Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-20929: CWE-284: Improper Access Control in Microsoft Windows 10 Version 1809

0
High
VulnerabilityCVE-2026-20929cvecve-2026-20929cwe-284
Published: Tue Jan 13 2026 (01/13/2026, 17:57:02 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows 10 Version 1809

Description

Improper access control in Windows HTTP.sys allows an authorized attacker to elevate privileges over a network.

AI-Powered Analysis

AILast updated: 02/04/2026, 08:57:21 UTC

Technical Analysis

CVE-2026-20929 is a vulnerability classified under CWE-284 (Improper Access Control) affecting the HTTP.sys component in Microsoft Windows 10 Version 1809 (build 10.0.17763.0). HTTP.sys is a kernel-mode device driver that handles HTTP requests for Windows services. The flaw arises from improper access control mechanisms within HTTP.sys, allowing an attacker who is authorized on the network but with low privileges to escalate their privileges remotely. The attacker does not require user interaction to exploit this vulnerability, increasing its risk profile. The CVSS v3.1 base score is 7.5, indicating high severity, with the vector string AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H, meaning the attack is network-based, requires high attack complexity, low privileges, no user interaction, and impacts confidentiality, integrity, and availability. No public exploits or patches are currently available, but the vulnerability is published and recognized by Microsoft. This vulnerability could allow attackers to gain SYSTEM-level privileges, potentially leading to full system compromise, data theft, or disruption of services. Since Windows 10 Version 1809 is still in use in many enterprise environments, especially where legacy systems persist, this vulnerability represents a significant threat vector.

Potential Impact

For European organizations, the impact of CVE-2026-20929 can be substantial. Successful exploitation could lead to unauthorized privilege escalation, enabling attackers to execute arbitrary code with SYSTEM privileges, access sensitive data, disrupt critical services, or deploy ransomware. Organizations relying on Windows 10 Version 1809, particularly in sectors such as finance, healthcare, government, and critical infrastructure, face increased risk. The network-based attack vector means that attackers can exploit the vulnerability remotely, potentially bypassing perimeter defenses if HTTP.sys services are exposed or accessible internally. This could lead to lateral movement within corporate networks, increasing the scope of compromise. The lack of user interaction requirement further elevates the risk, as automated attacks or worm-like propagation could be possible if combined with other vulnerabilities. The absence of known exploits in the wild currently provides a window for proactive mitigation, but the high severity score underscores the urgency for remediation.

Mitigation Recommendations

1. Apply official security patches from Microsoft as soon as they become available for Windows 10 Version 1809 systems. 2. Restrict network access to HTTP.sys services by implementing strict firewall rules, limiting exposure to trusted networks only. 3. Employ network segmentation to isolate vulnerable systems and reduce the attack surface. 4. Monitor network traffic for unusual HTTP.sys activity or privilege escalation attempts using advanced intrusion detection systems. 5. Conduct regular vulnerability assessments and penetration testing focused on legacy Windows environments. 6. Consider upgrading affected systems to supported Windows versions with ongoing security updates to reduce exposure to legacy vulnerabilities. 7. Implement strict access controls and least privilege principles to minimize the impact of potential privilege escalations. 8. Maintain comprehensive logging and alerting to detect exploitation attempts promptly.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
microsoft
Date Reserved
2025-12-04T20:04:16.336Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69668ae3a60475309f9ae1d8

Added to database: 1/13/2026, 6:11:47 PM

Last enriched: 2/4/2026, 8:57:21 AM

Last updated: 2/7/2026, 12:33:01 AM

Views: 14

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats