PT-2026-2658 · Microsoft · Windows
Published
2026-01-13
·
Updated
2026-03-04
·
CVE-2026-20805
CVSS v3.1
5.5
5.5
Medium
| Base vector | Vector | AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N |
Name of the Vulnerable Software and Affected Versions
Microsoft Windows versions prior to February 2026 Patch Tuesday updates
Description
A vulnerability exists in the Desktop Window Manager component of Microsoft Windows that can lead to the disclosure of sensitive information to an unauthorized actor. This vulnerability, actively exploited in the wild, allows an attacker to leak user-mode memory addresses, potentially bypassing Address Space Layout Randomization (ASLR) and strengthening exploit chains. The vulnerability has been observed in attacks and is being tracked as CVE-2026-20805. CISA has added this vulnerability to its Known Exploited Vulnerabilities (KEV) catalog, mandating federal agencies to patch by February 3, 2026. The vulnerability allows attackers to access information containing the address of a remote port, potentially leading to the disclosure of data from user-mode memory. It is estimated that a large number of systems globally are affected.
Recommendations
Apply the February 2026 Patch Tuesday updates for all supported Windows versions.
Prioritize patching for systems with local privilege access.
Monitor for suspicious activity and anomalous credential use.
Exploit
Fix
RCE
LPE
Information Disclosure
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
BDU:2026-00375
CVE-2026-20805
Affected Products
Windows
References · 132
- 🔥 https://github.com/fevar54/CVE-2026-20805-POC⭐ 5 🔗 1 · Exploit
- https://nvd.nist.gov/vuln/detail/CVE-2026-20805 · Security Note
- https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2026-20805 · Vendor Advisory
- https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-20805 · Vendor Advisory
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20805 · Vendor Advisory
- https://bdu.fstec.ru/vul/2026-00375 · Security Note
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20805 · Security Note
- https://twitter.com/grok/status/2018646849406501312 · Twitter Post
- https://twitter.com/grok/status/2018559450911535249 · Twitter Post
- https://twitter.com/ThreatSynop/status/2011289746522202605 · Twitter Post
- https://twitter.com/grok/status/2018558696712761503 · Twitter Post
- https://twitter.com/ThreatSynop/status/2011216295799185780 · Twitter Post
- https://twitter.com/AnonNews_irc/status/2013674969327194442 · Twitter Post
- https://twitter.com/TTheBattlefield/status/2012039137793126656 · Twitter Post
- https://twitter.com/ThreatSynop/status/2011418897254072769 · Twitter Post