CVE-2026-20805 is a medium-severity info disclosure flaw in Windows Desktop Windows Manager actively exploited in the wild. Patch immediately.
| Product | Version Start | Version End (excl.) | Status |
|---|---|---|---|
| windows_10_1607 | * | 10.0.14393.8783 | vulnerable |
| windows_10_1607 | * | 10.0.14393.8783 | vulnerable |
| windows_10_1809 | * | 10.0.17763.8276 | vulnerable |
| windows_10_1809 | * | 10.0.17763.8276 | vulnerable |
| windows_10_21h2 | * | 10.0.19044.6809 | vulnerable |
| windows_10_22h2 | * | 10.0.19045.6809 | vulnerable |
| windows_11_23h2 | * | 10.0.22631.6491 | vulnerable |
| windows_11_24h2 | * | 10.0.26100.7623 | vulnerable |
| windows_11_25h2 | * | 10.0.26200.7623 | vulnerable |
| windows_server_2012 | - | - | vulnerable |
| windows_server_2012 | r2 | r2 | vulnerable |
| windows_server_2016 | * | 10.0.14393.8783 | vulnerable |
| windows_server_2019 | * | 10.0.17763.8276 | vulnerable |
| windows_server_2022 | * | 10.0.20348.4648 | vulnerable |
| windows_server_2022_23h2 | * | 10.0.25398.2092 | vulnerable |
| windows_server_2025 | * | 10.0.26100.7623 | vulnerable |
Install the latest security updates provided by Microsoft specifically addressing the Desktop Windows Manager (DWM) information disclosure flaw via Windows Update or WSUS.
Ensure Windows 10 (versions prior to 10.0.19045.6809), Windows 11 (prior to 10.0.26100.7623), and Windows Server 2025 are updated to the latest build numbers to mitigate risk.
Enforce the principle of least privilege (PoLP) to limit local user access, as this vulnerability requires an authorized local attacker to execute the exploit code on the target system.
Track unusual process behavior associated with dwm.exe and audit local security logs for unauthorized attempts to access sensitive memory regions or system information.
Detection should focus on identifying unusual behavior within the Desktop Windows Manager process (dwm.exe). Monitor for unauthorized local users attempting to read sensitive memory or system data. Security teams should leverage Endpoint Detection and Response (EDR) tools to flag suspicious API calls or memory access patterns. Review Windows Event Logs for unexpected process crashes or restarts of the DWM service, which may indicate exploitation attempts or failed exploit payloads.
Experience superior visibility and a simpler approach to cyber risk management