Zero-day in Windows DWM exploited in the wild prompts urgent patch

TL;DR Summary
Microsoft patched a critical zero-day in Desktop Window Manager (DWM) after active exploitation in the wild. Tracked as CVE-2026-20805, the flaw allows low-privilege local attackers to leak user-mode memory addresses via remote ALPC ports, potentially aiding privilege escalation. Although not remotely exploitable, its low complexity and lack of user interaction make it attractive for malware or post-compromise operations. MSTIC and MSRC confirmed exploitation but noted no public proof-of-concept; patching, especially on legacy Windows versions in extended support, is urgently advised.
- Microsoft Desktop Window Manager 0-Day Vulnerability Exploited in the wild Cyber Security News
- Patch Tuesday, January 2026 Edition Krebs on Security
- Microsoft Patch Tuesday addresses 112 defects, including one actively exploited zero-day CyberScoop
- Microsoft Fixes 114 Windows Flaws in January 2026 Patch, One Actively Exploited The Hacker News
- The January 2026 Security Update Review Zero Day Initiative
Reading Insights
Total Reads
0
Unique Readers
4
Time Saved
52 min
vs 53 min read
Condensed
99%
10,448 → 80 words
Want the full story? Read the original article
Read on Cyber Security News