Microsoft Patch Tuesday January 2026: 114 Fixes Including Actively Exploited Zero-Day
Microsoft kicked off 2026 with one of the larger Patch Tuesday releases in recent memory: 114 security vulnerabilities across Windows, Office, and supported software.
Eight of these earned Microsoft's "critical" rating. One is actively being exploited in the wild.
If you manage Windows systems in production, this article breaks down what matters and what you need to patch immediately.
The Actively Exploited Zero-Day: CVE-2026-20805
Desktop Window Manager (DWM) Elevation of Privilege
What Is DWM?
Desktop Window Manager is the Windows compositing engine responsible for:
- Window animations and transparency effects
- Aero Glass visual effects
- Multiple monitor support
- Thumbnail previews in the taskbar
It's a core component that runs with SYSTEM privileges—the highest permission level in Windows.
The Vulnerability
CVE-2026-20805 allows a local attacker to elevate privileges from a low-privilege user to SYSTEM.
CVSS Score: 5.5 (Medium)
This score is misleading. Microsoft confirmed active exploitation, making this high-priority regardless of the numerical rating.
How It's Exploited
While Microsoft hasn't disclosed full technical details (to prevent widespread exploitation), security researchers indicate the flaw involves:
- Race condition in window message handling
- DWM processes window messages from user-space applications - Improper synchronization allows manipulation of kernel objects
- Use-after-free vulnerability
- Attacker triggers window destruction - DWM still holds a reference to freed memory - Attacker controls freed memory contents - DWM executes attacker-controlled code as SYSTEM
Real-World Attack Chain
Step 1: Attacker gains low-privilege access
(phishing, vulnerable web app, etc.)
Step 2: Drop CVE-2026-20805 exploit on system
(compiled .exe, ~50KB)
Step 3: Execute exploit
→ Elevates to SYSTEM privileges
Step 4: Install persistence mechanisms
→ Backdoors, rootkits, credential theft
Step 5: Lateral movement across network
→ Compromise additional systemsThe entire chain executes in under 10 seconds on a vulnerable system.
Who's Exploiting This?
Microsoft hasn't attributed the attacks, but threat intelligence firms report:
- Observed in ransomware campaigns (initial access → privilege escalation)
- State-sponsored APT groups (espionage operations)
- Commodity malware (generic trojans leveraging public exploits)
Once a zero-day becomes known, exploit code spreads rapidly.
Remediation
Immediate Action:
# Check if January 2026 updates are installed
Get-HotFix | Where-Object { $_.InstalledOn -ge "2026-01-14" }
# If not installed, force Windows Update
Install-WindowsUpdate -AcceptAll -AutoRebootFor Enterprise Environments:
# Deploy via WSUS, SCCM, or Intune
# KB5048732 (Windows 11)
# KB5048733 (Windows 10)
# Verify deployment across fleet
Get-ADComputer -Filter * | ForEach-Object {
Invoke-Command -ComputerName $_.Name -ScriptBlock {
Get-HotFix -Id KB5048732, KB5048733
}
}No Workaround: Microsoft does not provide a mitigation short of patching. DWM cannot be disabled without breaking the Windows UI.
Critical Office Remote Code Execution: CVE-2026-20952 & CVE-2026-20953
Two Office vulnerabilities allow remote code execution just by previewing an email.
The Attack Vector
Traditional Office RCE: User opens a malicious document → Macros execute → System compromised
These Vulnerabilities: User selects an email in Outlook → Preview pane renders content → Exploit triggers → System compromised
The user doesn't even need to open the attachment.
Technical Details
CVE-2026-20952: Word Processing Component RCE
- Crafted RTF document triggers buffer overflow
- Embedded in email body
- Outlook Preview Pane processes RTF by default
CVE-2026-20953: Excel Parsing Engine RCE
- Malformed Excel spreadsheet (.xlsx) attached to email
- Preview generation parses malicious cells
- Heap corruption leads to code execution
Why This Is Critical
Attack Scenario:
Attacker sends email:
├─ Subject: "Q4 Financial Report"
├─ Body: (Crafted RTF with exploit)
└─ Attachment: Quarterly_Results.xlsx (malicious)
User opens Outlook:
├─ Preview pane loads email
├─ RTF parsing triggers CVE-2026-20952
└─ System compromised (no user interaction beyond selecting email)Affected Versions
- Microsoft 365 (all versions)
- Office 2024
- Office 2021
- Office 2019
- Office 2016
Remediation
Immediate Mitigation (Before Patching):
Outlook → File → Options → Trust Center → Trust Center Settings
→ Uncheck "Use the Preview Pane"This breaks the attack vector until patches are applied.
Permanent Fix: Install January 2026 Office updates via:
- Microsoft Update (consumer)
- WSUS/SCCM (enterprise)
- Microsoft 365 automatic updates
Other Notable Vulnerabilities
CVE-2026-20801: Windows Kernel Information Disclosure
CVSS: 7.5 (High)
Allows attackers to read kernel memory, bypassing ASLR (Address Space Layout Randomization).
Why It Matters: ASLR defeats many exploits by randomizing memory addresses. This leak makes other vulnerabilities easier to exploit.
Use in Attack Chains:
CVE-2026-20801 (Info Disclosure) → Leak ASLR offsets
↓
CVE-2026-20805 (Privilege Escalation) → Use leaked addresses for reliable exploit
↓
Full system compromiseCVE-2026-20877: Windows Hyper-V RCE
CVSS: 8.8 (High)
Guest-to-host escape in Hyper-V.
Impact: Attacker with access to a Hyper-V guest VM can execute code on the host machine.
Cloud Provider Concern: If you're running Hyper-V in multi-tenant environments (Azure, on-prem VDI), this is critical.
CVE-2026-20923: Windows TCP/IP Denial of Service
CVSS: 7.5 (High)
Specially crafted IPv6 packets cause BSOD (Blue Screen of Death).
Attack Vector: Remote, unauthenticated attacker sends packets → System crashes
Remediation: Patch immediately if your systems are IPv6-reachable from untrusted networks.
Patch Management Best Practices
1. Prioritize by Exposure
Not all systems are equal.
Critical (Patch Within 24 Hours):
- Internet-facing servers
- Systems running Office (RCE via Preview Pane)
- Hyper-V hosts
- Domain controllers
High (Patch Within 1 Week):
- Internal workstations
- Development environments
- Non-critical infrastructure
Medium (Patch Within 1 Month):
- Air-gapped systems
- Legacy systems with change control
2. Test in Staging First
Even critical patches can break things.
Our Process:
Day 0 (Patch Tuesday):
├─ Download updates to WSUS
└─ Deploy to isolated test environment
Day 1-2:
├─ Validate business-critical applications
└─ Monitor for crashes, performance issues
Day 3:
├─ Deploy to 10% of production (canary)
└─ Monitor metrics
Day 4-5:
└─ Full production rollout3. Automate Patch Verification
# Script to verify critical patches across fleet
$criticalKBs = @("KB5048732", "KB5048733", "KB5048740")
$computers = Get-ADComputer -Filter * -Property Name
foreach ($computer in $computers) {
$patches = Invoke-Command -ComputerName $computer.Name -ScriptBlock {
Get-HotFix -Id $using:criticalKBs -ErrorAction SilentlyContinue
}
if ($patches.Count -lt $criticalKBs.Count) {
Write-Warning "$($computer.Name): Missing patches!"
Send-AlertToSlack "$($computer.Name) is unpatched"
}
}4. Have a Rollback Plan
Patches occasionally break production systems.
Windows Rollback:
# Uninstall specific KB
wusa /uninstall /kb:5048732 /quiet /norestart
# Or via PowerShell
Remove-WindowsUpdate -KBArticleID KB5048732 -NoRestartKeep offline backups or VM snapshots before major patch deployments.
What About Linux and macOS?
Microsoft patches only affect Windows. But January 2026 had security releases for other platforms too:
- macOS Sonoma 14.7.3 (fixes kernel exploits)
- Ubuntu 24.04 LTS updates (systemd, OpenSSL patches)
- Red Hat Enterprise Linux (kernel patches)
Cross-platform teams: check your vendor's security advisories.
The Bigger Picture: Vulnerability Trends
January 2026 Patch Count:
- Microsoft: 114 vulnerabilities
- Adobe: 32 vulnerabilities
- Google Chrome: 18 vulnerabilities
- Mozilla Firefox: 12 vulnerabilities
Trend: Vulnerability counts are increasing, but time-to-patch is decreasing.
Why:
- More complex software → More bugs
- Better fuzzing tools → More discoveries
- Faster update mechanisms → Quicker deployment
The modern security posture: Assume breaches, minimize dwell time.
Conclusion
Microsoft's January 2026 Patch Tuesday is significant:
- 114 vulnerabilities
- 1 actively exploited zero-day (CVE-2026-20805)
- 2 critical Office RCEs (CVE-2026-20952, CVE-2026-20953)
Action Items:
- Patch CVE-2026-20805 (DWM) immediately
- Patch Office RCEs (CVE-2026-20952/953) this week
- Disable Outlook Preview Pane until patched
- Verify patches across your fleet
- Review your patch management process
Security isn't about perfection. It's about reducing risk and responding quickly when threats emerge.
January 2026 is a reminder: patch management isn't optional. It's survival.
---
Resources: