CVE-2026-20864

7.8 HIGH

📋 TL;DR

This vulnerability is a heap-based buffer overflow in the Connected Devices Platform Service (Cdpsvc) on Windows systems. It allows an authenticated attacker with local access to execute arbitrary code with elevated SYSTEM privileges. This affects Windows systems where the Cdpsvc service is running.

💻 Affected Systems

Products:
  • Microsoft Windows
Versions: Windows 10 versions 1809 through 22H2, Windows 11 versions 21H2 through 23H2
Operating Systems: Windows 10, Windows 11
Default Config Vulnerable: ⚠️ Yes
Notes: Affects systems with Connected Devices Platform Service enabled (default on most Windows installations).

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker gains full SYSTEM privileges on the compromised system, enabling complete control, data theft, lateral movement, and persistence establishment.

🟠

Likely Case

Privilege escalation from a standard user account to SYSTEM, allowing installation of malware, credential harvesting, and disabling security controls.

🟢

If Mitigated

With proper access controls and endpoint protection, exploitation attempts would be blocked or detected, limiting impact to isolated systems.

🌐 Internet-Facing: LOW - This requires local authenticated access, not directly exploitable over the internet.
🏢 Internal Only: HIGH - Any compromised user account on an affected system could lead to full system compromise.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires authenticated local access and knowledge of heap manipulation techniques.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Windows Security Update KB5034441 (January 2024) or later

Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20864

Restart Required: Yes

Instructions:

1. Open Windows Update settings. 2. Check for updates. 3. Install KB5034441 or later security update. 4. Restart the system when prompted.

🔧 Temporary Workarounds

Disable Connected Devices Platform Service

windows

Stops the vulnerable service from running, preventing exploitation.

sc config cdpusersvc_xxxxx start= disabled
sc stop cdpusersvc_xxxxx

Restrict service permissions

windows

Limit which users can interact with the Cdpsvc service.

sc sdset cdpusersvc_xxxxx D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)

🧯 If You Can't Patch

  • Implement strict access controls to limit who has local login privileges
  • Deploy endpoint detection and response (EDR) solutions to detect privilege escalation attempts

🔍 How to Verify

Check if Vulnerable:

Check Windows version with 'winver' and verify Connected Devices Platform Service is running via 'sc query cdpusersvc_xxxxx'

Check Version:

systeminfo | findstr /B /C:"OS Name" /C:"OS Version"

Verify Fix Applied:

Verify KB5034441 is installed via 'wmic qfe list brief | find "5034441"' and check service is updated or disabled

📡 Detection & Monitoring

Log Indicators:

  • Event ID 4688 with Cdpsvc.exe parent process
  • Unexpected service crashes (Event ID 1000, 1001)
  • Privilege escalation attempts in security logs

Network Indicators:

  • None - this is a local privilege escalation vulnerability

SIEM Query:

EventID=4688 AND (NewProcessName="*\cdpsvc.exe" OR ParentProcessName="*\cdpsvc.exe")

🔗 References

📤 Share & Export