CVE-2026-20818: Windows Kernel Information Disclosure Vulnerability

Overview

Severity
Medium (CVSS 6.2)
CVSS Vector
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
Category
Information Disclosure
Exploit Status
Not Exploited
Exploitation Likelihood
Unlikely
Patch Tuesday
2026-Jan
Released
2026-01-13
Last Updated
2026-01-20
EPSS Score
0.04% (percentile: 12.4%)

Description

Insertion of sensitive information into log file in Windows Kernel allows an unauthorized attacker to disclose information locally.

FAQ

What type of information could be disclosed by this vulnerability? The type of information that could be disclosed if an attacker successfully exploited this vulnerability is Kernel memory read - unintentional read access to memory contents in kernel space from a user mode process.

Affected Products (9)

Windows

  • Windows Server 2019
  • Windows Server 2019 (Server Core installation)
  • Windows Server 2022
  • Windows Server 2022 (Server Core installation)
  • Windows Server 2025 (Server Core installation)
  • Windows Server 2022, 23H2 Edition (Server Core installation)
  • Windows Server 2025
  • Windows Server 2016
  • Windows Server 2016 (Server Core installation)

Security Updates (5)

Acknowledgments

Microsoft Offensive Research & Security Engineering

Revision History

  • 2026-01-13: Information published.
  • 2026-01-20: Updated the build numbers. This is an informational update only.