Microsoft Patch Tuesday January 2026


Microsoft’s January 2026 updates fix 114 vulnerabilities, with several remote code execution bugs rated critical across Office applications and Windows services such as LSASS.

This Patch Tuesday addresses critical remote code execution flaws and numerous elevation of privilege issues that could enable attackers to compromise systems.

Vulnerability TypeCount
Remote Code Execution22
Denial of Service2
Elevation of Privilege57
Information Disclosure22
Security Feature Bypass3
Spoofing5
Tampering3
Total114

The release includes 12 critical CVEs and over 90 important CVEs, primarily elevation-of-privilege flaws in kernel drivers and management services.

Zero-Day Vulnerabilities

CVE-2026-20805 involves Desktop Windows Manager flaws exposing information, rated high by researchers. CVE-2026-21265 targets digital media handling for privilege gains, common in chained attacks. CVE-2023-31096 appears as a backported or related fix in the cumulative updates.

CVE IDComponentTypeSeverityKey Notes
CVE-2026-20805Desktop Windows ManagerInformation DisclosureImportant (High per Check Point)Allows unauthorized access to sensitive data; patched January 13, 2026 ​
CVE-2026-21265Windows Digital MediaElevation of PrivilegeNot specifiedEnables local privilege escalation ​
CVE-2023-31096Unknown (legacy)Zero-day (contextual)Not specifiedIncluded in January 2026 updates despite earlier assignment 

Critical Vulnerabilities

Several critical remote code execution vulnerabilities stand out, including CVE-2026-20854 in Windows LSASS, stemming from a use-after-free error exploitable over networks.

The Office suite faces multiple threats: CVE-2026-20944 (Word out-of-bounds read), CVE-2026-20953 and CVE-2026-20952 (use-after-free), and CVE-2026-20955 and CVE-2026-20957 (Excel pointer issues and integer underflow).

google

Additional critical elevation-of-privilege bugs affect the Graphics Component (CVE-2026-20822) and the VBS Enclave (CVE-2026-20876), both of which exhibit use-after-free vulnerabilities locally.​

CVE IDAffected ComponentDescription SummarySeverity
CVE-2026-20854Windows LSASSUse-after-free RCECritical ​
CVE-2026-20944Microsoft WordOut-of-bounds read RCECritical ​
CVE-2026-20953Microsoft OfficeUse-after-free RCECritical ​

Windows components dominate the most critical-rated issues, with over 30 elevation-of-privilege flaws in services such as Management Services, SMB Server, and Win32k, often via race conditions or use-after-free. Information disclosure bugs in File Explorer and VBS round out notable risks.​

Deploy updates starting with internet-facing systems like WSUS (CVE-2026-20856) and SMB servers, then Office endpoints. Test in staging environments due to potential regressions in drivers like Cloud Files Mini Filter. Enable automatic updates for consumer devices and monitor CISA KEV for any rapid additions, as zero-days heighten urgency.

Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

googlenews



Source link