CVE-2026-20844 PUBLISHED CVSS 9.300000190734863 CRITICAL

CVE-2023-31096 | MITRE: CVE-2023-31096 Windows Agere Soft Modem Driver Elevation of Privilege Vulnerability CVE-2024-55414 | Windows Motorola Soft Modem Driver Elevation of Privilege Vulnerability CVE-2026-20804 | Windows Hello Tampering Vulnerability CVE-2026-20805 | Desktop Window Manager Information Disclosure Vulnerability CVE-2026-20809 | Windows Kernel Memory Elevation of Privilege Vulnerability CVE-2026-20810 | Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability CVE-2026-20812 | LDAP Tampering Vulnerability CVE-2026-20814 | DirectX Graphics Kernel Elevation of Privilege Vulnerability CVE-2026-20816 | Windows Installer Elevation of Privilege Vulnerability CVE-2026-20817 | Windows Error Reporting Service Elevation of Privilege Vulnerability CVE-2026-20820 | Windows Common Log File System Driver Elevation of Privilege Vulnerability CVE-2026-20821 | Remote Procedure Call Information Disclosure Vulnerability CVE-2026-20822 | Windows Graphics Component Elevation of Privilege Vulnerability CVE-2026-20823 | Windows File Explorer Information Disclosure Vulnerability CVE-2026-20824 | Windows Remote Assistance Security Feature Bypass Vulnerability CVE-2026-20825 | Windows Hyper-V Information Disclosure Vulnerability CVE-2026-20826 | Tablet Windows User Interface (TWINUI) Subsystem Information Disclosure Vulnerability CVE-2026-20827 | Tablet Windows User Interface (TWINUI) Subsystem Information Disclosure Vulnerability CVE-2026-20828 | Windows rndismp6.sys Information Disclosure Vulnerability CVE-2026-20829 | TPM Trustlet Information Disclosure Vulnerability CVE-2026-20831 | Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability CVE-2026-20832 | Windows Remote Procedure Call Interface Definition Language (IDL) Elevation of Privilege Vulnerability CVE-2026-20834 | Windows Spoofing Vulnerability CVE-2026-20836 | DirectX Graphics Kernel Elevation of Privilege Vulnerability CVE-2026-20837 | Windows Media Remote Code Execution Vulnerability CVE-2026-20839 | Windows Client-Side Caching (CSC) Service Information Disclosure Vulnerability CVE-2026-20840 | Windows NTFS Remote Code Execution Vulnerability CVE-2026-20842 | Microsoft DWM Core Library Elevation of Privilege Vulnerability CVE-2026-20843 | Windows Routing and Remote Access Service (RRAS) Elevation of Privilege Vulnerability CVE-2026-20844 | Windows Clipboard Server Elevation of Privilege Vulnerability CVE-2026-20847 | Microsoft Windows File Explorer Spoofing Vulnerability CVE-2026-20848 | Windows SMB Server Elevation of Privilege Vulnerability CVE-2026-20849 | Windows Kerberos Elevation of Privilege Vulnerability CVE-2026-20852 | Windows Hello Tampering Vulnerability CVE-2026-20853 | Windows WalletService Elevation of Privilege Vulnerability CVE-2026-20856 | Windows Server Update Service (WSUS) Remote Code Execution Vulnerability CVE-2026-20857 | Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability CVE-2026-20858 | Windows Management Services Elevation of Privilege Vulnerability CVE-2026-20860 | Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability CVE-2026-20861 | Windows Management Services Elevation of Privilege Vulnerability CVE-2026-20862 | Windows Management Services Information Disclosure Vulnerability CVE-2026-20864 | Windows Connected Devices Platform Service Elevation of Privilege Vulnerability CVE-2026-20865 | Windows Management Services Elevation of Privilege Vulnerability CVE-2026-20866 | Windows Management Services Elevation of Privilege Vulnerability CVE-2026-20867 | Windows Management Services Elevation of Privilege Vulnerability CVE-2026-20868 | Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability CVE-2026-20869 | Windows Local Session Manager (LSM) Elevation of Privilege Vulnerability CVE-2026-20871 | Desktop Windows Manager Elevation of Privilege Vulnerability CVE-2026-20872 | NTLM Hash Disclosure Spoofing Vulnerability CVE-2026-20873 | Windows Management Services Elevation of Privilege Vulnerability CVE-2026-20874 | Windows Management Services Elevation of Privilege Vulnerability CVE-2026-20875 | Windows Local Security Authority Subsystem Service (LSASS) Denial of Service Vulnerability CVE-2026-20877 | Windows Management Services Elevation of Privilege Vulnerability CVE-2026-20918 | Windows Management Services Elevation of Privilege Vulnerability CVE-2026-20919 | Windows SMB Server Elevation of Privilege Vulnerability CVE-2026-20921 | Windows SMB Server Elevation of Privilege Vulnerability CVE-2026-20922 | Windows NTFS Remote Code Execution Vulnerability CVE-2026-20923 | Windows Management Services Elevation of Privilege Vulnerability CVE-2026-20924 | Windows Management Services Elevation of Privilege Vulnerability CVE-2026-20925 | NTLM Hash Disclosure Spoofing Vulnerability CVE-2026-20926 | Windows SMB Server Elevation of Privilege Vulnerability CVE-2026-20927 | Windows SMB Server Denial of Service Vulnerability CVE-2026-20929 | Windows HTTP.sys Elevation of Privilege Vulnerability CVE-2026-20931 | Windows Telephony Service Elevation of Privilege Vulnerability CVE-2026-20932 | Windows File Explorer Information Disclosure Vulnerability CVE-2026-20934 | Windows SMB Server Elevation of Privilege Vulnerability CVE-2026-20936 | Windows NDIS Information Disclosure Vulnerability CVE-2026-20937 | Windows File Explorer Information Disclosure Vulnerability CVE-2026-20939 | Windows File Explorer Information Disclosure Vulnerability CVE-2026-20940 | Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability CVE-2026-20962 | Dynamic Root of Trust for Measurement (DRTM) Information Disclosure Vulnerability CVE-2026-21265 | Secure Boot Certificate Expiration Security Feature Bypass Vulnerability

EPSS 0.02% · 6.4th percentile

Risk Scores

CVSS v4.0
9.300000190734863
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
EPSS Score
0.02%
6.4th percentile

Affected Products

VendorProductVersions
Hitachi, LtdHitachi Virtual Storage Platform

Timeline

References

Open in Interactive Console →