PT-2026-2658 · Microsoft · Windows
Published
2026-01-13
·
Updated
2026-01-23
·
CVE-2026-20805
CVSS v3.1
5.5
5.5
Medium
| Base vector | Vector | AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N |
Name of the Vulnerable Software and Affected Versions
Microsoft Windows versions prior to February 2026
Description
A vulnerability exists in the Desktop Windows Manager component of Windows that allows an attacker to disclose sensitive information locally. This vulnerability, actively exploited in the wild, can leak memory addresses, potentially bypassing Address Space Layout Randomization (ASLR) and strengthening exploit chains. The vulnerability has been observed in attacks and is being tracked as CVE-2026-20805. CISA has added this vulnerability to its Known Exploited Vulnerabilities (KEV) catalog, mandating federal agencies to patch by February 3, 2026. The vulnerability impacts various Windows versions, including Windows 10, Windows 11, and server editions. Exploitation of this flaw can lead to privilege escalation and potential system compromise. The vulnerability allows an attacker to access information containing the address of a remote ALPC port section, potentially revealing sensitive data such as tokens and passwords.
Recommendations
Apply the security updates released by Microsoft in January 2026 to address CVE-2026-20805.
Prioritize patching for all supported Windows versions.
Federal agencies must remediate this vulnerability by February 3, 2026, as mandated by CISA.
Monitor systems for suspicious activity and anomalous credential usage.
Exploit
Fix
LPE
RCE
Information Disclosure
Found an issue in the description? Have something to add? Feel free to write us 👾
dbugs@ptsecurity.com
Weakness Enumeration
Related Identifiers
BDU:2026-00375
CVE-2026-20805
Affected Products
Windows
References · 105
- 🔥 https://github.com/fevar54/CVE-2026-20805-POC⭐ 5 🔗 1 · Exploit
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20805 · Security Note
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20805 · Vendor Advisory
- https://bdu.fstec.ru/vul/2026-00375 · Security Note
- https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2026-20805 · Vendor Advisory
- https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-20805 · Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2026-20805 · Security Note
- https://twitter.com/TheHackersNews/status/2011372647750516842 · Twitter Post
- https://twitter.com/ThreatSynop/status/2011373981970874514 · Twitter Post
- https://twitter.com/PurpleOps_io/status/2011379126603526522 · Twitter Post
- https://twitter.com/ThreatSynop/status/2011155147397923127 · Twitter Post
- https://reddit.com/r/SecOpsDaily/comments/1qcfjum/patch_tuesday_january_2026 · Reddit Post
- https://twitter.com/ThreatSynop/status/2011346142445830421 · Twitter Post
- https://twitter.com/AnonNews_irc/status/2013376025367900239 · Twitter Post
- https://twitter.com/mrmichaeljstew/status/2011242993051910493 · Twitter Post