This release includes multiple zero‑day disclosures, some of which are under active exploitation.
Microsoft addresses 114 CVEs in the first Patch Tuesday of 2026, with eight rated critical, 6 of which are remote code execution flaws and 2 are elevation-of-privilege flaws. 105 rated as important. Three zero days, including one that was exploited in the wild. A complete list of all the other vulnerabilities Microsoft disclosed this month is available: Security updates
Zero Day Vulnerability:
Microsoft classifies a zero-day flaw as publicly disclosed or actively exploited with no official fix available at the time of this publication.
CVE-2026-20805 - A security vulnerability in the Desktop Window Manager (DWM) component of Windows. It allows an attacker with local access to the system to leak sensitive information from memory, which could then help them bypass defenses or chain into more serious attacks. Microsoft says that successfully exploiting the flaw allows attackers to read memory addresses associated with the remote ALPC port.
Additionally, Microsoft addressed another Desktop Window Manager vulnerability this month. CVE-2026-20871 is an elevation-of-privilege (EoP) flaw rated Important with a CVSS v3 score of 7.8. Unlike CVE-2026-20805, this vulnerability has not been observed being exploited in the wild, though Microsoft assessed it as “Exploitation More Likely.”
CVE-2026-21265 - A security feature bypass vulnerability affecting Windows Secure Boot related to expiring Secure Boot certificates. It was assigned a CVSSv3 score of 6.4 and is rated important. It was assessed as “Exploitation Less Likely.”
Microsoft Secure Boot certificates are stored in the Unified Extensible Firmware Interface (UEFI) Key Enrollment Key (KEK) and the DB. As these certificates near expiration, updates are required to preserve the Secure Boot trust chain and ensure continued platform integrity. The following certificates are scheduled to expire in 2026:
|
Certificates Authority (CA) |
Location |
Purpose |
Expiration Date |
|
Microsoft Corporation KEK CA 2011 |
KEK |
Signs updates to the DB and DBX |
24/06/2026 |
|
Microsoft Corporation UEFI CA 2011 |
DB |
Signs third party boot loaders, Option ROMs and more |
27/06/2026 |
|
Microsoft Windows Production PCA 2011 |
DB |
Signs the Windows Boot Manager |
19/10/2026 |
CVE-2023-31096 - A local privilege escalation vulnerability in the Agere Soft Modem driver that was included with various versions of Windows. It stems from a stack buffer overflow in the driver’s kernel-mode code, which can allow an attacker with local access to escalate privileges to SYSTEM level.
In the October Patch Tuesday updates, Microsoft disclosed actively exploited vulnerabilities affecting a third-party Agere modem driver shipped with supported Windows versions and announced plans to remove the driver. As part of today’s Patch Tuesday updates, Microsoft has completed the removal of the vulnerable drivers from Windows.
Critical
CVE-2026-20952 and CVE-2026-20953 are remote code execution (RCE) vulnerabilities affecting Microsoft Office. Both flaws are rated Critical, assigned a CVSS v3 score of 8.4, and assessed as “Exploitation Less Likely.” An attacker could exploit these vulnerabilities through social engineering by delivering a malicious Microsoft Office document to a target, potentially resulting in arbitrary code execution.
Despite being classified as “Exploitation Less Likely,” Microsoft notes that the Preview Pane is a viable attack vector for both vulnerabilities, meaning exploitation may occur without requiring the user to open the file
CVE‑2026‑20822 - A critical elevation-of-privilege vulnerability in the Windows Graphics Component. The flaw results from a use-after-free (UAF) bug that, if successfully exploited, could allow an attacker to gain SYSTEM privileges on affected systems. It has been assigned a CVSS v3.1 base score of 7.8. Exploitation requires the attacker to successfully trigger a race condition. Microsoft has assessed the likelihood of exploitation as “less likely” and notes that this vulnerability has not been publicly disclosed.
Important
CVE‑2026‑20946 and CVE‑2026‑20955 are high‑severity remote code execution vulnerabilities in Microsoft Excel that could allow an attacker to execute arbitrary code by tricking a user into opening a specially crafted spreadsheet. Both have a CVSS v3.1 score of 7.8, are assessed as “Exploitation Less Likely,” and have no known public exploits. Microsoft addressed both flaws in the January Patch Tuesday updates, and affected systems should be updated promptly.
CVE-2026-20840 and CVE-2026-20922 are remote code execution (RCE) vulnerabilities in the Windows New Technology File System (NTFS). Both vulnerabilities have been assigned CVSS v3 scores of 7.8 and are rated as Important. Microsoft assessed them as “Exploitation More Likely.” These flaws result from heap-based buffer overflows, which could allow an attacker to execute arbitrary code on an affected system. Notably, both advisories indicate that any authenticated attacker can exploit these vulnerabilities, regardless of privilege level.
CVE-2026-20816 – A local elevation‑of‑privilege vulnerability in Windows Installer caused by a time‑of‑check time‑of‑use (TOCTOU) race condition that could allow an authenticated attacker with low privileges to gain elevated (SYSTEM) rights on an affected system. It has been assigned a CVSS v3.1 base score of 7.8. There is no evidence of active exploitation or publicly released proof‑of‑concept code at this time.
CVE-2026-20820 - is an elevation-of-privilege vulnerability in the Windows Common Log File System (CLFS) Driver caused by a heap-based buffer overflow. A local, authenticated attacker with low privileges could exploit this flaw to gain SYSTEM-level access, potentially taking full control of the affected system. It has been assigned a CVSS v3.1 base score of 7.8 (High). There are no known public exploits or proof-of-concept code currently. Microsoft addressed the vulnerability in this month’s Patch Tuesday security updates.
CVE-2026-20860 - Windows WinSock driver elevation-of-privilege vulnerability caused by a type of confusion flaw. A local, authenticated attacker could gain SYSTEM-level access. It has a CVSS v3.1 score of 7.8 (High) and was patched in the 13th January 2026 Patch Tuesday updates.
Recent updates from other Vendors
Adobe released 11 security bulletins addressing security vulnerabilities across its products. These updates cover a total of 25 unique CVEs, including fixes for applications such as Dreamweaver, InDesign, Illustrator, InCopy, Bridge, multiple Substance 3D tools, and ColdFusion.
Cisco
Cisco’s January patch updates focus mainly on its Identity Services Engine (ISE) network access control solution. CVE-2026-20029 – a medium severity information disclose vulnerability. affects Cisco Identity Services Engine (ISE) and Cisco ISE Passive Identity Connector (ISE-PIC) regardless of device configuration. Cisco found no evidence of active exploitation, it did warn that a proof-of-concept (PoC) exploit is available online.
Additionally, Cisco also fixed several IOS XE vulnerabilities that could allow unauthenticated remote attackers to restart the Snort 3 Detection Engine, potentially causing a denial-of-service or exposing sensitive information from the Snort data stream. Cisco PSIRT confirmed that no public exploit code exists and there is no evidence of active exploitation in the wild.
Fortinet
Fortinet released security updates for multiple products this month, including fixes for two RCEs.
SAP
SAP released the 17 security updates for multiple products, including a fix for CVE-2026-0501 a 9.9/10 code injection flaw in SAP Solution Manager. There are no updates to previously released patch day security notes.
Veeam
In January 2026 Patch Tuesday Security Updates, Veeam released security updates to patch multiple security flaws in its Backup & Replication software, including CVE-2025 -59470 a critical RCE vulnerability carrying a CVSS score of 9.0
Ivanti
Ivanti’s official January Patch Tuesday blog did not address any specific vulnerabilities; it focused on general third-party patches, e.g., Microsoft, Adobe, Mozilla, etc.
Trend Micro
Trend Micro has resolved a critical vulnerability in its on‑premises Apex Central platform that exposed systems to remote arbitrary code execution with full SYSTEM‑level control.
Applying the latest security updates promptly is critical for staying protected against emerging threats. Timely patching reduces exposure to known vulnerabilities and helps prevent potential exploits.
