Microsoft’s January 2026 Patch Tuesday release addresses 114 security vulnerabilities across Windows, Office, and other Microsoft products, including three zero-day vulnerabilities—one actively exploited in the wild and two publicly disclosed.

Vulnerability summary

CategoryCount
Total CVEs114
Critical8
Important98+
Moderate7
Zero-days3
Actively exploited1

Breakdown by type

Vulnerability TypeCountPercentage
Elevation of Privilege5750%
Remote Code Execution2219%
Information Disclosure2219%
Security Feature Bypass76%
Denial of Service44%
Spoofing22%

Zero-day vulnerabilities

CVE-2026-20805: Actively exploited

AttributeValue
CVSS Score5.5 (Medium)
ComponentWindows Desktop Window Manager (DWM)
TypeInformation Disclosure
Attack VectorLocal
Privileges RequiredLow
User InteractionNone
ExploitationActive

Technical details:

The vulnerability allows a local attacker with low privileges to read memory addresses associated with the remote ALPC port in Desktop Window Manager.

Why it matters despite medium severity:

While rated as “Information Disclosure,” the vulnerability is actively exploited to leak memory addresses, enabling attackers to bypass ASLR (Address Space Layout Randomization). ASLR bypass is a critical enabler for multi-stage attacks—once memory layout is known, exploiting other vulnerabilities becomes significantly easier.

CISA KEV: Added to the Known Exploited Vulnerabilities catalog with a February 3, 2026 remediation deadline for federal agencies.

CVE-2023-31096: Publicly disclosed (now removed)

AttributeValue
ComponentWindows Agere Soft Modem Driver
TypeElevation of Privilege
StatusDriver removed in this update

Microsoft previously warned about actively exploited vulnerabilities in a third-party Agere Modem driver shipped with Windows. This update removes the vulnerable drivers entirely rather than patching them.

CVE-2026-21265: Publicly disclosed

AttributeValue
CVSS Score6.4
ComponentWindows Secure Boot
TypeSecurity Feature Bypass
Privileges RequiredHigh
Attack VectorLocal

This vulnerability allows authenticated local attackers with high privileges to bypass security features by exploiting weaknesses in the certificate update mechanism.

Critical vulnerabilities

Microsoft Office RCE (CVE-2026-20952, CVE-2026-20953)

AttributeValue
CVSS Score8.4
Attack VectorNetwork
User InteractionRequired

Critical remote code execution flaws in Microsoft Office. Exploitation requires user interaction (opening malicious document).

Microsoft Word RCE (CVE-2026-20944)

AttributeValue
CVSS Score8.4
TypeOut-of-bounds read
AuthenticationNone required

Unauthenticated attackers can execute arbitrary code through malicious Word documents.

Windows VBS Enclave EoP (CVE-2026-20876)

AttributeValue
TypeHeap-based buffer overflow
ImpactElevation to VTL2 (Virtual Trust Level 2)
Current privilegesHigh (already elevated)

A local attacker who already has high privileges can exploit the enclave to elevate into Virtual Trust Level 2 (VTL2)—the highest trust level in Windows virtualization-based security.

Other critical flaws

ComponentType
Windows Hyper-VRemote Code Execution
Windows LDAPRemote Code Execution
Windows OLERemote Code Execution
.NET FrameworkRemote Code Execution

Products affected

ProductPatches
Microsoft Windows93
Microsoft Office16
Microsoft EdgeIncluded
Microsoft DefenderIncluded
Azure ServicesIncluded
Visual StudioIncluded

Known issues

Windows 11 boot failures

Microsoft is investigating reports that some Windows 11 devices fail to boot with “UNMOUNTABLE_BOOT_VOLUME” errors after installing January 2026 security updates.

Workaround:

  1. Boot into Windows Recovery Environment
  2. Select Troubleshoot → Advanced options → Startup Repair
  3. Run startup repair

Recommendation: Test updates on representative hardware before broad deployment.

Patching priorities

Tier 1: Immediate

CVEReason
CVE-2026-20805Actively exploited, enables ASLR bypass
CVE-2026-20952/53/44Critical Office RCE
All Critical severityMaximum impact

Tier 2: Urgent

CategoryReason
Elevation of Privilege (57)Privilege escalation enables lateral movement
Hyper-V flawsVirtualization escape risk
LDAP vulnerabilitiesDomain controller exposure

Tier 3: Standard cycle

CategoryReason
Information DisclosureLower immediate impact
Denial of ServiceAvailability vs. confidentiality
Moderate severityReduced exploitation likelihood

Deployment guidance

StepAction
1Review Microsoft Security Update Guide
2Test on representative systems (especially Windows 11)
3Monitor for boot issues during initial deployment
4Prioritize CVE-2026-20805 for immediate deployment
5Deploy critical Office patches
6Complete remaining updates within standard cycle

Detection and monitoring

For CVE-2026-20805 exploitation

IndicatorDetection Method
DWM memory access patternsEDR behavioral monitoring
ALPC port information leakageWindows event logging
Multi-stage attack chainsCorrelation of privilege escalation attempts

General patch compliance

  • Use Windows Update for Business or WSUS for deployment tracking
  • Monitor Windows Update logs for installation failures
  • Verify patch status via Get-HotFix or vulnerability scanners

CVE-2026-20805: A “frequent flyer” component

The Desktop Window Manager (DWM) has become a recurring source of vulnerabilities, earning security researchers’ attention as a high-value exploitation target.

DWM vulnerability history

YearCVE CountNotable Issues
20223Multiple EoP vulnerabilities
20235Core shim vulnerabilities
20246Memory corruption issues
20254Information disclosure, EoP
2026 (Jan)2CVE-2026-20805 + related flaw
Total20+Across 5 years

The DWM component’s privileged position—handling window composition across all processes—makes it attractive for exploit chain development. Security researcher Marcus Hutchins has described DWM as a “frequent flyer” in Windows vulnerability disclosures.

Exploitation in the wild

Microsoft and CISA confirm CVE-2026-20805 exploitation, with threat intelligence linking early exploitation to:

Threat actorCampaignUse case
QakBot operatorsBanking trojan distributionASLR bypass for subsequent RCE
Financially motivated actorsCredential theftPrivilege escalation chain

The vulnerability’s value lies not in direct impact but in enabling other attacks. By leaking memory addresses, attackers can reliably exploit vulnerabilities that would otherwise be mitigated by ASLR.

No workarounds available

Microsoft’s advisory explicitly states:

“There are no workarounds for this vulnerability. Apply the security update as soon as possible.”

This is notable because many vulnerabilities include registry tweaks, feature disabling, or configuration changes as interim mitigations. The lack of workarounds for CVE-2026-20805 means patching is the only remediation option.

Comparing to previous Patch Tuesdays

MonthTotal CVEsZero-daysCriticalNotes
January 202611438Current release
December 20257214Holiday reduction
November 20259226Average volume
October 202510349High activity
January 20259827Year-ago comparison

January 2026’s count of 114 CVEs represents a 16% increase over January 2025, continuing the trend of expanding patch volumes.

Federal deadline implications

CISA’s February 3, 2026 KEV deadline for CVE-2026-20805 creates urgency for federal agencies:

RequirementDeadlineScope
Patch deploymentFebruary 3, 2026All federal civilian executive branch agencies
Compliance reporting24 hours post-deadlineCISA dashboard
Waiver requestsBefore deadlineRequires CIO approval

Private sector organizations tracking KEV for their own patching priorities should treat this deadline as a signal of genuine risk.

Context

January 2026 Patch Tuesday sets the tone for the year with a substantial update addressing the full spectrum of vulnerability types. The actively exploited CVE-2026-20805 demonstrates that even “medium severity” information disclosure can enable sophisticated attack chains when it undermines security fundamentals like ASLR.

The DWM component’s history of vulnerabilities—20+ CVEs since 2022—suggests it warrants ongoing attention from both Microsoft’s security team and enterprise defenders. Organizations should consider DWM-related vulnerabilities as high priority regardless of stated severity.

The removal of vulnerable Agere Modem drivers (rather than patching) reflects Microsoft’s increasing willingness to deprecate legacy components that present ongoing security risk.

Organizations should prioritize the actively exploited zero-day and critical RCE vulnerabilities while monitoring for the reported Windows 11 boot issues that may affect deployment timelines. Given the lack of workarounds for CVE-2026-20805, patching is the only viable remediation.