Home / CVE DB / CVE-2026-20810
Standard
Vulnerability Identifier

CVE-2026-20810

2026-01-13
Severity Assessment
7.8
HIGH
CVSS v3.x Score
Clinical Analysis (Description)

Free of memory not on the heap in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally.

Vector Sequencing

Attack Parameters

Attack Vector
Local
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Impact Consequences

Technical Impact

Unchanged
Scope
High
Confidentiality
High
Integrity
High
Availability
AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Weakness Classification

CWE-CWE-590

Affected Population

Affected Configurations

Total: 106 detected entries

Software List Scrollable
mi
windows_server_2019
Vendor: microsoft • v10.0.17763.2029
mi
windows_10_22h2
Vendor: microsoft • v10.0.19045.2728
mi
windows_server_2019
Vendor: microsoft • v10.0.17763.7434
mi
windows_server_2019
Vendor: microsoft • v10.0.17763.2061
mi
windows_server_2019
Vendor: microsoft • v10.0.17763.3887
mi
windows_10_22h2
Vendor: microsoft • v10.0.19045.2788
mi
windows_server_2019
Vendor: microsoft • v10.0.17763.7919
mi
windows_10_22h2
Vendor: microsoft • v10.0.19045.3930
mi
windows_10_22h2
Vendor: microsoft • v10.0.19045.5011
mi
windows_server_2019
Vendor: microsoft • v10.0.17763.3287
mi
windows_10_22h2
Vendor: microsoft • v10.0.19045.5371
mi
windows_server_2019
Vendor: microsoft • v10.0.17763.4974
mi
windows_10_22h2
Vendor: microsoft • v10.0.19045.4046
mi
windows_server_2019
Vendor: microsoft • v10.0.17763.4737
mi
windows_10_22h2
Vendor: microsoft • v10.0.19045.4651
mi
windows_10_22h2
Vendor: microsoft • v10.0.19045.4291
mi
windows_10_22h2
Vendor: microsoft • v10.0.19045.4412
mi
windows_server_2019
Vendor: microsoft • v10.0.17763.4131
mi
windows_server_2019
Vendor: microsoft • v10.0.17763.6893
mi
windows_server_2019
Vendor: microsoft • v10.0.17763.8027
mi
windows_10_22h2
Vendor: microsoft • v10.0.19045.3803
mi
windows_10_22h2
Vendor: microsoft • v10.0.19045.3516
mi
windows_10_22h2
Vendor: microsoft • v10.0.19045.5737
mi
windows_10_22h2
Vendor: microsoft • v10.0.19045.2673
mi
windows_10_22h2
Vendor: microsoft • v10.0.19045.5608
mi
windows_server_2019
Vendor: microsoft • v10.0.17763.6414
mi
windows_server_2019
Vendor: microsoft • v10.0.17763.2452
mi
windows_server_2019
Vendor: microsoft • v10.0.17763.7792
mi
windows_server_2019
Vendor: microsoft • v10.0.17763.7783
mi
windows_server_2019
Vendor: microsoft • v10.0.17763.3046
mi
windows_server_2019
Vendor: microsoft • v10.0.17763.6293
mi
windows_10_22h2
Vendor: microsoft • v10.0.19045.6575
mi
windows_10_22h2
Vendor: microsoft • v10.0.19041.3920
mi
windows_10_22h2
Vendor: microsoft • v10.0.19045.2965
mi
windows_10_22h2
Vendor: microsoft • v10.0.19045.2604
mi
windows_10_22h2
Vendor: microsoft • v10.0.19045.2486
mi
windows_10_22h2
Vendor: microsoft • v10.0.19045.2846
mi
windows_server_2019
Vendor: microsoft • v10.0.17763.6532
mi
windows_server_2019
Vendor: microsoft • v10.0.17763.5936
mi
windows_server_2019
Vendor: microsoft • v10.0.17763.5458
mi
windows_server_2019
Vendor: microsoft • v10.0.17763.2803
mi
windows_10_22h2
Vendor: microsoft • v10.0.19045.2546
mi
windows_server_2019
Vendor: microsoft • v10.0.17763.2565
mi
windows_10_22h2
Vendor: microsoft • v10.0.19045.6332
mi
windows_server_2019
Vendor: microsoft • v10.0.17763.5576
mi
windows_10_22h2
Vendor: microsoft • v10.0.19045.5854
mi
windows_server_2019
Vendor: microsoft • v10.0.17763.7136
mi
windows_10_22h2
Vendor: microsoft • v10.0.19045.3271
mi
windows_10_22h2
Vendor: microsoft • v10.0.19045.4894
mi
windows_10_22h2
Vendor: microsoft • v10.0.19045.4170
mi
windows_server_2019
Vendor: microsoft • v10.0.17763.2183
mi
windows_10_22h2
Vendor: microsoft • v10.0.19045.2913
mi
windows_server_2019
Vendor: microsoft • v10.0.17763.2928
mi
windows_10_22h2
Vendor: microsoft • v10.0.19045.3086
mi
windows_server_2019
Vendor: microsoft • v10.0.17763.6189
mi
windows_server_2019
Vendor: microsoft • v10.0.17763.6054
mi
windows_10_22h2
Vendor: microsoft • v10.0.19045.6321
mi
windows_server_2019
Vendor: microsoft • v10.0.17763.7009
mi
windows_10_22h2
Vendor: microsoft • v10.0.19045.2364
mi
windows_server_2019
Vendor: microsoft • v10.0.17763.2114
mi
windows_10_22h2
Vendor: microsoft • v10.0.19045.2130
mi
windows_server_2019
Vendor: microsoft • v10.0.17763.5820
mi
windows_10_22h2
Vendor: microsoft • v10.0.19045.3208
mi
windows_server_2019
Vendor: microsoft • v10.0.17763.2237
mi
windows_server_2019
Vendor: microsoft • v10.0.17763.4499
mi
windows_server_2019
Vendor: microsoft • v10.0.17763.5122
mi
windows_server_2019
Vendor: microsoft • v10.0.17763.7314
mi
windows_server_2019
Vendor: microsoft • v10.0.17763.7678
mi
windows_server_2019
Vendor: microsoft • v10.0.17763.4252
mi
windows_10_22h2
Vendor: microsoft • v10.0.19045.5247
mi
windows_10_22h2
Vendor: microsoft • v10.0.19044.2486
mi
windows_10_22h2
Vendor: microsoft • v10.0.19045.6216
mi
windows_server_2019
Vendor: microsoft • v10.0.17763.3406
mi
windows_server_2019
Vendor: microsoft • v10.0.17763.5329
mi
windows_server_2019
Vendor: microsoft • v10.0.17763.1999
mi
windows_10_22h2
Vendor: microsoft • v10.0.19045.6456
mi
windows_server_2019
Vendor: microsoft • v10.0.17763.7922
mi
windows_server_2019
Vendor: microsoft • v10.0.17763.3770
mi
windows_10_22h2
Vendor: microsoft • v10.0.19045.3693
mi
windows_server_2019
Vendor: microsoft • v10.0.17763.6659
mi
windows_10_22h2
Vendor: microsoft • v10.0.19045.5965
mi
windows_10_22h2
Vendor: microsoft • v10.0.19045.5131
mi
windows_10_22h2
Vendor: microsoft • v10.0.19045.6093
mi
windows_10_22h2
Vendor: microsoft • v10.0.19044.3324
mi
windows_server_2019
Vendor: microsoft • v10.0.17763.3532
mi
windows_10_22h2
Vendor: microsoft • v10.0.19045.3570
mi
windows_10_22h2
Vendor: microsoft • v10.0.19045.5487
mi
windows_server_2019
Vendor: microsoft • v10.0.17763.5696
mi
windows_server_2019
Vendor: microsoft • v10.0.17763.7558
mi
windows_10_22h2
Vendor: microsoft • v10.0.19045.3393
mi
windows_server_2019
Vendor: microsoft • v10.0.17763.3650
mi
windows_server_2019
Vendor: microsoft • v10.0.17763.4645
mi
windows_server_2019
Vendor: microsoft • v10.0.17763.2366
mi
windows_server_2019
Vendor: microsoft • v10.0.17763.4851
mi
windows_10_22h2
Vendor: microsoft • v10.0.19045.3324
mi
windows_10_22h2
Vendor: microsoft • v10.0.19045.2251
mi
windows_10_22h2
Vendor: microsoft • v10.0.19045.3448
mi
windows_10_22h2
Vendor: microsoft • v10.0.19042.2486
mi
windows_10_22h2
Vendor: microsoft • v10.0.19045.2311
mi
windows_server_2019
Vendor: microsoft • v10.0.17763.2300
mi
windows_10_22h2
Vendor: microsoft • v10.0.19045.3087
mi
windows_10_22h2
Vendor: microsoft • v10.0.19045.3031
mi
windows_server_2019
Vendor: microsoft • v10.0.17763.3165
mi
windows_10_22h2
Vendor: microsoft • v10.0.19045.3155
mi
windows_server_2019
Vendor: microsoft • v10.0.17763.4010
mi
windows_10_22h2
Vendor: microsoft • v10.0.19045.4780
Timeline

Time Line

PUBLICATION
13 Jan 2026
MODIFICATION
14 Jan 2026
Impact Statistics

Key Metrics

CVSS Score
7.8
HIGH
Products
106
Affected
Articles
1
Published
Remediation Protocol

Recommended Solution

No automatic solution found. Check vendor references.
Patch Library
No direct patch listed in database.
Associated Cyber Intelligence

Related News Articles

1 article(s) mentioning this vulnerability

Article #1

Microsoft Windows Security Update Advisory: Multiple Vulnerabilities Identified

Microsoft Windows faces multiple critical vulnerabilities, including CVE-2026-20805, which could lead to remote code execution and privilege escalation. Immediate action…

9
20 Jan 2026 vulnerability CRITICAL
Recommended Actions for Administrators

Immediate Action Plan

1. Inventory

Identify all affected systems in your infrastructure.

2. Assessment

Assess exposure and criticality for your organization.

3. Mitigation

Apply patches or available workarounds.

4. Verification

Test and confirm effectiveness of applied measures.