Microsoft patched CVE-2026-20805, a Desktop Window Manager information disclosure flaw actively exploited to defeat memory protections. CISA added it to the KEV catalog, requiring federal agencies to patch by February 3, 2026.

Microsoft's January 2026 Patch Tuesday included a fix for a vulnerability that threat actors were already exploiting in the wild—a rare information disclosure flaw in the Desktop Window Manager (DWM) that allows attackers to bypass Address Space Layout Randomization (ASLR), one of Windows' core memory protection mechanisms. Despite a deceptively moderate CVSS score of 5.5, CVE-2026-20805 has earned a spot on CISA's Known Exploited Vulnerabilities (KEV) catalog, signaling that it's a critical piece of active attack chains targeting Windows systems from Server 2012 through the latest Windows 11 25H2 and Server 2025 releases.
The vulnerability's technical specificity—leaking a "section address from a remote Advanced Local Procedure Call (ALPC) port"—reveals a sophisticated understanding of Windows internals by the attackers. While the flaw itself doesn't directly compromise systems, it serves as a foundational building block for more damaging exploits, effectively neutering the randomized memory layouts that would otherwise block reliable code execution attacks.
On January 13, 2026, Microsoft disclosed CVE-2026-20805 as part of its monthly security update cycle, marking it with the ominous "Exploitation Detected" flag—a designation reserved for vulnerabilities that Microsoft's Threat Intelligence Center has confirmed are being actively used in real-world attacks. Within hours, the Cybersecurity and Infrastructure Security Agency (CISA) added the CVE to its Known Exploited Vulnerabilities catalog, mandating that all Federal Civilian Executive Branch agencies remediate the flaw by February 3, 2026, under the authority of Binding Operational Directive 22-01.
The vulnerability resides in the Desktop Window Manager (DWM), the Windows component responsible for rendering the graphical user interface, including window animations, transparency effects, and desktop composition. DWM operates with elevated privileges and communicates with user-mode applications through Advanced Local Procedure Call (ALPC) ports—a high-performance inter-process communication mechanism deeply embedded in the Windows kernel architecture.
According to Microsoft's advisory, an authenticated attacker with low privileges can trigger the flaw by running a specially crafted application that interacts with DWM. The vulnerability causes DWM to inadvertently disclose the memory address of a section object associated with a remote ALPC port. This seemingly small information leak has enormous implications: it provides attackers with a precise map of where critical code and data structures reside in memory, defeating ASLR protections that randomize these locations to make exploitation unpredictable.
To understand why this vulnerability matters, you need to understand what ASLR does and why attackers need to defeat it. Address Space Layout Randomization is a security technique that randomizes the memory addresses where system executables, libraries, heaps, and stacks are loaded. When ASLR is enabled, an attacker can't reliably predict where their target code will be located in memory, making it extremely difficult to execute exploits that depend on jumping to specific memory addresses.
CVE-2026-20805 undermines this protection by leaking a highly specific piece of information: the address of a section object from a remote ALPC port. In Windows architecture, section objects are kernel objects that represent shared memory regions. ALPC ports use these sections to facilitate fast communication between processes. By learning the address of one of these sections, an attacker gains a reference point—a "known good" address—that can be used to calculate the locations of other critical memory structures through relative offsets.
The exploitation process follows a methodical sequence:
The Advanced Local Procedure Call mechanism is a critical component of Windows inter-process communication, used extensively by core system services. ALPC evolved from the older LPC (Local Procedure Call) mechanism and offers improved performance and security features. However, its complexity and privileged position in the system architecture also make it an attractive target for security research and exploitation.
The fact that this vulnerability specifically targets ALPC port section addresses suggests the attackers have deep knowledge of Windows kernel internals. This isn't a bug that would be discovered through casual fuzzing or surface-level testing—it requires sophisticated reverse engineering and a clear understanding of how Windows manages memory for inter-process communication.
While Microsoft hasn't published the specific code changes that fix the vulnerability, the CWE classification (CWE-200: Exposure of Sensitive Information to an Unauthorized Actor) indicates that DWM was improperly handling or validating data returned through ALPC calls. The fix likely involves one or more of the following:
The vulnerability affects an exceptionally broad range of Windows systems, spanning over a decade of releases:
Windows Server 2012 (including Server Core) | 6.2.9200.0 - 6.2.9200.25867 | 6.2.9200.25868 | KB5073698 |
Windows Server 2012 R2 (including Server Core) | 6.3.9600.0 - 6.3.9600.22967 | 6.3.9600.22968 | KB5073696 |
Windows Server 2016 (including Server Core) | 10.0.14393.0 - 10.0.14393.8782 | 10.0.14393.8783 | KB5073722 |
Windows 10 Version 1607 (32-bit, x64) | 10.0.14393.0 - 10.0.14393.8782 | 10.0.14393.8783 | KB5073722 |
Windows 10 Version 1809 (32-bit, x64) | 10.0.17763.0 - 10.0.17763.8275 | 10.0.17763.8276 | KB5073723 |
Windows Server 2019 (including Server Core) | 10.0.17763.0 - 10.0.17763.8275 | 10.0.17763.8276 |
This comprehensive list reveals that virtually every Windows deployment in enterprise and government environments is vulnerable. The presence of Windows 11 Version 25H2—a preview release representing Microsoft's most current codebase—demonstrates that this vulnerability has persisted through multiple development cycles, suggesting it's a longstanding architectural issue rather than a recent regression.
The affected products represent the overwhelming majority of enterprise Windows infrastructure:
The fact that Desktop Window Manager—a component essential to the graphical interface—is affected means that any Windows system running a desktop environment (as opposed to pure Server Core installations without GUI) is potentially vulnerable. However, Server Core installations are also affected because DWM components are present in the system even if not actively rendering a desktop.
Microsoft's "Exploitation Detected" designation means that the company's threat intelligence teams have identified active use of this vulnerability in real-world attacks. While Microsoft hasn't publicly disclosed the specifics—such as which threat actors are using it or what targets they've focused on—the company's track record suggests this designation isn't given lightly.
The speed with which CISA added CVE-2026-20805 to the Known Exploited Vulnerabilities catalog (the same day as Microsoft's disclosure) indicates that U.S. government networks may have been among the targets. CISA's KEV catalog is specifically designed to flag vulnerabilities that pose significant risk to federal networks, and the agency's rapid response suggests credible intelligence about exploitation attempts against government infrastructure.
At first glance, the CVSS score of 5.5 (Medium severity) seems to contradict the urgency of CISA's KEV listing. This apparent paradox is common with information disclosure vulnerabilities: the CVSS framework rates them based solely on their direct impact (leaking information), not on their role as enablers for more severe attacks.
In practice, ASLR bypass vulnerabilities like CVE-2026-20805 are extraordinarily valuable to attackers because they're prerequisite components for exploiting memory corruption vulnerabilities. Modern exploit development often requires multiple vulnerabilities chained together:
Without the information leak, many memory corruption exploits become unreliable or completely non-functional due to the randomization of memory addresses. This makes info leak vulnerabilities critical "force multipliers" that dramatically increase the impact of other vulnerabilities.
The technical specificity of this vulnerability—targeting section addresses from ALPC ports—suggests sophisticated adversaries rather than opportunistic cybercriminals. This level of Windows internals knowledge is typically associated with:
The fact that Microsoft detected the exploitation before public disclosure suggests the attacks were targeted rather than widespread. Mass-market malware campaigns typically generate enough telemetry that security vendors detect them quickly, while targeted attacks can remain under the radar longer.
Scenario 1: Lateral Movement in Enterprise Networks
An attacker who has compromised a low-privileged user account (perhaps through phishing or credential theft) uses CVE-2026-20805 to bypass ASLR, then chains it with a kernel-level vulnerability to escalate to SYSTEM privileges. From there, they can dump credentials from LSASS memory, access sensitive files, and move laterally to other systems on the network.
Scenario 2: Ransomware Deployment
A ransomware group uses the vulnerability as part of their pre-encryption reconnaissance phase. By gaining the ability to execute code reliably on target systems, they can deploy their encryption payload, disable security software, and destroy backup systems before triggering the actual ransomware encryption.
Scenario 3: Espionage Operations
A nation-state threat actor targeting government or defense contractors uses the vulnerability to establish persistent access to high-value systems. The ASLR bypass enables them to deploy kernel-mode rootkits that can hide from security tools and exfiltrate sensitive data over extended periods.
The confirmed exploitation in the wild, combined with the broad attack surface (affecting all current Windows versions), creates a critical window of opportunity for defenders. Attackers who have already weaponized this vulnerability now have a limited time advantage before most systems are patched. Organizations that delay patching are effectively giving threat actors extended access to a proven attack vector.
The persistence of this vulnerability across so many Windows versions—including the newest preview releases—also raises questions about whether similar issues exist in other Windows IPC mechanisms. Security researchers will undoubtedly be scrutinizing ALPC and related subsystems for similar flaws in the coming weeks.
Testing Approach:
Deployment Priority:
Specific KB Articles by Product:
Microsoft has not provided specific workarounds for this vulnerability. However, you can implement defense-in-depth measures:
Indicators of Compromise:
Log Analysis:
EDR/XDR Queries:
If you're using an EDR solution, consider queries like:
1process_name:dwm.exe AND (child_process_name:* OR access_type:memory_read) 2AND user_privilege:low AND process_path:NOT ("C:\\Windows\\*")(Adapt this pseudocode to your specific EDR platform's query language)
For Federal Agencies: Under CISA BOD 22-01, federal civilian agencies must remediate CVE-2026-20805 by February 3, 2026. Document all patching activities for compliance reporting.
For Regulated Industries:
After patching, verify successful installation:
1# PowerShell command to check installed KB2Get-HotFix -Id KB5073724 # Replace with relevant KB number34# Check Windows version5winver67# Verify build number matches fixed version8[System.Environment]::OSVersion.VersionExpected build numbers after patching:
CVE-2026-20805 exemplifies a trend that security professionals have observed for years: information disclosure vulnerabilities, despite their seemingly low direct impact, are among the most valuable tools in an attacker's arsenal. As operating systems have improved their memory protection mechanisms—ASLR, DEP (Data Execution Prevention), Control Flow Guard, and others—attackers have adapted by focusing on vulnerabilities that leak the information needed to bypass these protections.
This creates a cat-and-mouse game where defenders add randomization and isolation layers, while attackers develop techniques to de-randomize and de-isolate. The fact that this particular vulnerability persisted across so many Windows versions suggests that it's a fundamental architectural challenge rather than a simple coding error.
The Advanced Local Procedure Call mechanism has increasingly become a focus of security research. While Microsoft has invested heavily in securing the Win32 API and user-mode components, ALPC operates at a lower level where fewer security boundaries exist. The mechanism's complexity—it must balance security with performance while supporting thousands of system calls per second—creates opportunities for subtle vulnerabilities.
We've seen similar ALPC-related vulnerabilities in the past, including CVE-2018-8440 (exploited by the FruityArmor APT group) and CVE-2019-1162. The pattern suggests that ALPC will continue to be a productive research area for both security researchers and threat actors.
The fact that CVE-2026-20805 was being exploited in the wild before Microsoft's patch release highlights an ongoing challenge in vulnerability disclosure. Microsoft detected the exploitation through telemetry and threat intelligence, which means the attackers had already weaponized the vulnerability before defenders knew it existed. This is the definition of a zero-day vulnerability, and it underscores the importance of:
This vulnerability raises questions about Microsoft's approach to securing inter-process communication mechanisms. While ALPC offers performance advantages over more isolated IPC methods, its privileged position in the system architecture creates systemic risks. A single vulnerability in ALPC can affect virtually every Windows system in existence.
Microsoft has been gradually introducing more security boundaries into Windows—such as containerization, virtualization-based security, and process isolation—but legacy components like ALPC remain critical attack surfaces. The challenge for Microsoft is balancing backward compatibility with the need for more secure architectural patterns.
In the coming weeks and months, security researchers will likely:
Organizations should monitor security advisories for any related CVEs disclosed in upcoming patch cycles, particularly those affecting ALPC, DWM, or other kernel-adjacent components.
Ultimately, CVE-2026-20805 reinforces a lesson that security practitioners have learned repeatedly: no single defensive measure is sufficient. ASLR is a valuable protection, but determined attackers can find ways around it. The most effective security posture combines:
The fact that this vulnerability required local access and low privileges is cold comfort when so many initial access vectors (phishing, stolen credentials, supply chain compromises) readily provide exactly that level of access.
For security teams dealing with the immediate response to CVE-2026-20805, the message is clear: treat this as a critical priority regardless of the CVSS score. Active exploitation, broad impact, and CISA KEV listing are the signals that matter most. Every unpatched system is a potential stepping stone for attackers who have already proven they know how to weaponize this flaw.
KB5073723
Windows 10 Version 21H2 (32-bit, x64, ARM64) | 10.0.19044.0 - 10.0.19044.6808 | 10.0.19044.6809 | KB5073724 |
Windows 10 Version 22H2 (32-bit, x64, ARM64) | 10.0.19045.0 - 10.0.19045.6808 | 10.0.19045.6809 | KB5073724 |
Windows Server 2022 (including Server Core) | 10.0.20348.0 - 10.0.20348.4647 | 10.0.20348.4648 | KB5073457 |
Windows Server 2022, 23H2 Edition (Server Core) | 10.0.25398.0 - 10.0.25398.2091 | 10.0.25398.2092 | KB5073450 |
Windows 11 Version 23H2 (x64, ARM64) | 10.0.22631.0 - 10.0.22631.6490 | 10.0.22631.6491 | KB5073455 |
Windows 11 Version 24H2 (x64, ARM64) | 10.0.26100.0 - 10.0.26100.7622 | 10.0.26100.7623 | KB5074109 |
Windows 11 Version 25H2 (x64, ARM64) | 10.0.26200.0 - 10.0.26200.7622 | 10.0.26200.7623 | KB5074109 |
Windows Server 2025 (including Server Core) | 10.0.26100.0 - 10.0.26100.7622 | 10.0.26100.7623 | KB5074109 |