Skip to main content
News Directory 3
  • Home
  • Business
  • Entertainment
  • Health
  • News
  • Sports
  • Tech
  • World
Menu
  • Home
  • Business
  • Entertainment
  • Health
  • News
  • Sports
  • Tech
  • World
-Patch Tuesday, January 2026 Edition – Krebs on Security

-Patch Tuesday, January 2026 Edition – Krebs on Security

January 14, 2026 Lisa Park Tech

Microsoft today issued⁢ patches to plug at least ​113 security holes in it’s ​various Windows operating​ systems and supported software. Eight​ of the vulnerabilities earned Microsoft’s most-dire “critical” rating, and the company warns that ⁤attackers are already ‍exploiting one of⁤ the bugs fixed today.

january’s Microsoft ⁣zero-day flaw – CVE-2026-20805 – is brought to us by a flaw in the Desktop Window Manager (DWM), a key component of⁣ Windows ‌that organizes windows​ on a user’s screen. Kev Breen, senior⁣ director of cyber threat research at Immersive, said despite awarding CVE-2026-20805 a middling CVSS score of ‍5.5, Microsoft has confirmed⁣ its active exploitation in the⁢ wild, indicating that threat actors are⁤ already leveraging this flaw against organizations.

Breen said vulnerabilities of this kind are commonly used to undermine Address​ Space Layout Randomization (ASLR), a core​ operating system security control designed to protect ⁢against buffer overflows and⁤ other memory-manipulation ​exploits.

“By revealing where code resides in memory,this vulnerability can be ⁣chained with​ a separate code ‌execution flaw,transforming a complex and⁢ unreliable exploit into‌ a practical and repeatable attack,” Breen ‌said. “Microsoft has not disclosed⁢ which additional components may be involved in such an exploit chain,significantly limiting defenders’ ability to proactively threat hunt for related activity. Consequently, rapid patching currently ⁣remains the only effective mitigation.”

Chris Goettl, vice president of product management at ​ Ivanti, observed that CVE-2026-20805 ⁢affects all currently ‌supported and extended security update supported versions of the Windows OS. Goettl ‍said it would be‍ a mistake to dismiss the severity ​of this flaw based on its “Important” rating and‍ relatively⁢ low CVSS score.

“A risk-based prioritization methodology ⁣warrants ‌treating this ‍vulnerability as a higher severity‌ than⁢ the vendor rating or CVSS score assigned,” he ⁤said.

Among the critical flaws patched ‍this month⁤ are two Microsoft ⁢Office remote code execution⁤ bugs (CVE-2026-20952 and ‍ CVE-2026-20953) that can be triggered ‌just by viewing a booby-trapped message in the‌ Preview Pane.

Our⁣ October ⁣2025 Patch Tuesday “End of ​10” roundup noted that microsoft had removed a​ modem driver from all versions after it was discovered that hackers were‍ abusing a vulnerability in it to hack into systems. ⁢ Adam ​Barnett ‌ at Rapid7 said microsoft​ today removed another couple of modem drivers from Windows for a broadly similar reason: ⁣Microsoft is aware of functional exploit ⁤code for an elevation of privilege vulnerability in‌ a very similar modem driver, tracked as

Share this:

  • Share on Facebook (Opens in new window) Facebook
  • Share on X (Opens in new window) X

Related

Search:

News Directory 3

ByoDirectory is a comprehensive directory of businesses and services across the United States. Find what you need, when you need it.

Quick Links

  • Disclaimer
  • Terms and Conditions
  • About Us
  • Advertising Policy
  • Contact Us
  • Cookie Policy
  • Editorial Guidelines
  • Privacy Policy

Browse by State

  • Alabama
  • Alaska
  • Arizona
  • Arkansas
  • California
  • Colorado

Connect With Us

© 2026 News Directory 3. All rights reserved.

Privacy Policy Terms of Service