No recent events yet!
Risk: | high |
Damage: |
high |
Platform(s): |
Microsoft® Windows OS |
Advisory ID: |
ngCERT-2026-010002 |
Version: |
Nil |
CVE: |
CVE-2026-20805 |
Published: |
February 27, 2026 |
ngCERT alerts organizations and users to an actively exploited zero-day vulnerability in Microsoft Windows Desktop Window Manager (DWM), tracked as CVE-2026-20805. The flaw arises from improper handling of Advanced Local Procedure Call (ALPC) messages, allowing attackers with local access to trigger memory disclosure and obtain internal pointers and heap/base address details. While it does not directly allow remote code execution or privilege escalation, it can be leveraged to bypass exploit mitigations like ASLR, increasing the reliability of subsequent attacks. Users and organizations are advised to apply recommended patches, monitor for suspicious activity, and follow security best practices to mitigate risks.
Microsoft’s DWM is a core Windows service responsible for visual effects, window composition, and graphical rendering. The vulnerability occurs when crafted ALPC requests sent by a local attacker cause memory disclosure, revealing sensitive internal addresses. Although CVE-2026-20805 does not directly enable code execution or privilege escalation, it can be chained with other exploits to bypass mitigations and facilitate more reliable attacks.
The following are recommended:

