Microsoft's January 2026 Patch Tuesday: A Security Overview
Microsoft has released a critical update, addressing a total of 113 security vulnerabilities across its Windows operating systems and supported software. This Patch Tuesday edition includes eight critical-rated vulnerabilities, with one already being actively exploited by attackers. The zero-day flaw, CVE-2026-20805, is a significant concern, impacting the Desktop Window Manager (DWM) and potentially undermining Address Space Layout Randomization (ASLR).
Kev Breen, a senior cyber threat researcher, warns that this vulnerability can be chained with other code execution flaws, creating a practical and repeatable attack. This highlights the importance of rapid patching as the primary mitigation strategy. Chris Goettl, vice president of product management at Ivanti, emphasizes that the severity of CVE-2026-20805 should not be underestimated, despite its 'Important' rating and low CVSS score.
Two critical Microsoft Office remote code execution bugs, CVE-2026-20952 and CVE-2026-20953, can be triggered by viewing a booby-trapped message in the Preview Pane. Adam Barnett from Rapid7 draws attention to the removal of modem drivers from Windows, citing a similar vulnerability (CVE-2023-31096) that was exploited by hackers. He raises concerns about the potential for further elevation-to-SYSTEM vulnerabilities in legacy modem drivers.
Another critical issue, CVE-2026-21265, affects Windows Secure Boot, a security feature designed to protect against rootkits and bootkits. This vulnerability is linked to certificates set to expire in June and October 2026, and it's crucial to update the bootloader and BIOS accordingly to avoid unbootable systems. Mozilla has also released updates for Firefox and Firefox ESR, addressing 34 vulnerabilities, two of which are suspected to be actively exploited.
As always, the SANS Internet Storm Center provides a detailed breakdown of each patch's severity and urgency. Windows administrators are advised to monitor askwoody.com for any compatibility issues. Users are encouraged to share any installation problems in the comments section.