Home » Tech » -Patch Tuesday, January 2026 Edition – Krebs on Security

-Patch Tuesday, January 2026 Edition – Krebs on Security

by Lisa Park - Tech Editor

Microsoft today issued⁢ patches to plug at least ​113 security holes in it’s ​various Windows operating​ systems and supported software. Eight​ of the vulnerabilities earned Microsoft’s most-dire “critical” rating, and the company warns that ⁤attackers are already ‍exploiting one of⁤ the bugs fixed today.

january’s Microsoft ⁣zero-day flaw – CVE-2026-20805 – is brought to us by a flaw in the Desktop Window Manager (DWM), a key component of⁣ Windows ‌that organizes windows​ on a user’s screen. Kev Breen, senior⁣ director of cyber threat research at Immersive, said despite awarding CVE-2026-20805 a middling CVSS score of ‍5.5, Microsoft has confirmed⁣ its active exploitation in the⁢ wild, indicating that threat actors are⁤ already leveraging this flaw against organizations.

Breen said vulnerabilities of this kind are commonly used to undermine Address​ Space Layout Randomization (ASLR), a core​ operating system security control designed to protect ⁢against buffer overflows and⁤ other memory-manipulation ​exploits.

“By revealing where code resides in memory,this vulnerability can be ⁣chained with​ a separate code ‌execution flaw,transforming a complex and⁢ unreliable exploit into‌ a practical and repeatable attack,” Breen ‌said. “Microsoft has not disclosed⁢ which additional components may be involved in such an exploit chain,significantly limiting defenders’ ability to proactively threat hunt for related activity. Consequently, rapid patching currently ⁣remains the only effective mitigation.”

Chris Goettl, vice president of product management at ​ Ivanti, observed that CVE-2026-20805 ⁢affects all currently ‌supported and extended security update supported versions of the Windows OS. Goettl ‍said it would be‍ a mistake to dismiss the severity ​of this flaw based on its “Important” rating and‍ relatively⁢ low CVSS score.

“A risk-based prioritization methodology ⁣warrants ‌treating this ‍vulnerability as a higher severity‌ than⁢ the vendor rating or CVSS score assigned,” he ⁤said.

Among the critical flaws patched ‍this month⁤ are two Microsoft ⁢Office remote code execution⁤ bugs (CVE-2026-20952 and ‍ CVE-2026-20953) that can be triggered ‌just by viewing a booby-trapped message in the‌ Preview Pane.

Our⁣ October ⁣2025 Patch Tuesday “End of ​10” roundup noted that microsoft had removed a​ modem driver from all versions after it was discovered that hackers were‍ abusing a vulnerability in it to hack into systems. ⁢ Adam ​Barnett ‌ at Rapid7 said microsoft​ today removed another couple of modem drivers from Windows for a broadly similar reason: ⁣Microsoft is aware of functional exploit ⁤code for an elevation of privilege vulnerability in‌ a very similar modem driver, tracked as

You may also like

Leave a Comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.