensure incident response plans include procedures for local privilege escalation incidents.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
microsoft
Date Reserved
2025-12-04T20:04:16.335Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69668ae3a60475309f9ae1c6

Added to database: 1/13/2026, 6:11:47 PM

Last enriched: 3/2/2026, 12:46:18 AM

Last updated: 3/26/2026, 4:00:40 AM

Views: 80

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses