Microsoft Patch Tuesday Analysis – January 2026

Executive Summary

On Tuesday, January 13, 2026, Microsoft released its monthly security patch, addressing 112 vulnerabilities in its products.

By severity:

  • Remote Code Execution - 22;
  • Elevation of Privilege - 55;
  • Tampering - 3;
  • Information Disclosure - 22;
  • Security Feature Bypass - 3;
  • Spoofing - 5;
  • Denial of Service - 2.

Exploited (Zero-Days) and Publicly Disclosed Vulnerabilities

Particular attention should be paid to the following 2 vulnerabilities. Their fixes are high-priority:

  • CVE-2026-20805 (CVSS 5.5; Information Disclosure) - Desktop Window Manager Information Disclosure Vulnerability (Information Disclosure). A vulnerability in the Desktop Window Manager (DWM) allows an authenticated local attacker to gain access to the contents of user mode memory. The exploitation leads to the disclosure of the ALPC (Advanced Local Procedure Call) port address.
  • CVE-2026-21265 (CVSS 6.4; Security Feature Bypass) - Secure Boot Certificate Expiration Security Feature Bypass Vulnerability (Security Feature Bypass). A vulnerability in the Secure Boot protection mechanism, related to the upcoming expiration of Microsoft Key Exchange (KEK) and Device Builder (DB) certificates stored in UEFI, allows an attacker with high privileges to bypass the secure boot process. The problem is caused by the updating mechanism of these certificates, which relies on components that may not work correctly, breaking the chain of trust. Successful exploitation allows an attacker to bypass the secure boot process.

General Overview and Trends

The first Patch Tuesday of 2026 sets a high bar for the year: Microsoft released fixes for 112 vulnerabilities, which exceeds the number of fixes released in December (57) and November (63). This release sets a high tempo for information security specialists. The key trends of this month:

  • Attacks on the graphics subsystem and boot process: Two critical vulnerabilities are in the spotlight. The vulnerability in the Desktop Window Manager (DWM) has already been exploited by attackers to read memory, which is often the first step in an exploit chain. In parallel, the publicly disclosed vulnerability in Secure Boot, related to the expiration of certificates, poses a threat to the fundamental trust in the OS boot process, requiring a careful UEFI update.
  • Elevation of Privilege (EoP): More than half of all fixes (55 out of 112) are related to Elevation of Privilege vulnerabilities. This continues the trend seen at the end of 2025. The vulnerabilities affect all key system components: from drivers and the Common Log File System to the Windows Management Services.
  • Critical RCE in corporate software: A significantative block of fixes (22 RCE) is aimed at addressing vulnerabilities in remote code execution in Microsoft SharePoint and Office. Given the popularity of SharePoint as a corporate data repository, the presence of multiple RCE makes these servers a priority target for attackers and shadow IT.
  • Attention to peripherals and device drivers: A large number of fixes affect device drivers, graphics components, and services for connected devices. Low-level errors in these components are often used to bypass security mechanisms and OS defenses.

Full List of Vulnerabilities

This table contains all the vulnerabilities that were fixed this month.

CVETitleTypeCVSSSeverityExploitedPublicly Disclosed
CVE-2026-21265Secure Boot Certificate Expiration Security Feature Bypass VulnerabilitySecurity Feature Bypass6.4Security Feature BypassNoYes
CVE-2026-20805Desktop Window Manager Information Disclosure VulnerabilityInformation Disclosure5.5Information DisclosureYesNo
CVE-2026-20868Windows Routing and Remote Access Service (RRAS) Remote Code Execution VulnerabilityRemote Code Execution8.8Remote Code ExecutionNoNo
CVE-2026-20947Microsoft SharePoint Server Remote Code Execution VulnerabilityRemote Code Execution8.8Remote Code ExecutionNoNo
CVE-2026-20963Microsoft SharePoint Remote Code Execution VulnerabilityRemote Code Execution8.8Remote Code ExecutionNoNo
CVE-2026-20944Microsoft Word Remote Code Execution VulnerabilityRemote Code Execution8.4Remote Code ExecutionNoNo
CVE-2026-20952Microsoft Office Remote Code Execution VulnerabilityRemote Code Execution8.4Remote Code ExecutionNoNo
CVE-2026-20953Microsoft Office Remote Code Execution VulnerabilityRemote Code Execution8.4Remote Code ExecutionNoNo
CVE-2026-20856Windows Server Update Service (WSUS) Remote Code Execution VulnerabilityRemote Code Execution8.1Remote Code ExecutionNoNo
CVE-2026-20931Windows Telephony Service Elevation of Privilege VulnerabilityElevation of Privilege8.0Elevation of PrivilegeNoNo
CVE-2026-20809Windows Kernel Memory Elevation of Privilege VulnerabilityElevation of Privilege7.8Elevation of PrivilegeNoNo
CVE-2026-20810Windows Ancillary Function Driver for WinSock Elevation of Privilege VulnerabilityElevation of Privilege7.8Elevation of PrivilegeNoNo
CVE-2026-20811Win32k Elevation of Privilege VulnerabilityElevation of Privilege7.8Elevation of PrivilegeNoNo
CVE-2026-20816Windows Installer Elevation of Privilege VulnerabilityElevation of Privilege7.8Elevation of PrivilegeNoNo
CVE-2026-20817Windows Error Reporting Service Elevation of Privilege VulnerabilityElevation of Privilege7.8Elevation of PrivilegeNoNo
CVE-2026-20820Windows Common Log File System Driver Elevation of Privilege VulnerabilityElevation of Privilege7.8Elevation of PrivilegeNoNo
CVE-2026-20822Windows Graphics Component Elevation of Privilege VulnerabilityElevation of Privilege7.8Elevation of PrivilegeNoNo
CVE-2026-20826Tablet Windows User Interface (TWINUI) Subsystem Information Disclosure VulnerabilityElevation of Privilege7.8Elevation of PrivilegeNoNo
CVE-2026-20831Windows Ancillary Function Driver for WinSock Elevation of Privilege VulnerabilityElevation of Privilege7.8Elevation of PrivilegeNoNo
CVE-2026-20832Windows Remote Procedure Call Interface Definition Language (IDL) Elevation of Privilege VulnerabilityElevation of Privilege7.8Elevation of PrivilegeNoNo
CVE-2026-20837Windows Media Remote Code Execution VulnerabilityRemote Code Execution7.8Remote Code ExecutionNoNo
CVE-2026-20840Windows NTFS Remote Code Execution VulnerabilityRemote Code Execution7.8Remote Code ExecutionNoNo
CVE-2026-20843Windows Routing and Remote Access Service (RRAS) Elevation of Privilege VulnerabilityElevation of Privilege7.8Elevation of PrivilegeNoNo
CVE-2026-20857Windows Cloud Files Mini Filter Driver Elevation of Privilege VulnerabilityElevation of Privilege7.8Elevation of PrivilegeNoNo
CVE-2026-20858Windows Management Services Elevation of Privilege VulnerabilityElevation of Privilege7.8Elevation of PrivilegeNoNo
CVE-2026-20859Windows Kernel-Mode Driver Elevation of Privilege VulnerabilityElevation of Privilege7.8Elevation of PrivilegeNoNo
CVE-2026-20860Windows Ancillary Function Driver for WinSock Elevation of Privilege VulnerabilityElevation of Privilege7.8Elevation of PrivilegeNoNo
CVE-2026-20861Windows Management Services Elevation of Privilege VulnerabilityElevation of Privilege7.8Elevation of PrivilegeNoNo
CVE-2026-20864Windows Connected Devices Platform Service Elevation of Privilege VulnerabilityElevation of Privilege7.8Elevation of PrivilegeNoNo
CVE-2026-20865Windows Management Services Elevation of Privilege VulnerabilityElevation of Privilege7.8Elevation of PrivilegeNoNo
CVE-2026-20866Windows Management Services Elevation of Privilege VulnerabilityElevation of Privilege7.8Elevation of PrivilegeNoNo
CVE-2026-20867Windows Management Services Elevation of Privilege VulnerabilityElevation of Privilege7.8Elevation of PrivilegeNoNo
CVE-2026-20870Windows Win32 Kernel Subsystem Elevation of Privilege VulnerabilityElevation of Privilege7.8Elevation of PrivilegeNoNo
CVE-2026-20871Desktop Windows Manager Elevation of Privilege VulnerabilityElevation of Privilege7.8Elevation of PrivilegeNoNo
CVE-2026-20873Windows Management Services Elevation of Privilege VulnerabilityElevation of Privilege7.8Elevation of PrivilegeNoNo
CVE-2026-20874Windows Management Services Elevation of Privilege VulnerabilityElevation of Privilege7.8Elevation of PrivilegeNoNo
CVE-2026-20877Windows Management Services Elevation of Privilege VulnerabilityElevation of Privilege7.8Elevation of PrivilegeNoNo
CVE-2026-20918Windows Management Services Elevation of Privilege VulnerabilityElevation of Privilege7.8Elevation of PrivilegeNoNo
CVE-2026-20920Win32k Elevation of Privilege VulnerabilityElevation of Privilege7.8Elevation of PrivilegeNoNo
CVE-2026-20922Windows NTFS Remote Code Execution VulnerabilityRemote Code Execution7.8Remote Code ExecutionNoNo
CVE-2026-20923Windows Management Services Elevation of Privilege VulnerabilityElevation of Privilege7.8Elevation of PrivilegeNoNo
CVE-2026-20924Windows Management Services Elevation of Privilege VulnerabilityElevation of Privilege7.8Elevation of PrivilegeNoNo
CVE-2026-20938Windows Virtualization-Based Security (VBS) Enclave Elevation of Privilege VulnerabilityElevation of Privilege7.8Elevation of PrivilegeNoNo
CVE-2026-20940Windows Cloud Files Mini Filter Driver Elevation of Privilege VulnerabilityElevation of Privilege7.8Elevation of PrivilegeNoNo
CVE-2026-20941Host Process for Windows Tasks Elevation of Privilege VulnerabilityElevation of Privilege7.8Elevation of PrivilegeNoNo
CVE-2026-20946Microsoft Excel Remote Code Execution VulnerabilityRemote Code Execution7.8Remote Code ExecutionNoNo
CVE-2026-20948Microsoft Word Remote Code Execution VulnerabilityRemote Code Execution7.8Remote Code ExecutionNoNo
CVE-2026-20949Microsoft Excel Security Feature Bypass VulnerabilitySecurity Feature Bypass7.8Security Feature BypassNoNo
CVE-2026-20950Microsoft Excel Remote Code Execution VulnerabilityRemote Code Execution7.8Remote Code ExecutionNoNo
CVE-2026-20951Microsoft SharePoint Server Remote Code Execution VulnerabilityRemote Code Execution7.8Remote Code ExecutionNoNo
CVE-2026-20955Microsoft Excel Remote Code Execution VulnerabilityRemote Code Execution7.8Remote Code ExecutionNoNo
CVE-2026-20956Microsoft Excel Remote Code Execution VulnerabilityRemote Code Execution7.8Remote Code ExecutionNoNo
CVE-2026-20957Microsoft Excel Remote Code Execution VulnerabilityRemote Code Execution7.8Remote Code ExecutionNoNo
CVE-2026-21224Azure Connected Machine Agent Elevation of Privilege VulnerabilityElevation of Privilege7.8Elevation of PrivilegeNoNo
CVE-2026-20804Windows Hello Tampering VulnerabilityTampering7.7TamperingNoNo
CVE-2026-20852Windows Hello Tampering VulnerabilityTampering7.7TamperingNoNo
CVE-2026-0386Windows Deployment Services Remote Code Execution VulnerabilityRemote Code Execution7.5Remote Code ExecutionNoNo
CVE-2026-20848Windows SMB Server Elevation of Privilege VulnerabilityElevation of Privilege7.5Elevation of PrivilegeNoNo
CVE-2026-20849Windows Kerberos Elevation of Privilege VulnerabilityElevation of Privilege7.5Elevation of PrivilegeNoNo
CVE-2026-20854Windows Local Security Authority Subsystem Service (LSASS) Remote Code Execution VulnerabilityRemote Code Execution7.5Remote Code ExecutionNoNo
CVE-2026-20875Windows Local Security Authority Subsystem Service (LSASS) Denial of Service VulnerabilityDenial of Service7.5Denial of ServiceNoNo
CVE-2026-20919Windows SMB Server Elevation of Privilege VulnerabilityElevation of Privilege7.5Elevation of PrivilegeNoNo
CVE-2026-20921Windows SMB Server Elevation of Privilege VulnerabilityElevation of Privilege7.5Elevation of PrivilegeNoNo
CVE-2026-20926Windows SMB Server Elevation of Privilege VulnerabilityElevation of Privilege7.5Elevation of PrivilegeNoNo
CVE-2026-20929Windows HTTP.sys Elevation of Privilege VulnerabilityElevation of Privilege7.5Elevation of PrivilegeNoNo
CVE-2026-20934Windows SMB Server Elevation of Privilege VulnerabilityElevation of Privilege7.5Elevation of PrivilegeNoNo
CVE-2026-20965Windows Admin Center Elevation of Privilege VulnerabilityElevation of Privilege7.5Elevation of PrivilegeNoNo
CVE-2026-21226Azure Core shared client library for Python Remote Code Execution VulnerabilityRemote Code Execution7.5Remote Code ExecutionNoNo
CVE-2026-20844Windows Clipboard Server Elevation of Privilege VulnerabilityElevation of Privilege7.4Elevation of PrivilegeNoNo
CVE-2026-20853Windows WalletService Elevation of Privilege VulnerabilityElevation of Privilege7.4Elevation of PrivilegeNoNo
CVE-2026-20803Microsoft SQL Server Elevation of Privilege VulnerabilityElevation of Privilege7.2Elevation of PrivilegeNoNo
CVE-2026-20808Windows File Explorer Elevation of Privilege VulnerabilityElevation of Privilege7.0Elevation of PrivilegeNoNo
CVE-2026-20814DirectX Graphics Kernel Elevation of Privilege VulnerabilityElevation of Privilege7.0Elevation of PrivilegeNoNo
CVE-2026-20815Capability Access Management Service (camsvc) Elevation of Privilege VulnerabilityElevation of Privilege7.0Elevation of PrivilegeNoNo
CVE-2026-20830Capability Access Management Service (camsvc) Elevation of Privilege VulnerabilityElevation of Privilege7.0Elevation of PrivilegeNoNo
CVE-2026-20836DirectX Graphics Kernel Elevation of Privilege VulnerabilityElevation of Privilege7.0Elevation of PrivilegeNoNo
CVE-2026-20842Microsoft DWM Core Library Elevation of Privilege VulnerabilityElevation of Privilege7.0Elevation of PrivilegeNoNo
CVE-2026-20863Win32k Elevation of Privilege VulnerabilityElevation of Privilege7.0Elevation of PrivilegeNoNo
CVE-2026-20869Windows Local Session Manager (LSM) Elevation of Privilege VulnerabilityElevation of Privilege7.0Elevation of PrivilegeNoNo
CVE-2026-20943Microsoft Office Click-To-Run Elevation of Privilege VulnerabilityRemote Code Execution7.0Remote Code ExecutionNoNo
CVE-2026-21219Inbox COM Objects (Global Memory) Remote Code Execution VulnerabilityRemote Code Execution7.0Remote Code ExecutionNoNo
CVE-2026-21221Capability Access Management Service (camsvc) Elevation of Privilege VulnerabilityElevation of Privilege7.0Elevation of PrivilegeNoNo
CVE-2026-20876Windows Virtualization-Based Security (VBS) Enclave Elevation of Privilege VulnerabilityElevation of Privilege6.7Elevation of PrivilegeNoNo
CVE-2026-20812LDAP Tampering VulnerabilityTampering6.5TamperingNoNo
CVE-2026-20847Microsoft Windows File Explorer Spoofing VulnerabilitySpoofing6.5SpoofingNoNo
CVE-2026-20872NTLM Hash Disclosure Spoofing VulnerabilitySpoofing6.5SpoofingNoNo
CVE-2026-20925NTLM Hash Disclosure Spoofing VulnerabilitySpoofing6.5SpoofingNoNo
CVE-2026-20818Windows Kernel Information Disclosure VulnerabilityInformation Disclosure6.2Information DisclosureNoNo
CVE-2026-20821Remote Procedure Call Information Disclosure VulnerabilityInformation Disclosure6.2Information DisclosureNoNo
CVE-2026-20851Capability Access Management Service (camsvc) Information Disclosure VulnerabilityInformation Disclosure6.2Information DisclosureNoNo
CVE-2026-20935Windows Virtualization-Based Security (VBS) Information Disclosure VulnerabilityInformation Disclosure6.2Information DisclosureNoNo
CVE-2026-20819Windows Virtualization-Based Security (VBS) Information Disclosure VulnerabilityInformation Disclosure5.5Information DisclosureNoNo
CVE-2026-20823Windows File Explorer Information Disclosure VulnerabilityInformation Disclosure5.5Information DisclosureNoNo
CVE-2026-20824Windows Remote Assistance Security Feature Bypass VulnerabilitySecurity Feature Bypass5.5Security Feature BypassNoNo
CVE-2026-20827Tablet Windows User Interface (TWINUI) Subsystem Information Disclosure VulnerabilityInformation Disclosure5.5Information DisclosureNoNo
CVE-2026-20829TPM Trustlet Information Disclosure VulnerabilityInformation Disclosure5.5Information DisclosureNoNo
CVE-2026-20833Windows Kerberos Information Disclosure VulnerabilityInformation Disclosure5.5Information DisclosureNoNo
CVE-2026-20835Capability Access Management Service (camsvc) Information Disclosure VulnerabilityInformation Disclosure5.5Information DisclosureNoNo
CVE-2026-20838Windows Kernel Information Disclosure VulnerabilityInformation Disclosure5.5Information DisclosureNoNo
CVE-2026-20839Windows Client-Side Caching (CSC) Service Information Disclosure VulnerabilityInformation Disclosure5.5Information DisclosureNoNo
CVE-2026-20862Windows Management Services Information Disclosure VulnerabilityInformation Disclosure5.5Information DisclosureNoNo
CVE-2026-20932Windows File Explorer Information Disclosure VulnerabilityInformation Disclosure5.5Information DisclosureNoNo
CVE-2026-20937Windows File Explorer Information Disclosure VulnerabilityInformation Disclosure5.5Information DisclosureNoNo
CVE-2026-20939Windows File Explorer Information Disclosure VulnerabilityInformation Disclosure5.5Information DisclosureNoNo
CVE-2026-20958Microsoft SharePoint Information Disclosure VulnerabilityInformation Disclosure5.4Information DisclosureNoNo
CVE-2026-20927Windows SMB Server Denial of Service VulnerabilityDenial of Service5.3Denial of ServiceNoNo
CVE-2026-20828Windows rndismp6.sys Information Disclosure VulnerabilityInformation Disclosure4.6Information DisclosureNoNo
CVE-2026-20834Windows Spoofing VulnerabilitySpoofing4.6SpoofingNoNo
CVE-2026-20959Microsoft SharePoint Server Spoofing VulnerabilitySpoofing4.6SpoofingNoNo
CVE-2026-20825Windows Hyper-V Information Disclosure VulnerabilityInformation Disclosure4.4Information DisclosureNoNo
CVE-2026-20962Dynamic Root of Trust for Measurement (DRTM) Information Disclosure VulnerabilityInformation Disclosure4.4Information DisclosureNoNo
CVE-2026-20936Windows NDIS Information Disclosure VulnerabilityInformation Disclosure4.3Information DisclosureNoNo

Retrospective Analysis of Vulnerabilities

  • CVE-2025-62454 — Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability (Elevation of Privilege). The vulnerability is a heap-based buffer overflow in the cldflt.sys driver, which is responsible for working with cloud files (for example, OneDrive). The problem occurs in the memcpy function due to incorrect validation of input data when processing a special control code (FSCTL 0x903bc) related to HSM. Successful exploitation allows a local attacker to execute arbitrary code in the context of the SYSTEM and elevate privileges to the SYSTEM level. Available PoC demonstrates the ability to initiate a system crash (BSOD) through attribute manipulation. The vulnerability was fixed in December 2025.
  • CVE-2025-62470 - Windows Common Log File System Driver Elevation of Privilege Vulnerability (Elevation of Privilege). The vulnerability is a heap-based buffer overflow in the CLFS.sys driver, which allows a local attacker to elevate privileges to the SYSTEM level. The error occurs in the ClfsEncodeBlock function due to insufficient validation of the TotalSectorCount and ValidSectorCount fields in the CLFS_LOG_BLOCK_HEADER structure. Available PoC demonstrates the ability to initiate a system crash (BSOD) through a specially crafted IOCTL request, which confirms non-secure memory access. The vulnerability was fixed in December 2025.
  • CVE-2025-64669 — Windows Admin Center Elevation of Privilege Vulnerability (Elevation of Privilege). The vulnerability is a local elevation of privileges, discovered by Cymulate Research Lab. The root cause is insecure access rights to the C:\ProgramData\WindowsAdminCenter directory, which is accessible for writing by a standard user. This allows an attacker to elevate privileges to the SYSTEM level using a DLL hijacking attack during the update process (Updater DLL Hijacking) or using PowerShell scripts during the uninstallation of extensions. Detailed technical analysis of the exploitation methods is available. The vulnerability was fixed in December 2025.

Conclusion

The January 2026 patch is a significant and critical update, and IT departments should prioritize the installation of the patches for the following vulnerabilities:

  • Actively exploit CVE-2026-20805 (DWM, Information Disclosure), to prevent the use of this vulnerability in combination with other exploits.
  • Publicly disclose CVE-2026-21265 (Secure Boot, Security Feature Bypass), as the expiration of certificates creates a window of opportunity for attackers to bypass the Secure Boot security feature.
  • Critical RCE vulnerabilities in SharePoint (CVE-2026-20947, CVE-2026-20963) and Office pose a maximum threat to the integrity of corporate data.

Additionally, attention should be drawn to the Retrospective Analysis of Vulnerabilities section. Publication of PoC exploits for vulnerabilities in the Cloud Files and Common Log File System drivers, as well as for Windows Admin Center, make them trivial for exploitation if the December patches are not installed. If the December patches have not been installed, the risk of a system compromise through these vectors becomes extremely high.

Paranoid Security Analysis of Microsoft Patch Tuesday updates - November 2025 November 11
MS Patch Tuesday Analysis of Microsoft Patch Tuesday updates - November 2025
Paranoid Security Analysis of Microsoft Patch Tuesday updates - October 2025 October 14
MS Patch Tuesday Analysis of Microsoft Patch Tuesday updates - October 2025
Paranoid Security How malicious actors use signed drivers to capture infrastructure. BYOVD technique selection. October 10
Vulnerability Research How malicious actors use signed drivers to capture infrastructure. BYOVD technique selection.