Zero-day in Windows DWM exploited in the wild prompts urgent patch

1 min read
Source: Cyber Security News
Zero-day in Windows DWM exploited in the wild prompts urgent patch
Photo: Cyber Security News
TL;DR Summary

Microsoft patched a critical zero-day in Desktop Window Manager (DWM) after active exploitation in the wild. Tracked as CVE-2026-20805, the flaw allows low-privilege local attackers to leak user-mode memory addresses via remote ALPC ports, potentially aiding privilege escalation. Although not remotely exploitable, its low complexity and lack of user interaction make it attractive for malware or post-compromise operations. MSTIC and MSRC confirmed exploitation but noted no public proof-of-concept; patching, especially on legacy Windows versions in extended support, is urgently advised.

Share this article

Reading Insights

Total Reads

0

Unique Readers

4

Time Saved

52 min

vs 53 min read

Condensed

99%

10,44880 words

Want the full story? Read the original article

Read on Cyber Security News