CVE-2026-20935

6.2 MEDIUM

📋 TL;DR

This vulnerability allows an unauthorized local attacker to read sensitive information from Windows Virtualization-Based Security (VBS) Enclave memory through untrusted pointer dereference. It affects Windows systems with VBS enabled, potentially exposing kernel or hypervisor data to local users.

💻 Affected Systems

Products:
  • Windows 10
  • Windows 11
  • Windows Server 2016
  • Windows Server 2019
  • Windows Server 2022
Versions: Versions with VBS feature enabled; specific affected builds not yet detailed
Operating Systems: Windows
Default Config Vulnerable: ✅ No
Notes: Only affects systems with Virtualization-Based Security (VBS) enabled; many systems have this disabled by default.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attacker gains access to sensitive kernel memory, hypervisor secrets, or credential data stored in VBS enclaves, leading to privilege escalation or complete system compromise.

🟠

Likely Case

Local information disclosure of protected memory regions, potentially exposing sensitive data but not direct code execution.

🟢

If Mitigated

Limited impact with proper access controls and monitoring; attacker may only access non-critical memory regions.

🌐 Internet-Facing: LOW - Requires local access to the system; not directly exploitable over network.
🏢 Internal Only: MEDIUM - Local attackers or malware could exploit this to gather sensitive information from protected memory regions.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires local access and ability to execute code; exploitation involves manipulating pointer dereferences in VBS enclave context.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Specific patch version not yet released; check Microsoft Security Update Guide

Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20935

Restart Required: Yes

Instructions:

1. Check Microsoft Security Update Guide for patch availability. 2. Apply Windows Update through Settings > Update & Security > Windows Update. 3. For enterprise: Deploy through WSUS or Microsoft Endpoint Configuration Manager. 4. Restart system after patch installation.

🔧 Temporary Workarounds

Disable VBS Feature

windows

Disable Virtualization-Based Security if not required, eliminating the vulnerable component.

bcdedit /set hypervisorlaunchtype off
Restart system

Restrict Local User Privileges

windows

Implement least privilege access controls to limit local code execution capabilities.

🧯 If You Can't Patch

  • Disable VBS feature if not required for security compliance
  • Implement strict local access controls and monitor for suspicious memory access patterns

🔍 How to Verify

Check if Vulnerable:

Check if VBS is enabled: Run 'msinfo32' and check 'Virtualization-based security' status under System Summary.

Check Version:

wmic os get caption, version, buildnumber

Verify Fix Applied:

Verify Windows Update history shows the CVE-2026-20935 patch installed and check VBS status remains functional.

📡 Detection & Monitoring

Log Indicators:

  • Windows Security logs showing unauthorized memory access attempts
  • Event ID 4656 (handle request) with VBS-related objects

Network Indicators:

  • No network indicators - local-only vulnerability

SIEM Query:

EventID=4656 AND ObjectName LIKE "%VBS%" OR ProcessName LIKE "%vbs%"

🔗 References

📤 Share & Export