MEDIUM · 4.4

CVE-2026-20825

Improper access control in Windows Hyper-V allows an authorized attacker to disclose information locally.

Vulnerability Description

Improper access control in Windows Hyper-V allows an authorized attacker to disclose information locally.

CVSS Score

4.4

MEDIUM

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
HIGH
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
HIGH
Integrity
NONE
Availability
NONE

Affected Products

VendorProductVersions
MicrosoftWindows 10 1809< 10.0.17763.8276
MicrosoftWindows 10 21H2< 10.0.19044.6809
MicrosoftWindows 10 22H2< 10.0.19045.6809
MicrosoftWindows 11 23H2< 10.0.22631.6491
MicrosoftWindows 11 24H2< 10.0.26100.7623
MicrosoftWindows 11 25H2< 10.0.26200.7623
MicrosoftWindows Server 2019< 10.0.17763.8276
MicrosoftWindows Server 2022< 10.0.20348.4648
MicrosoftWindows Server 2022 23H2< 10.0.25398.2092
MicrosoftWindows Server 2025< 10.0.26100.32230

Related Weaknesses (CWE)

References

FAQ

What is CVE-2026-20825?

CVE-2026-20825 is a vulnerability with a CVSS score of 4.4 (MEDIUM). Improper access control in Windows Hyper-V allows an authorized attacker to disclose information locally.

How severe is CVE-2026-20825?

CVE-2026-20825 has been rated MEDIUM with a CVSS base score of 4.4/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2026-20825?

Check the references section above for vendor advisories and patch information. Affected products include: Microsoft Windows 10 1809, Microsoft Windows 10 21H2, Microsoft Windows 10 22H2, Microsoft Windows 11 23H2, Microsoft Windows 11 24H2.