The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2026-20846

CVE-2026-20846: Windows 10 1607 GDI+ DoS Vulnerability

CVE-2026-20846 is a buffer over-read denial of service flaw in Windows 10 1607 GDI+ that enables attackers to disrupt system availability over a network. This article covers technical details, impact, and mitigation.

Published: February 13, 2026

CVE-2026-20846 Overview

CVE-2026-20846 is a buffer over-read vulnerability in Windows GDI+ (Graphics Device Interface Plus) that enables an unauthorized attacker to cause a denial of service condition over a network. GDI+ is a critical Windows subsystem responsible for rendering graphics and handling image processing, making this vulnerability particularly impactful across enterprise environments.

Critical Impact

This vulnerability allows remote attackers to crash systems or services relying on GDI+ image processing without requiring authentication, potentially disrupting business operations across affected Windows client and server deployments.

Affected Products

  • Microsoft Windows 10 (versions 1607, 1809, 21H2, 22H2)
  • Microsoft Windows 11 (versions 23H2, 24H2, 25H2)
  • Microsoft Windows Server 2012, 2012 R2, 2016, 2019, 2022, 2022 23H2, 2025

Discovery Timeline

  • 2026-02-10 - CVE-2026-20846 published to NVD
  • 2026-02-11 - Last updated in NVD database

Technical Details for CVE-2026-20846

Vulnerability Analysis

This vulnerability is classified as CWE-126 (Buffer Over-read), a memory safety issue where the application reads data beyond the boundaries of an allocated buffer. In the context of Windows GDI+, this occurs during image processing operations where insufficient bounds checking allows the library to read memory outside the intended buffer limits.

The buffer over-read vulnerability in GDI+ can be triggered when processing specially crafted image files. When the vulnerable code path is executed, GDI+ attempts to read beyond the allocated memory region, which can lead to process crashes and service disruption. Since GDI+ is used by numerous Windows applications and services for graphics rendering, the impact of exploiting this vulnerability can cascade across multiple dependent processes.

The network-accessible nature of this vulnerability means that attackers can deliver malicious image content through various vectors including web pages, email attachments, document files, or any application that processes external image data using GDI+.

Root Cause

The root cause of CVE-2026-20846 lies in improper bounds validation within the GDI+ image parsing routines. When processing certain image formats or malformed image structures, the code fails to properly validate that read operations remain within the bounds of allocated buffers. This results in out-of-bounds memory access that can crash the affected process or cause unpredictable system behavior.

Attack Vector

The attack vector for this vulnerability is network-based and requires no user interaction or special privileges. An attacker can exploit this vulnerability by:

  1. Crafting a malicious image file designed to trigger the buffer over-read condition
  2. Delivering the malicious image to a target system through network-accessible channels (web browsers, email clients, document viewers)
  3. When the victim's system processes the malicious image using GDI+, the buffer over-read occurs
  4. The resulting memory access violation causes a denial of service, crashing the application or potentially the system

The exploitation does not require authentication, allowing anonymous attackers to target any system that processes external image content.

Detection Methods for CVE-2026-20846

Indicators of Compromise

  • Application crashes in processes utilizing GDI+ (gdiplus.dll) with access violation exceptions
  • Crash dumps showing fault addresses outside valid buffer ranges in GDI+ code paths
  • Unusual volume of crash reports from applications processing external image content
  • Windows Error Reporting (WER) entries indicating gdiplus.dll as the faulting module

Detection Strategies

  • Monitor Windows Event Logs for application crashes involving GDI+ components
  • Deploy endpoint detection rules to identify suspicious image file downloads followed by application crashes
  • Configure crash dump analysis to flag memory access violations in graphics-related system libraries
  • Implement network-based detection for known malicious image file signatures

Monitoring Recommendations

  • Enable Windows Error Reporting and configure centralized collection of crash reports
  • Monitor process termination events for applications known to utilize heavy GDI+ processing
  • Implement file integrity monitoring for critical GDI+ system files (gdiplus.dll)
  • Configure SentinelOne agents to alert on repeated application crashes indicative of DoS attacks

How to Mitigate CVE-2026-20846

Immediate Actions Required

  • Apply Microsoft security updates as soon as they become available through Windows Update or WSUS
  • Review and restrict network exposure of systems that process untrusted image content
  • Enable application crash monitoring to detect active exploitation attempts
  • Consider implementing application allowlisting to control which applications can process external content

Patch Information

Microsoft has released security updates to address this vulnerability. Refer to the Microsoft Security Response Center advisory for detailed patch information and download links specific to each affected Windows version.

Organizations should prioritize patching based on system exposure:

  • Priority 1: Internet-facing systems and servers
  • Priority 2: User workstations with external email and web access
  • Priority 3: Internal servers with limited external exposure

Workarounds

  • Restrict processing of image files from untrusted sources until patches are applied
  • Configure email gateways to filter or quarantine image attachments from external senders
  • Implement web content filtering to block suspicious image downloads
  • Consider disabling automatic image rendering in email clients and web browsers where feasible
bash
# Example: Restrict GDI+ image processing via Group Policy
# Create a software restriction policy to limit vulnerable applications
# Run from an elevated PowerShell prompt

# Check current Windows version and patch status
Get-HotFix | Where-Object {$_.Description -eq "Security Update"} | Sort-Object InstalledOn -Descending | Select-Object -First 10

# Verify GDI+ DLL version (check against patched versions from Microsoft advisory)
Get-Item "$env:SystemRoot\System32\gdiplus.dll" | Select-Object VersionInfo

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeDOS

  • Vendor/TechWindows

  • SeverityHIGH

  • CVSS Score7.5

  • EPSS Probability0.04%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityHigh
  • CWE References
  • CWE-126
  • Vendor Resources
  • Microsoft CVE-2026-20846 Advisory
  • Related CVEs
  • CVE-2026-33096: Windows HTTP.sys DoS Vulnerability

  • CVE-2026-32216: Windows Redirected Drive DoS Vulnerability

  • CVE-2026-32181: Microsoft Windows DoS Vulnerability

  • CVE-2026-32071: Windows LSASS DoS Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English