Microsoft Patch Tuesday – January 2026

Microsoft Patch Tuesday – January 2026


Microsoft’s January 13, 2026, Patch Tuesday release addresses 114 vulnerabilities, including one actively exploited zero-day in Desktop Window Manager, eight critical flaws, and three publicly disclosed zero-days.

This first update of the year targets Windows 10/11/Server builds via KBs like 5073455 (22631.6491) and 5074109 (26200.7623), also removing vulnerable Agere modem drivers and renewing expiring Secure Boot certificates. Cybersecurity teams should prioritize CVE-2026-20805 patching due to its CISA KEV addition and real-world exploitation.

Key numbers

  • 114 total CVEs
  • 3 zero-day vulnerabilities
  • 1 exploited in the wild
  • 2 publicly disclosed (Microsoft acknowledges public knowledge)

The release covers multiple Microsoft products, but Windows dominates the volume.

  • Windows accounted for the largest share of fixes (~93)
  • Office followed (~16)

Vulnerability Overview

🔥 January 2026 Patch Tuesday: Vulnerability Statistics

CategoryCount% of TotalKey ComponentsRisk Priority
Elevation of Privilege5750%Win32K, Graphics, VBS Enclave🔴 HIGH
Remote Code Execution2219%Office (Word/Excel), LSASS🟡 MEDIUM
Information Disclosure2219%DWM Core (CVE-2026-20805 exploited)🔴 CRITICAL
Other (SFB/DoS/Spoofing)1312%Secure Boot, Networking🟢 LOW
Total CVEs114100% 8 Critical + 1 Exploited Zero-Day

Zero-Days and Exploited Vulnerabilities

Three zero-days stand out, with only one confirmed in active attacks:

  • CVE-2026-20805 (DWM Info Disclosure, CVSS 5.5/Important): Low-priv local attacker leaks user-mode memory addresses via remote ALPC ports, bypassing ASLR for EoP/RCE chains; affects all Windows versions, added to CISA KEV January 13—federal patch deadline February 3.
  • CVE-2026-21265 (Secure Boot Cert Bypass, Important): Public disclosure fixes 2011 certs expiring mid-2026, preventing boot chain attacks.
  • CVE-2023-31096 (Agere Modem Driver EoP, Important): Removes agrsm.sys exploited for admin privileges.

No other January CVEs show in-the-wild activity per Microsoft/CISA reports.

Critical Vulnerabilities Breakdown

Critical Vulnerabilities Breakdown

All eight Critical CVEs from January 2026 Patch Tuesday demand urgent attention for their chain potential in ransomware or APTs. Details below with CVSS scores and affected products.

CVE IDComponentTypeCVSS/DetailsAffected Products
CVE-2026-20822GraphicsEoP (Use-after-free)7.8; Heap manipulation for kernel priv escWin10/11/Server
CVE-2026-20876VBS EnclaveEoP (Heap overflow)Critical; Breaks VBS for SYSTEM accessVBS-enabled Windows
CVE-2026-20944MS WordRCE7.8; Preview Pane exploitOffice/Word
CVE-2026-20952OfficeRCECritical; File/Preview triggerOffice suite
CVE-2026-20953OfficeRCECritical; Chains w/info disclosureOffice suite
CVE-2026-20955ExcelRCE7.8; Spreadsheet parsing flawExcel
CVE-2026-20957ExcelRCECritical; High-sev parsing vulnExcel
CVE-2026-20854LSASSRCECritical; Network/priv esc potentialWin Server/Client
Key Priorities:
  • Patch Order: CVE-2026-20822 → CVE-2026-20876 → Office RCE chain (20944/52/53)
  • EPSS Risk: Graphics/VBS flaws likely >0.9 probability within 30 days
  • Mitigations: Disable Office Preview Pane, restrict LSASS network access

Affected Systems and Changes

  • Windows 11: 25H2 (KB5074109/26200.7623), 24H2/23H2 (KB5073455/22631.6491).
  • Server: 2022 (KB5073457/20348.4648).
  • Other: Office, .NET, Visual Studio; drops Agere drivers (agrsm.sys); updates Secure Boot KEK/DB CAs.

Patching Priorities and Best Practices

  1. Deploy CVE-2026-20805 patches immediately on internet-facing/multi-user systems.
  2. Test VBS/Graphics for regressions; disable Office Preview Pane to block RCEs.
  3. Monitor NVD/EPSS (prioritize >0.9 scores), CISA KEV; use WSUS for enterprise rollout.
  4. No public PoCs beyond zero-days, but expect chains—scan for unpatched via Qualys/Nessus.

Comments

No comments yet. Why don’t you start the discussion?

    Leave a Reply

    This site uses Akismet to reduce spam. Learn how your comment data is processed.