Skip to main content
Security 2 min read 239 views

Microsoft January 2026 Patch Tuesday: 3 Zero-Days Among 114 Fixes

Microsoft's first Patch Tuesday of 2026 addresses 114 vulnerabilities including one actively exploited zero-day in Desktop Window Manager tracked as CVE-2026-20805.

TD

TechDrop Editorial

Share:

Microsoft's January 2026 Patch Tuesday addresses 114 security vulnerabilities, including one actively exploited zero-day and two publicly disclosed flaws. Eight vulnerabilities are rated Critical, with the majority being remote code execution issues.

Actively Exploited Zero-Day

The most urgent issue is CVE-2026-20805 (CVSS 5.5), an information disclosure vulnerability in Windows Desktop Window Manager (DWM). The flaw allows local attackers with basic user privileges to access sensitive system memory addresses.

This information can help attackers:

  • Bypass security protections like ASLR
  • Enable more sophisticated follow-up attacks
  • Gain information useful for privilege escalation

CISA has added CVE-2026-20805 to its Known Exploited Vulnerabilities (KEV) catalog, requiring federal agencies to patch by February 3, 2026.

Critical Vulnerabilities

Among the eight Critical-rated flaws:

  • CVE-2026-20854: Remote code execution in Windows LSASS (CVSS 7.5)
  • CVE-2026-20952 & CVE-2026-20953: Microsoft Office RCE flaws triggered via Preview Pane
  • CVE-2026-21265: Secure Boot certificate bypass (CVSS 6.4)

Secure Boot Certificate Warning

Microsoft warned that Secure Boot certificates used by most Windows devices will begin expiring in June 2026. Devices not updated in time may experience boot issues. Administrators should prioritize this update to avoid future problems.

Recommended Actions

  1. Prioritize patching CVE-2026-20805 due to active exploitation
  2. Test and deploy Critical updates for LSASS and Office
  3. Plan for Secure Boot certificate updates before June 2026
  4. Review and test all 114 patches in staging environments

Related Articles