{"id":15464,"date":"2026-01-14T01:51:52","date_gmt":"2026-01-14T01:51:52","guid":{"rendered":"https:\/\/newestek.com\/?p=15464"},"modified":"2026-01-14T01:51:52","modified_gmt":"2026-01-14T01:51:52","slug":"january-2026-microsoft-patch-tuesday-actively-exploited-zero-day-needs-attention","status":"publish","type":"post","link":"https:\/\/newestek.com\/?p=15464","title":{"rendered":"January 2026 Microsoft Patch Tuesday: Actively exploited zero day needs attention"},"content":{"rendered":"<div>\n<div id=\"remove_no_follow\">\n<div class=\"grid grid--cols-10@md grid--cols-8@lg article-column\">\n<div class=\"col-12 col-10@md col-6@lg col-start-3@lg\">\n<div class=\"article-column__content\">\n<section class=\"wp-block-bigbite-multi-title\">\n<div class=\"container\"><\/div>\n<\/section>\n<p>Eight critical vulnerabilities and an actively exploited zero day highlight <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/releaseNote\/2026-jan\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft\u2019s first Patch Tuesday announcements for 2026<\/a>.<\/p>\n<p>Most of the higher scoring vulnerabilities impact Office products, with two holes in SharePoint scoring an 8.8 on the CVSS scale.<\/p>\n<p>\u201cLast year\u2019s abuse of SharePoint by Chinese APTs to deploy ToolShell against organizations should serve as a warning that SharePoint- and Office-related vulnerabilities can quickly become popular with threat actors,\u201d noted <a href=\"https:\/\/www.linkedin.com\/in\/nicholasacarroll\/\" target=\"_blank\" rel=\"noreferrer noopener\">Nick Carroll<\/a>, cyber incident response manager at Nightwing.\u00a0<\/p>\n<p>The other vulnerability that scored a CVSS rating of 8.8 is <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2026-20868\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2026-20868<\/a> for the Windows Routing and Remote Access Service. This is a heap-based buffer overflow that allows an unauthorized attacker to execute code over a network. There\u2019s also a patch for a lower-scoring hole in this service (<a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2026-20843\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2026-20843<\/a>) that allows an elevation of privilege.<\/p>\n<h2 class=\"wp-block-heading\" id=\"desktop-windows-manager\">Desktop Windows Manager<\/h2>\n<p>Arguably, the vulnerability that should draw the attention of CSOs is <a href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2026-20805\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2026-20805<\/a>, because it\u2019s already being exploited. No public proof-of-concept code has been disclosed. It is a hole in Desktop Windows Manager (DWM) that allows a locally authenticated attacker to view information in memory to help them weaken system protections, and from that go deeper into IT systems that rely on DWM.<\/p>\n<p>Exploitation requires local access with low privileges and no user interaction, <a href=\"https:\/\/www.action1.com\/patch-tuesday\/patch-tuesday-january-2026\/\" target=\"_blank\" rel=\"noreferrer noopener\">note researchers at Action1<\/a>, making it feasible for attackers already present on a system.<\/p>\n<p>For organizations, this vulnerability increases the risk of successful multi-stage attacks, said <a href=\"https:\/\/www.linkedin.com\/in\/bicer\/\" target=\"_blank\" rel=\"noreferrer noopener\">Jack Bicer<\/a>, director of vulnerability research at Action1. Leaked memory details can be combined with other vulnerabilities to achieve privilege escalation or allow data theft, potentially leading to broader system compromise, regulatory exposure, and loss of trust.<\/p>\n<p>If the patch can\u2019t be applied immediately, he said, admins should limit local access, enforce least-privilege policies, and closely monitor systems for suspicious local activity.<\/p>\n<p>\u201cFrom a risk perspective, this issue materially increases the success rate of follow on exploits,\u201d warned Bicer, \u201cand should be viewed as an attack enabler rather than a standalone flaw.\u201d<\/p>\n<p><a href=\"https:\/\/www.tenable.com\/profile\/satnam-narang\" target=\"_blank\" rel=\"noreferrer noopener\">Satnam Narang<\/a>, senior staff research engineer at Tenable, called DWM a \u201cfrequent flyer\u201d on Patch Tuesday, with 20 CVEs patched in this library since 2022. But, he added, this is the first time researchers have seen an information disclosure bug in this component exploited in the wild.<\/p>\n<h2 class=\"wp-block-heading\" id=\"more-priorities\">More priorities<\/h2>\n<p>Executives should also prioritize rapid patching and risk reduction efforts this month around the Windows Local Security Authority Subsystem Service Remote Code Execution, Windows Graphics Component Elevation of Privilege, and Windows Virtualization Based Security Enclave Elevation of Privilege flaws, Bicer said, as these vulnerabilities directly enable full system or trust boundary compromise.<\/p>\n<p>Strategic focus should include accelerating patch deployment for critical and important flaws, reducing unnecessary local access, hardening authentication paths, and closely monitoring for abnormal privilege escalation behavior, Bicer said.<\/p>\n<p>\u201cThe Desktop Window Manager Information Disclosure should be addressed in parallel due to confirmed exploitation and its role in enabling chained attacks,\u201d he added.<\/p>\n<h2 class=\"wp-block-heading\" id=\"secure-boot-certificates\">Secure Boot certificates<\/h2>\n<p>Security experts also drew attention to Microsoft\u2019s warning that certain Secure Boot certificates issued in 2011 will expire in June or October unless updates included in the January patches are installed. Details are included in <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2026-21265\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2026-21265<\/a>. Secure Boot prevents malicious code from loading during the Windows startup process; systems not updated in time may become vulnerable to Secure Boot bypasses.<\/p>\n<p><a href=\"https:\/\/www.ivanti.com\/blog\/authors\/chris-goettl\" target=\"_blank\" rel=\"noreferrer noopener\">Chris Goettl<\/a>, vice-president of product management at Ivanti, called this \u201ca ticking time bomb for enterprise security that IT teams need to act on now before facing serious operational issues.\u201d<\/p>\n<p>Additionally, <a href=\"https:\/\/www.fortra.com\/profile\/tyler-reguly\" target=\"_blank\" rel=\"noreferrer noopener\">Tyler Reguly<\/a>, associate director of security R&amp;D at Fortra, noted that the Microsoft documentation of fixes for the expiring certificates isn\u2019t a single page, but contains a multitude of links \u2013 including an entire deployment playbook for IT professionals. \u201cWith less than half a year to prepare, it is time to ensure that environments and teams are prepared for this update,\u201d he said.<\/p>\n<h2 class=\"wp-block-heading\" id=\"more-likely-for-exploit\">More likely for exploit<\/h2>\n<p>Reguly also said one of the more interesting updates this month is a fix for a Windows Agere Soft Modem Driver elevation of privilege (CVE-2023-31096) issue. \u201cIt is not often that you see a CVE from three years ago show up, but Microsoft is finally cleaning up a problem that has been around for a while,\u201d he said. This driver ships with Microsoft Windows, but according to <a href=\"https:\/\/cschwarz1.github.io\/posts\/0x04\/\" target=\"_blank\" rel=\"noreferrer noopener\">a post about this vulnerability<\/a>, the driver has been end of life since 2016. The solution to this vulnerability is simply to remove the impacted drivers, <em>agrsm64.sys<\/em> and <em>agrsm.sys<\/em>, from systems.<\/p>\n<p><a href=\"https:\/\/www.linkedin.com\/in\/nicholasacarroll\" target=\"_blank\" rel=\"noreferrer noopener\">Nick Carroll<\/a> of Nightwing says security leaders should pay attention to patching vulnerabilities that Microsoft says are more likely to be exploited. These are:<\/p>\n<ul class=\"wp-block-list\">\n<li>an improper handling of permissions in Windows Error Reporting (<a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2026-20817\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2026-20817<\/a>) that could allow an authorized attacker to elevate privileges locally;<\/li>\n<li>\u00a0a buffer overflow in Windows Common Log File System Driver (<a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2026-20820\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2026-20820<\/a>) that could lead to an authorized attacker to elevate privileges locally;<\/li>\n<li>\u00a0a buffer overflow that could lead to remote code attacks in Windows NTFS (<a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2026-20840\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2026-20840<\/a>).<br \/>This is one of two NTFS issues flagged this month, noted<a href=\"https:\/\/www.linkedin.com\/in\/kevbreen\/\" target=\"_blank\" rel=\"noreferrer noopener\"> Kev Breen<\/a>, senior director of cyber threat research at Immersive. If technical details are made public, this could become an n-day vulnerability, he warned, creating a narrow window in which IT can apply patches before exploitation becomes widespread;<\/li>\n<li>\u00a0an issue with Windows Ancillary Function Driver for WinSock that can let an authorized attacker elevate privileges locally (<a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2026-20860\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2026-20860<\/a>);<\/li>\n<li>\u00a0an elevation of privilege issue in Desktop Windows Manager (<a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2026-20871\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2026-20871<\/a>);<\/li>\n<li>\u00a0a remote code execution vulnerability in Windows NTFS (<a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2026-20922\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2026-20922<\/a>).<\/li>\n<\/ul>\n<h2 class=\"wp-block-heading\" id=\"sap-updates\">SAP updates<\/h2>\n<p>Separately, SAP \u00a0released 19 new or updated security patches, including six\u00a0<em>HotNews<\/em>\u00a0Notes and four\u00a0<em>High Priority<\/em>\u00a0Notes. One of the most important is a critical SQL injection vulnerability in S\/4HANA\u00a0Private Cloud and On-Premise (Financials \u2013 General Ledger), tagged with a CVSS score of 9.9<em>.<\/em>\u00a0Exploitation can lead to full system compromise by low-privileged users. In addition, a code injection vulnerability, with a CVSS score of 9.1, was patched in S\/4HANA Private Cloud and On-Premise.<\/p>\n<h2 class=\"wp-block-heading\" id=\"oracle-and-mozilla\">Oracle and Mozilla<\/h2>\n<p>Researchers at Ivanti note that <a href=\"https:\/\/www.mozilla.org\/en-US\/security\/advisories\/\" target=\"_blank\" rel=\"noreferrer noopener\">Mozilla released a trio of updates for Firefox and Firefox ESR resolving a total of 34 CVEs<\/a>. All three updates have an Impact rating of High.\u00a0Two of the CVEs are suspected to have been exploited (CVE-2026-0891 and CVE-2026-0892). Both are resolved in Firefox 147 (<a href=\"https:\/\/www.mozilla.org\/en-US\/security\/advisories\/mfsa2026-01\/\" target=\"_blank\" rel=\"noreferrer noopener\">MFSA2026-01<\/a>) and CVE-2026-0891 is resolved in Firefox ESR 140.7 (<a href=\"https:\/\/www.mozilla.org\/en-US\/security\/advisories\/mfsa2026-03\/\" target=\"_blank\" rel=\"noreferrer noopener\">MFSA2026-03<\/a>).\u00a0<\/p>\n<p>Finally, researchers at Nightwing note that Oracle admins should be ready for the first of the company\u2019s four major patch days a year, which this year falls on Tuesday January 20. There should be a pre-release announcement on January 15\u00a0that will help organizations prepare for what\u2019s coming.<\/p>\n<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Eight critical vulnerabilities and an actively exploited zero day highlight Microsoft\u2019s first Patch Tuesday announcements for 2026. Most of the higher scoring vulnerabilities impact Office products, with two holes in SharePoint scoring an 8.8 on the CVSS scale. \u201cLast year\u2019s abuse of SharePoint by Chinese APTs to deploy ToolShell against organizations should serve as a warning that SharePoint- and Office-related vulnerabilities can quickly become popular&#8230; <\/p>\n<p class=\"more\"><a class=\"more-link\" href=\"https:\/\/newestek.com\/?p=15464\">Read More<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-15464","post","type-post","status-publish","format-standard","hentry","category-uncategorized","is-cat-link-borders-light is-cat-link-rounded"],"_links":{"self":[{"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/posts\/15464","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=15464"}],"version-history":[{"count":0,"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/posts\/15464\/revisions"}],"wp:attachment":[{"href":"https:\/\/newestek.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=15464"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=15464"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=15464"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}