Jan 2026: Windows Spoofing Vulnerability
CVE-2026-20834 Published on January 13, 2026
Windows Spoofing Vulnerability
Absolute path traversal in Windows Shell allows an unauthorized attacker to perform spoofing with a physical attack.
Weakness Types
Absolute Path Traversal
The software uses external input to construct a pathname that should be within a restricted directory, but it does not properly neutralize absolute path sequences such as "/abs/path" that can resolve to a location that is outside of that directory. This allows attackers to traverse the file system to access files or directories that are outside of the restricted directory.
What is a Privacy violation Vulnerability?
The product does not properly prevent a person's private, personal information from being accessed by actors who either (1) are not explicitly authorized to access the information or (2) do not have the implicit consent of the person about whom the information is collected.
CVE-2026-20834 has been classified to as a Privacy violation vulnerability or weakness.
Products Associated with CVE-2026-20834
Want to know whenever a new CVE is published for Microsoft products? stack.watch will email you.
Affected Versions
Microsoft Windows 10 Version 1607:- Version 10.0.14393.0 and below 10.0.14393.8783 is affected.
- Version 10.0.17763.0 and below 10.0.17763.8276 is affected.
- Version 10.0.19044.0 and below 10.0.19044.6809 is affected.
- Version 10.0.19045.0 and below 10.0.19045.6809 is affected.
- Version 10.0.22631.0 and below 10.0.22631.6491 is affected.
- Version 10.0.22631.0 and below 10.0.22631.6491 is affected.
- Version 10.0.26100.0 and below 10.0.26100.7623 is affected.
- Version 10.0.26200.0 and below 10.0.26200.7623 is affected.
- Version 6.1.7601.0 and below 6.1.7601.28117 is affected.
- Version 6.1.7601.0 and below 6.1.7601.28117 is affected.
- Version 6.0.6003.0 and below 6.0.6003.23717 is affected.
- Version 6.0.6003.0 and below 6.0.6003.23717 is affected.
- Version 6.2.9200.0 and below 6.2.9200.25868 is affected.
- Version 6.2.9200.0 and below 6.2.9200.25868 is affected.
- Version 6.3.9600.0 and below 6.3.9600.22968 is affected.
- Version 6.3.9600.0 and below 6.3.9600.22968 is affected.
- Version 10.0.14393.0 and below 10.0.14393.8783 is affected.
- Version 10.0.14393.0 and below 10.0.14393.8783 is affected.
- Version 10.0.17763.0 and below 10.0.17763.8276 is affected.
- Version 10.0.17763.0 and below 10.0.17763.8276 is affected.
- Version 10.0.20348.0 and below 10.0.20348.4648 is affected.
- Version 10.0.25398.0 and below 10.0.25398.2092 is affected.
- Version 10.0.26100.0 and below 10.0.26100.32230 is affected.
- Version 10.0.26100.0 and below 10.0.26100.32230 is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.