CVE-2026-27931: Information Disclosure in Windows GDI
प्लेटफ़ॉर्म
windows
घटक
windows-gdi
में ठीक किया गया
10.0.28000.1836
CVE-2026-27931 describes an information disclosure vulnerability within the Windows Graphics Device Interface (GDI). This flaw allows an unauthorized attacker to potentially expose sensitive data locally. The vulnerability impacts Windows versions 10.0.19044.0 through 10.0.28000.1836, and a patch is available in version 10.0.28000.1836.
प्रभाव और हमले की स्थितियाँअनुवाद हो रहा है…
The core impact of CVE-2026-27931 lies in the potential for local information disclosure. An attacker who can trigger this vulnerability could read data beyond the intended boundaries of memory within the GDI component. While the vulnerability is described as local, this means an attacker needs some level of access to the system to exploit it. The specific data exposed is unknown, but it could include sensitive system information, user data, or potentially even parts of other applications' memory. The severity is classified as medium, suggesting a moderate risk of exploitation given the need for local access and the potential impact of data exposure.
शोषण संदर्भअनुवाद हो रहा है…
CVE-2026-27931 was published on April 14, 2026. As of the current date, there is no indication of active exploitation campaigns targeting this vulnerability. It is not listed on the CISA Known Exploited Vulnerabilities (KEV) catalog or has an EPSS score. Public proof-of-concept (POC) code is currently unavailable, which reduces the immediate risk of widespread exploitation.
खतरा खुफिया
एक्सप्लॉइट स्थिति
EPSS
0.05% (14% शतमक)
CVSS वेक्टर
इन मेट्रिक्स का क्या मतलब है?
- Attack Vector
- स्थानीय — हमलावर को सिस्टम पर स्थानीय सत्र या शेल की आवश्यकता है।
- Attack Complexity
- निम्न — कोई विशेष शर्त नहीं। विश्वसनीय रूप से शोषण योग्य।
- Privileges Required
- कोई नहीं — बिना प्रमाणीकरण के शोषण योग्य।
- User Interaction
- आवश्यक — पीड़ित को फ़ाइल खोलनी, लिंक पर क्लिक करना या पेज पर जाना होगा।
- Scope
- अपरिवर्तित — प्रभाव केवल कमज़ोर घटक तक सीमित।
- Confidentiality
- उच्च — पूर्ण गोपनीयता हानि। हमलावर सभी डेटा पढ़ सकता है।
- Integrity
- कोई नहीं — अखंडता पर कोई प्रभाव नहीं।
- Availability
- कोई नहीं — उपलब्धता पर कोई प्रभाव नहीं।
प्रभावित सॉफ्टवेयर
कमजोरी वर्गीकरण (CWE)
समयरेखा
- प्रकाशित
- संशोधित
- EPSS अद्यतन
शमन और वर्कअराउंडअनुवाद हो रहा है…
The primary mitigation for CVE-2026-27931 is to upgrade affected Windows systems to version 10.0.28000.1836 or later, which includes the security patch. If immediate patching is not possible, consider implementing stricter access controls to limit the potential for local attackers to exploit the vulnerability. While there are no specific WAF or proxy rules that can directly address this vulnerability, ensuring that the GDI component is up-to-date is the most effective preventative measure. After upgrading, confirm the fix by verifying the Windows build version is 10.0.28000.1836 or higher using systeminfo command.
कैसे ठीक करेंअनुवाद हो रहा है…
Aplica las actualizaciones de seguridad proporcionadas por Microsoft para Windows 10. Estas actualizaciones corrigen una vulnerabilidad de divulgación de información en el componente GDI, previniendo que atacantes puedan acceder a datos sensibles en tu sistema. Asegúrate de instalar las últimas actualizaciones a través de Windows Update.
अक्सर पूछे जाने वाले सवालअनुवाद हो रहा है…
What is CVE-2026-27931 — Information Disclosure in Windows GDI?
CVE-2026-27931 is a medium severity vulnerability in Windows GDI that allows an attacker to disclose information locally due to an out-of-bounds read. It affects Windows 10 versions 10.0.19044.0 through 10.0.28000.1836.
Am I affected by CVE-2026-27931 in Windows GDI?
You are affected if your system is running Windows 10 versions 10.0.19044.0 through 10.0.28000.1836. Check your version using the ver command.
How do I fix CVE-2026-27931 in Windows GDI?
Upgrade your Windows system to version 10.0.28000.1836 or later to receive the security patch. This is the primary and recommended mitigation.
Is CVE-2026-27931 being actively exploited?
As of the current date, there is no public evidence of active exploitation campaigns targeting CVE-2026-27931.
Where can I find the official Windows advisory for CVE-2026-27931?
Refer to the Microsoft Security Update Guide for the official advisory and details related to CVE-2026-27931.
क्या आपका प्रोजेक्ट प्रभावित है?
अपनी डिपेंडेंसी फ़ाइल अपलोड करें और तुरंत जानें कि यह CVE और अन्य आपको प्रभावित करती हैं या नहीं।
अभी आज़माएँ — no खाता
scanZone.subtitle
अपनी डिपेंडेंसी फ़ाइल ड्रैग और ड्रॉप करें
composer.lock, package-lock.json, requirements.txt, Gemfile.lock, pubspec.lock, Dockerfile...