Analyse en attenteCVE-2026-27931

CVE-2026-27931: Information Disclosure in Windows GDI

Plateforme

windows

Composant

windows-gdi

Corrigé dans

10.0.28000.1836

CVE-2026-27931 describes an information disclosure vulnerability within the Windows Graphics Device Interface (GDI). This flaw allows an unauthorized attacker to potentially expose sensitive data locally. The vulnerability impacts Windows versions 10.0.19044.0 through 10.0.28000.1836, and a patch is available in version 10.0.28000.1836.

Impact et Scénarios d'Attaquetraduction en cours…

The core impact of CVE-2026-27931 lies in the potential for local information disclosure. An attacker who can trigger this vulnerability could read data beyond the intended boundaries of memory within the GDI component. While the vulnerability is described as local, this means an attacker needs some level of access to the system to exploit it. The specific data exposed is unknown, but it could include sensitive system information, user data, or potentially even parts of other applications' memory. The severity is classified as medium, suggesting a moderate risk of exploitation given the need for local access and the potential impact of data exposure.

Contexte d'Exploitationtraduction en cours…

CVE-2026-27931 was published on April 14, 2026. As of the current date, there is no indication of active exploitation campaigns targeting this vulnerability. It is not listed on the CISA Known Exploited Vulnerabilities (KEV) catalog or has an EPSS score. Public proof-of-concept (POC) code is currently unavailable, which reduces the immediate risk of widespread exploitation.

Renseignement sur les Menaces

Statut de l'Exploit

Preuve de ConceptInconnu
CISA KEVNO
Exposition InternetFaible

EPSS

0.05% (percentile 14%)

Vecteur CVSS

RENSEIGNEMENT SUR LES MENACES· CVSS 3.1CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C5.5MEDIUMAttack VectorLocalComment l'attaquant atteint la cibleAttack ComplexityLowConditions requises pour exploiterPrivileges RequiredNoneNiveau d'authentification requisUser InteractionRequiredSi une action de la victime est requiseScopeUnchangedImpact au-delà du composant affectéConfidentialityHighRisque d'exposition de données sensiblesIntegrityNoneRisque de modification non autorisée de donnéesAvailabilityNoneRisque d'interruption de servicenextguardhq.com · Score de base CVSS v3.1
Que signifient ces métriques?
Attack Vector
Local — l'attaquant a besoin d'une session locale ou d'un shell sur le système.
Attack Complexity
Faible — aucune condition spéciale requise. Exploitable de manière fiable.
Privileges Required
Aucun — sans authentification. Aucune identifiant requis pour exploiter.
User Interaction
Requise — la victime doit ouvrir un fichier, cliquer sur un lien ou visiter une page.
Scope
Inchangé — impact limité au composant vulnérable.
Confidentiality
Élevé — perte totale de confidentialité. L'attaquant peut lire toutes les données.
Integrity
Aucun — aucun impact sur l'intégrité.
Availability
Aucun — aucun impact sur la disponibilité.

Logiciel Affecté

Composantwindows-gdi
FournisseurMicrosoft
Version minimale10.0.19044.0
Version maximale10.0.28000.1836
Corrigé dans10.0.28000.1836

Classification de Faiblesse (CWE)

Chronologie

  1. Publiée
  2. Modifiée
  3. EPSS mis à jour

Mitigation et Contournementstraduction en cours…

The primary mitigation for CVE-2026-27931 is to upgrade affected Windows systems to version 10.0.28000.1836 or later, which includes the security patch. If immediate patching is not possible, consider implementing stricter access controls to limit the potential for local attackers to exploit the vulnerability. While there are no specific WAF or proxy rules that can directly address this vulnerability, ensuring that the GDI component is up-to-date is the most effective preventative measure. After upgrading, confirm the fix by verifying the Windows build version is 10.0.28000.1836 or higher using systeminfo command.

Comment corrigertraduction en cours…

Aplica las actualizaciones de seguridad proporcionadas por Microsoft para Windows 10. Estas actualizaciones corrigen una vulnerabilidad de divulgación de información en el componente GDI, previniendo que atacantes puedan acceder a datos sensibles en tu sistema.  Asegúrate de instalar las últimas actualizaciones a través de Windows Update.

Questions fréquentestraduction en cours…

What is CVE-2026-27931 — Information Disclosure in Windows GDI?

CVE-2026-27931 is a medium severity vulnerability in Windows GDI that allows an attacker to disclose information locally due to an out-of-bounds read. It affects Windows 10 versions 10.0.19044.0 through 10.0.28000.1836.

Am I affected by CVE-2026-27931 in Windows GDI?

You are affected if your system is running Windows 10 versions 10.0.19044.0 through 10.0.28000.1836. Check your version using the ver command.

How do I fix CVE-2026-27931 in Windows GDI?

Upgrade your Windows system to version 10.0.28000.1836 or later to receive the security patch. This is the primary and recommended mitigation.

Is CVE-2026-27931 being actively exploited?

As of the current date, there is no public evidence of active exploitation campaigns targeting CVE-2026-27931.

Where can I find the official Windows advisory for CVE-2026-27931?

Refer to the Microsoft Security Update Guide for the official advisory and details related to CVE-2026-27931.

Ton projet est-il affecté ?

Téléverse ton fichier de dépendances et découvre instantanément si cette CVE et d'autres te touchent.

en directfree scan

Essayez maintenant — sans compte

scanZone.subtitle

Scan manuelSlack/email alertsContinuous monitoringWhite-label reports

Glissez-déposez votre fichier de dépendances

composer.lock, package-lock.json, requirements.txt, Gemfile.lock, pubspec.lock, Dockerfile...