Glass Houses: Shattering KASLR via Windows DWM (CVE-2026-20805)
Vulnerability ID: CVE-2026-20805
CVSS Score: 5.5
Published: 2026-01-13
A seemingly benign information disclosure vulnerability in the Windows Desktop Window Manager (dwm.exe) serves as a critical KASLR bypass primitive. By querying system handle information, unprivileged local attackers can leak raw kernel virtual addresses associated with ALPC ports, effectively de-randomizing the kernel memory layout.
TL;DR
CVE-2026-20805 is a local info-leak in dwm.exe that reveals kernel memory addresses. While it doesn't execute code on its own, it allows attackers to bypass Kernel Address Space Layout Randomization (KASLR), a primary defense mechanism in Windows. It is currently listed in the CISA KEV catalog, meaning ransomware groups and APTs are actively chaining it with other exploits to achieve privilege escalation.
⚠️ Exploit Status: ACTIVE
Technical Details
- CWE ID: CWE-200
- Attack Vector: Local (AV:L)
- CVSS Score: 5.5 (Medium)
- EPSS Score: 5.86% (High Percentile)
- Impact: Kernel Address Space Layout Randomization (KASLR) Bypass
- Exploit Status: Active Exploitation (CISA KEV)
Affected Systems
- Windows 10 Version 1607 through 22H2
- Windows 11 Version 22H3 through 25H2
- Windows Server 2012 / 2012 R2
- Windows Server 2016 / 2019 / 2022
- Windows Server 2025
-
Windows 10 1809: < 10.0.17763.8276 (Fixed in:
10.0.17763.8276) -
Windows 11 23H2: < 10.0.22631.6491 (Fixed in:
10.0.22631.6491) -
Windows Server 2025: < 10.0.26100.7623 (Fixed in:
10.0.26100.7623)
Exploit Details
- GitHub: C++ implementation of NtQuerySystemInformation dumper targeting DWM
- GitHub: Python-based memory leak monitor for ALPC structures
Mitigation Strategies
- Apply Vendor Patches immediately (January 2026 Cumulative Updates).
- Monitor specific Native API calls (
NtQuerySystemInformation) for anomalous patterns. - Implement Attack Surface Reduction (ASR) rules to prevent initial code execution.
Remediation Steps:
- Identify vulnerable hosts using version numbering (e.g., Windows 10 < 10.0.17763.8276).
- Deploy the January 13, 2026 security update via WSUS, MECM, or Windows Update.
- Reboot the system to reload the
ntoskrnl.exeanddwm.execomponents.
References
Read the full report for CVE-2026-20805 on our website for more details including interactive diagrams and full exploit analysis.
Top comments (0)