Microsoft January 2026 Patch Tuesday Fixes 114 Flaws, 3 Zero-Days Exploited

Jan 14, 2026

Microsoft has released its January 2026 Patch Tuesday security updates, addressing a total of 114 vulnerabilities across its products — including three zero-day vulnerabilities, one of which is actively exploited in the wild. This month’s release also includes eight critical flaws, several of which could allow remote code execution or elevation of privileges.

Key Highlights

  • Total vulnerabilities fixed: 114

  • Zero-day vulnerabilities: 3

    • 1 actively exploited

    • 2 publicly disclosed

  • Critical severity: 8

  • Major impacted components: Windows, Office, LSASS, Secure Boot, Modem drivers and more.

What You Need to Know

This Patch Tuesday marks Microsoft’s first security update release of 2026. The included fixes span a wide range of products — from Windows operating systems and system services to Microsoft Office applications and legacy drivers. With remote code execution (RCE) and elevation of privilege (EoP) bugs among the critical issues, organizations should prioritize deploying these updates promptly.

Zero-Day Vulnerabilities

The three zero-day flaws patched this month are especially noteworthy:

  1. CVE-2026-20805Desktop Window Manager (DWM)
    An Information Disclosure vulnerability that’s actively exploited in the wild. Attackers can read sensitive memory, potentially aiding further attacks.

  2. CVE-2026-21265Secure Boot certificate expiration bypass
    A security feature bypass due to expiring Secure Boot certificates if systems aren’t updated.

  3. CVE-2023-31096Agere Soft Modem driver EoP
    A third-party driver flaw Microsoft mitigates by removing the vulnerable drivers altogether in this update.

Vulnerabilities by Type

Vulnerability Type

Count

Elevation-of-Privilege

57

Remote Code Execution

22

Information Disclosure

22

Security Feature Bypass

3

Denial of Service

2

Spoofing

5

Categories based on Microsoft’s Patch Tuesday breakdown.

Critical Flaws to Prioritize

Several critical issues should be high priority for security teams:

  • RCE in Windows Local Security Authority Subsystem Service (LSASS) — could allow remote code execution on vulnerable systems.

  • Multiple RCEs in Microsoft Office — affecting Word and Excel, exploitable via crafted documents.

  • Elevation-of-Privilege flaws in core Windows components — including Graphics, VBS Enclave, and error reporting services.

Recommended Actions

  1. Deploy Windows and Office updates immediately — especially where critical and actively exploited flaws are concerned.

  2. Prioritize patching systems exposed to the internet and those with sensitive data.

  3. Monitor security advisories and IDS/IPS signatures tied to these updated CVEs.

  4. Verify that legacy systems (e.g., Secure Boot environments) receive the necessary certificate updates before expiration.

Patch Summary Table

CVE ID

Component

Severity

Impact

CVE-2026-20805

Desktop Window Manager

Important/Zero-Day

Information Disclosure

CVE-2026-21265

Secure Boot

Important/Zero-Day

Security Feature Bypass

CVE-2023-31096

Agere Soft Modem Driver

Important/Zero-Day

Elevation of Privilege

Note: Table truncated for brevity — see vendor advisory for complete CVE list.

Final Thoughts

The January 2026 Patch Tuesday release underscores the expanding attack surface — even as older hardware and certificates age out. With active exploitation already confirmed, swift patching and coordinated vulnerability management are essential to reduce risk. Administrators should roll out updates in a controlled yet expedited fashion to stay ahead of adversaries.

Disclaimer: ClearPhish maintains a strict policy of not participating in the theft, distribution, or handling of stolen data or files. The platform does not engage in exfiltration, downloading, hosting, or reposting any illegally obtained information. Any responsibility or legal inquiries regarding the data should be directed solely at the responsible cybercriminals or attackers, as ClearPhish is not involved in these activities. We encourage parties affected by any breach to seek resolution through legal channels directly with the attackers responsible for such incidents.

Latest News

Microsoft January 2026 Patch Tuesday Fixes 114 Flaws, 3 Zero-Days Exploited
Microsoft January 2026 Patch Tuesday Fixes 114 Flaws, 3 Zero-Days Exploited
Microsoft January 2026 Patch Tuesday Fixes 114 Flaws, 3 Zero-Days Exploited
Microsoft January 2026 Patch Tuesday Fixes 114 Flaws, 3 Zero-Days Exploited

Microsoft January 2026 Patch Tuesday Fixes 114 Flaws, 3 Zero-Days Exploited

Microsoft January 2026 Patch Tuesday Fixes 114 Flaws, 3 Zero-Days Exploited

Microsoft January 2026 Patch Tuesday Fixes 114 Flaws, 3 Zero-Days Exploited

Microsoft January 2026 Patch Tuesday Fixes 114 Flaws, 3 Zero-Days Exploited

Jan 14, 2026

VMware ESXi Zero-Day Exploits Likely Used a Year Before Disclosure, Researchers Warn
VMware ESXi Zero-Day Exploits Likely Used a Year Before Disclosure, Researchers Warn
VMware ESXi Zero-Day Exploits Likely Used a Year Before Disclosure, Researchers Warn
VMware ESXi Zero-Day Exploits Likely Used a Year Before Disclosure, Researchers Warn

VMware ESXi Zero-Day Exploits Likely Used a Year Before Disclosure, Researchers Warn

VMware ESXi Zero-Day Exploits Likely Used a Year Before Disclosure, Researchers Warn

VMware ESXi Zero-Day Exploits Likely Used a Year Before Disclosure, Researchers Warn

VMware ESXi Zero-Day Exploits Likely Used a Year Before Disclosure, Researchers Warn

Jan 12, 2026

Ni8mare Vulnerability: Max-Severity Flaw Lets Hackers Hijack n8n Automation Servers
Ni8mare Vulnerability: Max-Severity Flaw Lets Hackers Hijack n8n Automation Servers
Ni8mare Vulnerability: Max-Severity Flaw Lets Hackers Hijack n8n Automation Servers
Ni8mare Vulnerability: Max-Severity Flaw Lets Hackers Hijack n8n Automation Servers

Ni8mare Vulnerability: Max-Severity Flaw Lets Hackers Hijack n8n Automation Servers

Ni8mare Vulnerability: Max-Severity Flaw Lets Hackers Hijack n8n Automation Servers

Ni8mare Vulnerability: Max-Severity Flaw Lets Hackers Hijack n8n Automation Servers

Ni8mare Vulnerability: Max-Severity Flaw Lets Hackers Hijack n8n Automation Servers

Jan 8, 2026

European Space Agency Confirms Data Breach After Hacker Claims 200GB Data Theft
European Space Agency Confirms Data Breach After Hacker Claims 200GB Data Theft
European Space Agency Confirms Data Breach After Hacker Claims 200GB Data Theft
European Space Agency Confirms Data Breach After Hacker Claims 200GB Data Theft

European Space Agency Confirms Data Breach After Hacker Claims 200GB Data Theft

European Space Agency Confirms Data Breach After Hacker Claims 200GB Data Theft

European Space Agency Confirms Data Breach After Hacker Claims 200GB Data Theft

European Space Agency Confirms Data Breach After Hacker Claims 200GB Data Theft

Jan 6, 2026

Ledger Customers Impacted After Global-e Third-Party Data Breach
Ledger Customers Impacted After Global-e Third-Party Data Breach
Ledger Customers Impacted After Global-e Third-Party Data Breach
Ledger Customers Impacted After Global-e Third-Party Data Breach

Ledger Customers Impacted After Global-e Third-Party Data Breach

Ledger Customers Impacted After Global-e Third-Party Data Breach

Ledger Customers Impacted After Global-e Third-Party Data Breach

Ledger Customers Impacted After Global-e Third-Party Data Breach

Jan 6, 2026

ClickFix Malware Attack Uses Fake Windows Update Screens to Infect Systems
ClickFix Malware Attack Uses Fake Windows Update Screens to Infect Systems
ClickFix Malware Attack Uses Fake Windows Update Screens to Infect Systems
ClickFix Malware Attack Uses Fake Windows Update Screens to Infect Systems

ClickFix Malware Attack Uses Fake Windows Update Screens to Infect Systems

ClickFix Malware Attack Uses Fake Windows Update Screens to Infect Systems

ClickFix Malware Attack Uses Fake Windows Update Screens to Infect Systems

ClickFix Malware Attack Uses Fake Windows Update Screens to Infect Systems

Jan 6, 2026

Get updates in your inbox directly

You are now subscribed.

Get updates in your inbox directly

You are now subscribed.

Get updates in your

inbox directly

You are now subscribed.

Get updates in your inbox directly

You are now subscribed.

Enable your employees as first line of defense and expand your digital footprints without any fear.

Enable your employees as first line of defense and expand your digital footprints without any fear.

Enable your employees as first line of defense and expand your digital footprints without any fear.

Enable your employees as first line of defense and expand your digital footprints without any fear.