Spoofing Vulnerability in Windows NTLM by Microsoft
CVE-2026-20872

6.5MEDIUM

What is CVE-2026-20872?

The vulnerability involves the external control of file names or paths in Windows NTLM, which can enable unauthorized attackers to perform spoofing attacks over a network. This exposure allows malicious parties to manipulate network sessions, potentially leading to unauthorized access and data compromise. It is essential for organizations using affected versions of Windows NTLM to implement the necessary security patches and follow recommended guidelines to protect their systems.

Affected Version(s)

Windows 10 Version 1607 32-bit Systems 10.0.14393.0 < 10.0.14393.8783

Windows 10 Version 1809 32-bit Systems 10.0.17763.0 < 10.0.17763.8276

Windows 10 Version 21H2 32-bit Systems 10.0.19044.0 < 10.0.19044.6809

References

CVSS V3.1

Score:
6.5
Severity:
MEDIUM
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.