Inhalte springen

Microsoft stacks up 113 CVEs for January Patch Tuesday

Angela Gunn

Microsoft on Tuesday released 113 patches affecting 11 product families. Eight of the addressed issues are considered by Microsoft to be of Critical severity, including five from the Office-365 product family. Eight have a CVSS base score of 8.0 or higher. One is known to be under active exploit in the wild, and one other is publicly disclosed. 

At patch time, eight CVEs are judged more likely to be exploited in the next 30 days by the company’s estimation, in addition to the one already detected to be so. Various of this month’s issues are amenable to direct detection by Sophos protections, and we include information on those in a table below. 

The release also includes advisory information on one Edge patch released last week, as well as two MITRE-issued CVEs affecting software modems from two companies whose drivers are present in Windows. (We are not including those patches in the tallies for Windows this month, but we do indicate which platforms are affected in Appendix E, along with information on which server versions are affected by each of the 88 Windows CVEs addressed this month.) There is also an update to the Servicing Stack this month.

We are as always including at the end of this post appendices listing all Microsoft’s patches sorted by severity (Appendix A), by predicted exploitability timeline and CVSS Base score (Appendix B), and by product family (Appendix C). Appendix E provides a breakout of the patches affecting the various Windows Server platforms.

By the numbers

  • Total CVEs: 113
  • Publicly disclosed: 1
  • Exploit detected: 1
  • Severity
    • Critical: 8
    • Important: 105
  • Impact:
    • Denial of Service: 2
    • Elevation of Privilege: 56
    • Information Disclosure: 22
    • Remote Code Execution: 22
    • Security Feature Bypass: 3
    • Spoofing: 5
    • Tampering: 3
  • CVSS base score 9.0 or greater: 0
  • CVSS base score 8.0 or greater: 8

 

january-patch-tuesday-fig01.png

Figure 1: Not only are all seven impact categories represented in the very first Patch Tuesday of 2026, Elevation of Privilege issues continue to considerably outpace Remote Control Execution – a change we saw taking place last year and one that increasingly seems to be the new normal

Products

As is our custom for this list, CVEs that apply to more than one product family are counted once for each family they affect. We note, by the way, that CVE names don’t always reflect affected product families closely. In particular, some CVEs names in the Office family may mention products that don’t appear in the list of products affected by the CVE, and vice versa. 

 

january-patch-tuesday-fig02.png

Figure 2: Windows accounts for over four-fifths of all January patches, though Office has a higher percentage of Critical-severity bugs this month. Of the rest, Windows Admin Center is counted here as neither Windows not Azure, but administrators of either should look into the Important-severity issue associated with that web tool 

Notable January updates

In addition to the issues discussed above, several specific items merit attention. 

CVE-2026-20944 -- Microsoft Word Remote Code Execution Vulnerability
CVE-2026-20952 – Microsoft Office Remote Code Execution Vulnerability
CVE-2026-20953 -- Microsoft Office Remote Code Execution Vulnerability

Office accounts for a disproportionate share of Critical-severity bugs this month, and the two Office issues above may be the worst of the lot. Microsoft’s own worst-case scenario for those two CVEs is troubling; an attacker could potentially gain remote code execution on the targeted user’s machine simply by sending them a link in an email – and the targeted user need not open, read, or click on the link. The Word CVE, meanwhile, has Preview Pane as a vector.

CVE-2023-31096 -- MITRE: CVE-2023-31096 Windows Agere Soft Modem Driver Elevation of Privilege Vulnerability
CVE-2024-55414 -- Windows Motorola Soft Modem Driver Elevation of Privilege Vulnerability
CVE-2026-0386 -- Windows Deployment Services Remote Code Execution Vulnerability
CVE-2026-21265 -- Secure Boot Certificate Expiration Security Feature Bypass Vulnerability

The new year is a good time for tidying up, and two advisories and two CVEs in this month’s set indicate that housekeeping may be afoot in Redmond. The two MITRE-issued CVEs cover third-party modem drivers. Microsoft is issuing an advisory simply to say that they’re both been removed from the cumulative update as of this month. Likewise, the functionality touched by CVE-2026-0386 is nearing its end of life; this concerns the Windows Deployment Services (WDS) hands-free deployment feature. Microsoft will be withdrawing that functionality in the near future – it's already legacy technology, superceded by the likes of Windows Autopilot, Microsoft InTune, and various cloud-based provisioning workflows that leverage Azure. At this point, administrators still using WDS are advised to be aware of their usage and lock it down as per instructions. Finally, the issue covered in CVE-2026-21265 involves certain upcoming certificate expirations affecting Secure Boot, and the firmware that protects updates to those certificates. Based on the provided information the vulnerability would be fairly hard to hit, but Microsoft’s attempting to get out ahead of this – and if they’re talking in January about a problem that won’t land until June (at the earliest), one is well-advised to pay attention and do the reading.

CVE-2026-20949 -- Microsoft Excel Security Feature Bypass Vulnerability

On March 25, 1992, Microsoft released Excel 4.0. Thirty-three years and ten months later, Microsoft is releasing a patch for a bug that allows local bypass of the security setting that disables XL4 (Excel 4.0) macros. Backward compatibility is widely understood to be a blessing and a curse for Microsoft, but some of this specific code is very likely older than many of the defenders who worked to patch it, if not the (anonymous) finder who dug it out. Wild.


Sophos protections

CVE

Sophos Intercept X/Endpoint IPS

Sophos XGS Firewall

CVE-2023-31096Exp/2331096-AExp/2331096-A
CVE-2026-20805Exp/2620805-AExp/2620805-A
CVE-2026-20816Exp/2620816-AExp/2620816-A
CVE-2026-20817Exp/2620817-AExp/2620817-A
CVE-2026-20820Exp/2620820-AExp/2620820-A
CVE-2026-20843Exp/2620843-AExp/2620843-A
CVE-2026-20860Exp/2620860-AExp/2620860-A

 

As you can every month, if you don’t want to wait for your system to pull down Microsoft’s updates itself, you can download them manually from the Windows Update Catalog website. Run the winver.exe tool to determine which build of Windows you’re running, then download the Cumulative Update package for your specific system’s architecture and build number.

Appendix A: Vulnerability Impact and Severity

This is a list of January patches sorted by impact, then sub-sorted by severity. Each list is further arranged by CVE. 

Elevation of Privilege (56 CVEs)

Critical severity
CVE-2026-20822Windows Graphics Component Elevation of Privilege Vulnerability
CVE-2026-20876Windows Virtualization-Based Security (VBS) Enclave Elevation of Privilege Vulnerability
Important severity
CVE-2026-20803Microsoft SQL Server Elevation of Privilege Vulnerability
CVE-2026-20808Windows File Explorer Elevation of Privilege Vulnerability
CVE-2026-20809Windows Kernel Memory Elevation of Priviledge Vulnerability
CVE-2026-20810Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
CVE-2026-20811Win32k Elevation of Privilege Vulnerability
CVE-2026-20814DirectX Graphics Kernel Elevation of Privilege Vulnerability
CVE-2026-20815Capability Access Management Service (camsvc) Elevation of Privilege Vulnerability
CVE-2026-20816Windows Installer Elevation of Privilege Vulnerability
CVE-2026-20817Windows Error Reporting Service Elevation of Privilege Vulnerability
CVE-2026-20820Windows Common Log File System Driver Elevation of Privilege Vulnerability
CVE-2026-20826Tablet Windows User Interface (TWINUI) Subsystem Information Disclosure Vulnerability
CVE-2026-20830Capability Access Management Service (camsvc) Elevation of Privilege Vulnerability
CVE-2026-20831Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
CVE-2026-20832Windows Remote Procedure Call Interface Definition Language (IDL) Elevation of Privilege Vulnerability
CVE-2026-20836DirectX Graphics Kernel Elevation of Privilege Vulnerability
CVE-2026-20842Microsoft DWM Core Library Elevation of Privilege Vulnerability
CVE-2026-20843Windows Routing and Remote Access Service (RRAS) Elevation of Privilege Vulnerability
CVE-2026-20844Windows Clipboard Server Elevation of Privilege Vulnerability
CVE-2026-20848Windows SMB Server Elevation of Privilege Vulnerability
CVE-2026-20849Windows Kerberos Elevation of Privilege Vulnerability
CVE-2026-20853Windows WalletService Elevation of Privilege Vulnerability
CVE-2026-20857Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability
CVE-2026-20858Windows Management Services Elevation of Privilege Vulnerability
CVE-2026-20859Windows Kernel-Mode Driver Elevation of Privilege Vulnerability
CVE-2026-20860Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
CVE-2026-20861Windows Management Services Elevation of Privilege Vulnerability
CVE-2026-20863Win32k Elevation of Privilege Vulnerability
CVE-2026-20864Windows Connected Devices Platform Service Elevation of Privilege Vulnerability
CVE-2026-20865Windows Management Services Elevation of Privilege Vulnerability
CVE-2026-20866Windows Management Services Elevation of Privilege Vulnerability
CVE-2026-20867Windows Management Services Elevation of Privilege Vulnerability
CVE-2026-20869Windows Local Session Manager (LSM) Elevation of Privilege Vulnerability
CVE-2026-20870Windows Win32 Kernel Subsystem Elevation of Privilege Vulnerability
CVE-2026-20871Desktop Windows Manager Elevation of Privilege Vulnerability
CVE-2026-20873Windows Management Services Elevation of Privilege Vulnerability
CVE-2026-20874Windows Management Services Elevation of Privilege Vulnerability
CVE-2026-20877Windows Management Services Elevation of Privilege Vulnerability
CVE-2026-20918Windows Management Services Elevation of Privilege Vulnerability
CVE-2026-20919Windows SMB Server Elevation of Privilege Vulnerability
CVE-2026-20920Win32k Elevation of Privilege Vulnerability
CVE-2026-20921Windows SMB Server Elevation of Privilege Vulnerability
CVE-2026-20923Windows Management Services Elevation of Privilege Vulnerability
CVE-2026-20924Windows Management Services Elevation of Privilege Vulnerability
CVE-2026-20926Windows SMB Server Elevation of Privilege Vulnerability
CVE-2026-20929Windows HTTP.sys Elevation of Privilege Vulnerability
CVE-2026-20931Windows Telephony Service Elevation of Privilege Vulnerability
CVE-2026-20934Windows SMB Server Elevation of Privilege Vulnerability
CVE-2026-20938Windows Virtualization-Based Security (VBS) Enclave Elevation of Privilege Vulnerability
CVE-2026-20940Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability
CVE-2026-20941Host Process for Windows Tasks Elevation of Privilege Vulnerability
CVE-2026-20943Microsoft Office Click-To-Run Elevation of Privilege Vulnerability
CVE-2026-20965Windows Admin Center Elevation of Privilege Vulnerability
CVE-2026-21221Capability Access Management Service (camsvc) Elevation of Privilege Vulnerability
CVE-2026-21224Azure Connected Machine Agent Elevation of Privilege Vulnerability

 

Information Disclosure (22 CVEs)

Important severity
CVE-2026-20805Desktop Windows Manager Information Disclosure Vulnerability
CVE-2026-20818Windows Kernel Information Disclosure Vulnerability
CVE-2026-20819Windows Virtualization-Based Security (VBS) Information Disclosure Vulnerability
CVE-2026-20821Remote Procedure Call Information Disclosure Vulnerability
CVE-2026-20823Windows File Explorer Information Disclosure Vulnerability
CVE-2026-20825Windows Hyper-V Information Disclosure Vulnerability
CVE-2026-20827Tablet Windows User Interface (TWINUI) Subsystem Information Disclosure Vulnerability
CVE-2026-20828Windows rndismp6.sys Information Disclosure Vulnerability
CVE-2026-20829TPM Trustlet Information Disclosure Vulnerability
CVE-2026-20833Windows Kerberos Information Disclosure Vulnerability
CVE-2026-20835Capability Access Management Service (camsvc) Information Disclosure Vulnerability
CVE-2026-20838Windows Kernel-Mode Driver Information Disclosure Vulnerability
CVE-2026-20839Windows Client-Side Caching (CSC) Service Information Disclosure Vulnerability
CVE-2026-20851Capability Access Management Service (camsvc) Information Disclosure Vulnerability
CVE-2026-20862Windows Management Services Information Disclosure Vulnerability
CVE-2026-20932Windows File Explorer Information Disclosure Vulnerability
CVE-2026-20935Windows Virtualization-Based Security (VBS) Information Disclosure Vulnerability
CVE-2026-20936Windows NDIS Information Disclosure Vulnerability
CVE-2026-20937Windows File Explorer Information Disclosure Vulnerability
CVE-2026-20939Windows File Explorer Information Disclosure Vulnerability
CVE-2026-20958Microsoft SharePoint Information Disclosure Vulnerability
CVE-2026-20962Dynamic Root of Trust for Measurement (DRTM) Information Disclosure Vulnerability

Remote Code Execution (22 CVEs)

Critical severity
CVE-2026-20854Windows Local Security Authority Subsystem Service (LSASS) Remote Code Execution Vulnerability
CVE-2026-20944Microsoft Word Remote Code Execution Vulnerability
CVE-2026-20952Microsoft Office Remote Code Execution Vulnerability
CVE-2026-20953Microsoft Office Remote Code Execution Vulnerability
CVE-2026-20955Microsoft Excel Remote Code Execution Vulnerability
CVE-2026-20957Microsoft Excel Remote Code Execution Vulnerability
Important severity
CVE-2026-0386Windows Deployment Services Remote Code Execution Vulnerability
CVE-2026-20837Windows Media Remote Code Execution Vulnerability
CVE-2026-20840Windows NTFS Remote Code Execution Vulnerability
CVE-2026-20856Windows Server Update Service (WSUS) Remote Code Execution Vulnerability
CVE-2026-20868Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
CVE-2026-20922Windows NTFS Remote Code Execution Vulnerability
CVE-2026-20946Microsoft Excel Remote Code Execution Vulnerability
CVE-2026-20947Microsoft SharePoint Server Remote Code Execution Vulnerability
CVE-2026-20948Microsoft Word Remote Code Execution Vulnerability
CVE-2026-20950Microsoft Excel Remote Code Execution Vulnerability
CVE-2026-20951Microsoft SharePoint Server Remote Code Execution Vulnerability
CVE-2026-20956Microsoft Excel Remote Code Execution Vulnerability
CVE-2026-20960Microsoft Power Apps Remote Code Execution Vulnerability
CVE-2026-20963Microsoft SharePoint Remote Code Execution Vulnerability
CVE-2026-21219Inbox COM Objects (Global Memory) Remote Code Execution Vulnerability
CVE-2026-21226Azure Core shared client library for Python Remote Code Execution Vulnerability

Security Feature Bypass (3 CVEs)

Important severity
CVE-2026-20824Windows Remote Assistance Security Feature Bypass Vulnerability
CVE-2026-20949Microsoft Excel Security Feature Bypass Vulnerability
CVE-2026-21265Secure Boot Certificate Expiration Security Feature Bypass Vulnerability

 

Spoofing (5 CVEs)

Important severity
CVE-2026-20834Windows Spoofing Vulnerability
CVE-2026-20847Microsoft Windows File Explorer Spoofing Vulnerability
CVE-2026-20872NTLM Hash Disclosure Spoofing Vulnerability
CVE-2026-20925NTLM Hash Disclosure Spoofing Vulnerability
CVE-2026-20959Microsoft SharePoint Server Spoofing Vulnerability

 

Tampering (3 CVEs)

Important severity
CVE-2026-20804Windows Hello Tampering Vulnerability
CVE-2026-20812LDAP Tampering Vulnerability
CVE-2026-20852Windows Hello Tampering Vulnerability

 

Denial of Service (2 CVEs)

Important severity
CVE-2026-20875Local Security Authority Subsystem Service (LSASS) Denial of Service Vulnerability
CVE-2026-20927Windows SMB Server Denial of Service Vulnerability

 

Appendix B: Exploitability and CVSS

This is a list of the eight January CVEs judged by Microsoft to be more likely to be exploited in the wild within the first 30 days post-release, along with the single CVE already known to be under attack. The list is arranged by CVE. 

Exploitation detected
CVE-2026-20805Desktop Windows Manager Information Disclosure Vulnerability
Exploitation more likely within the next 30 days
CVE-2026-20816Windows Installer Elevation of Privilege Vulnerability
CVE-2026-20817Windows Error Reporting Service Elevation of Privilege Vulnerability
CVE-2026-20820Windows Common Log File System Driver Elevation of Privilege Vulnerability
CVE-2026-20840Windows NTFS Remote Code Execution Vulnerability
CVE-2026-20843Windows Routing and Remote Access Service (RRAS) Elevation of Privilege Vulnerability
CVE-2026-20860Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
CVE-2026-20871Desktop Windows Manager Elevation of Privilege Vulnerability
CVE-2026-20922Windows NTFS Remote Code Execution Vulnerability

 

These are the January CVEs with a Microsoft-assessed CVSS Base score of 8.0 or higher. They are arranged by score and further sorted by CVE. For more information on how CVSS works, please see our series on patch prioritization schema

CVSS BaseCVSS TemporalCVETitle
8.87.7CVE-2026-20868Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
8.87.7CVE-2026-20947Microsoft SharePoint Server Remote Code Execution Vulnerability
8.87.7CVE-2026-20963Microsoft SharePoint Remote Code Execution Vulnerability
8.47.3CVE-2026-20952Microsoft Office Remote Code Execution Vulnerability
8.47.3CVE-2026-20953Microsoft Office Remote Code Execution Vulnerability
8.17.1CVE-2026-20856Windows Server Update Service (WSUS) Remote Code Execution Vulnerability
8.07.0CVE-2026-20931Windows Telephony Service Elevation of Privilege Vulnerability
8.07.0CVE-2026-20960Microsoft Power Apps Remote Code Execution Vulnerability

 

Appendix C: Products Affected

This is a list of January’s patches sorted by product family, then sub-sorted by severity. Each list is further arranged by CVE. Patches that are shared among multiple product families are listed multiple times, once for each product family. Certain issues for which advisories have been issued are covered in Appendix D, and issues affecting Windows Server are further sorted in Appendix E. All CVE titles are accurate as made available by Microsoft; for further information on why certain products may appear in titles and not product families (or vice versa), please consult Microsoft.

Windows (91 CVEs)

Critical severity
CVE-2026-20822Windows Graphics Component Elevation of Privilege Vulnerability
CVE-2026-20854Windows Local Security Authority Subsystem Service (LSASS) Remote Code Execution Vulnerability
CVE-2026-20876Windows Virtualization-Based Security (VBS) Enclave Elevation of Privilege Vulnerability
Important severity
CVE-2026-0386Windows Deployment Services Remote Code Execution Vulnerability
CVE-2026-20804Windows Hello Tampering Vulnerability
CVE-2026-20805Desktop Windows Manager Information Disclosure Vulnerability
CVE-2026-20808Windows File Explorer Elevation of Privilege Vulnerability
CVE-2026-20809Windows Kernel Memory Elevation of Priviledge Vulnerability
CVE-2026-20810Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
CVE-2026-20811Win32k Elevation of Privilege Vulnerability
CVE-2026-20812LDAP Tampering Vulnerability
CVE-2026-20814DirectX Graphics Kernel Elevation of Privilege Vulnerability
CVE-2026-20815Capability Access Management Service (camsvc) Elevation of Privilege Vulnerability
CVE-2026-20816Windows Installer Elevation of Privilege Vulnerability
CVE-2026-20817Windows Error Reporting Service Elevation of Privilege Vulnerability
CVE-2026-20818Windows Kernel Information Disclosure Vulnerability
CVE-2026-20819Windows Virtualization-Based Security (VBS) Information Disclosure Vulnerability
CVE-2026-20820Windows Common Log File System Driver Elevation of Privilege Vulnerability
CVE-2026-20821Remote Procedure Call Information Disclosure Vulnerability
CVE-2026-20823Windows File Explorer Information Disclosure Vulnerability
CVE-2026-20824Windows Remote Assistance Security Feature Bypass Vulnerability
CVE-2026-20825Windows Hyper-V Information Disclosure Vulnerability
CVE-2026-20826Tablet Windows User Interface (TWINUI) Subsystem Information Disclosure Vulnerability
CVE-2026-20827Tablet Windows User Interface (TWINUI) Subsystem Information Disclosure Vulnerability
CVE-2026-20828Windows rndismp6.sys Information Disclosure Vulnerability
CVE-2026-20829TPM Trustlet Information Disclosure Vulnerability
CVE-2026-20830Capability Access Management Service (camsvc) Elevation of Privilege Vulnerability
CVE-2026-20831Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
CVE-2026-20832Windows Remote Procedure Call Interface Definition Language (IDL) Elevation of Privilege Vulnerability
CVE-2026-20833Windows Kerberos Information Disclosure Vulnerability
CVE-2026-20834Windows Spoofing Vulnerability
CVE-2026-20835Capability Access Management Service (camsvc) Information Disclosure Vulnerability
CVE-2026-20836DirectX Graphics Kernel Elevation of Privilege Vulnerability
CVE-2026-20837Windows Media Remote Code Execution Vulnerability
CVE-2026-20838Windows Kernel-Mode Driver Information Disclosure Vulnerability
CVE-2026-20839Windows Client-Side Caching (CSC) Service Information Disclosure Vulnerability
CVE-2026-20840Windows NTFS Remote Code Execution Vulnerability
CVE-2026-20842Microsoft DWM Core Library Elevation of Privilege Vulnerability
CVE-2026-20843Windows Routing and Remote Access Service (RRAS) Elevation of Privilege Vulnerability
CVE-2026-20844Windows Clipboard Server Elevation of Privilege Vulnerability
CVE-2026-20847Microsoft Windows File Explorer Spoofing Vulnerability
CVE-2026-20848Windows SMB Server Elevation of Privilege Vulnerability
CVE-2026-20849Windows Kerberos Elevation of Privilege Vulnerability
CVE-2026-20851Capability Access Management Service (camsvc) Information Disclosure Vulnerability
CVE-2026-20852Windows Hello Tampering Vulnerability
CVE-2026-20853Windows WalletService Elevation of Privilege Vulnerability
CVE-2026-20856Windows Server Update Service (WSUS) Remote Code Execution Vulnerability
CVE-2026-20857Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability
CVE-2026-20858Windows Management Services Elevation of Privilege Vulnerability
CVE-2026-20859Windows Kernel-Mode Driver Elevation of Privilege Vulnerability
CVE-2026-20860Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
CVE-2026-20861Windows Management Services Elevation of Privilege Vulnerability
CVE-2026-20862Windows Management Services Information Disclosure Vulnerability
CVE-2026-20863Win32k Elevation of Privilege Vulnerability
CVE-2026-20864Windows Connected Devices Platform Service Elevation of Privilege Vulnerability
CVE-2026-20865Windows Management Services Elevation of Privilege Vulnerability
CVE-2026-20866Windows Management Services Elevation of Privilege Vulnerability
CVE-2026-20867Windows Management Services Elevation of Privilege Vulnerability
CVE-2026-20868Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
CVE-2026-20869Windows Local Session Manager (LSM) Elevation of Privilege Vulnerability
CVE-2026-20870Windows Win32 Kernel Subsystem Elevation of Privilege Vulnerability
CVE-2026-20871Desktop Windows Manager Elevation of Privilege Vulnerability
CVE-2026-20872NTLM Hash Disclosure Spoofing Vulnerability
CVE-2026-20873Windows Management Services Elevation of Privilege Vulnerability
CVE-2026-20874Windows Management Services Elevation of Privilege Vulnerability
CVE-2026-20875Local Security Authority Subsystem Service (LSASS) Denial of Service Vulnerability
CVE-2026-20877Windows Management Services Elevation of Privilege Vulnerability
CVE-2026-20918Windows Management Services Elevation of Privilege Vulnerability
CVE-2026-20919Windows SMB Server Elevation of Privilege Vulnerability
CVE-2026-20920Win32k Elevation of Privilege Vulnerability
CVE-2026-20921Windows SMB Server Elevation of Privilege Vulnerability
CVE-2026-20922Windows NTFS Remote Code Execution Vulnerability
CVE-2026-20923Windows Management Services Elevation of Privilege Vulnerability
CVE-2026-20924Windows Management Services Elevation of Privilege Vulnerability
CVE-2026-20925NTLM Hash Disclosure Spoofing Vulnerability
CVE-2026-20926Windows SMB Server Elevation of Privilege Vulnerability
CVE-2026-20927Windows SMB Server Denial of Service Vulnerability
CVE-2026-20929Windows HTTP.sys Elevation of Privilege Vulnerability
CVE-2026-20931Windows Telephony Service Elevation of Privilege Vulnerability
CVE-2026-20932Windows File Explorer Information Disclosure Vulnerability
CVE-2026-20934Windows SMB Server Elevation of Privilege Vulnerability
CVE-2026-20935Windows Virtualization-Based Security (VBS) Information Disclosure Vulnerability
CVE-2026-20936Windows NDIS Information Disclosure Vulnerability
CVE-2026-20937Windows File Explorer Information Disclosure Vulnerability
CVE-2026-20938Windows Virtualization-Based Security (VBS) Enclave Elevation of Privilege Vulnerability
CVE-2026-20939Windows File Explorer Information Disclosure Vulnerability
CVE-2026-20940Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability
CVE-2026-20941Host Process for Windows Tasks Elevation of Privilege Vulnerability
CVE-2026-20962Dynamic Root of Trust for Measurement (DRTM) Information Disclosure Vulnerability
CVE-2026-21221Capability Access Management Service (camsvc) Elevation of Privilege Vulnerability
CVE-2026-21265Secure Boot Certificate Expiration Security Feature Bypass Vulnerability
CVE-2026-0386Windows Deployment Services Remote Code Execution Vulnerability
CVE-2026-20804Windows Hello Tampering Vulnerability
CVE-2026-20805Desktop Windows Manager Information Disclosure Vulnerability

Office (11 CVEs)

Critical severity
CVE-2026-20944Microsoft Word Remote Code Execution Vulnerability
CVE-2026-20952Microsoft Office Remote Code Execution Vulnerability
CVE-2026-20953Microsoft Office Remote Code Execution Vulnerability
CVE-2026-20955Microsoft Excel Remote Code Execution Vulnerability
CVE-2026-20957Microsoft Excel Remote Code Execution Vulnerability
Important severity
CVE-2026-20943Microsoft Office Click-To-Run Elevation of Privilege Vulnerability
CVE-2026-20946Microsoft Excel Remote Code Execution Vulnerability
CVE-2026-20948Microsoft Word Remote Code Execution Vulnerability
CVE-2026-20949Microsoft Excel Security Feature Bypass Vulnerability
CVE-2026-20950Microsoft Excel Remote Code Execution Vulnerability
CVE-2026-20956Microsoft Excel Remote Code Execution Vulnerability

 

365 (10 CVEs)

Critical severity
CVE-2026-20944Microsoft Word Remote Code Execution Vulnerability
CVE-2026-20952Microsoft Office Remote Code Execution Vulnerability
CVE-2026-20953Microsoft Office Remote Code Execution Vulnerability
CVE-2026-20955Microsoft Excel Remote Code Execution Vulnerability
CVE-2026-20957Microsoft Excel Remote Code Execution Vulnerability
Important severity
CVE-2026-20946Microsoft Excel Remote Code Execution Vulnerability
CVE-2026-20948Microsoft Word Remote Code Execution Vulnerability
CVE-2026-20949Microsoft Excel Security Feature Bypass Vulnerability
CVE-2026-20950Microsoft Excel Remote Code Execution Vulnerability
CVE-2026-20956Microsoft Excel Remote Code Execution Vulnerability

 

SharePoint (7 CVEs)

Important severity
CVE-2026-20943Microsoft Office Click-To-Run Elevation of Privilege Vulnerability
CVE-2026-20947Microsoft SharePoint Server Remote Code Execution Vulnerability
CVE-2026-20948Microsoft Word Remote Code Execution Vulnerability
CVE-2026-20951Microsoft SharePoint Server Remote Code Execution Vulnerability
CVE-2026-20958Microsoft SharePoint Information Disclosure Vulnerability
CVE-2026-20959Microsoft SharePoint Server Spoofing Vulnerability
CVE-2026-20963Microsoft SharePoint Remote Code Execution Vulnerability

 

Excel (3 CVEs)

Critical severity
CVE-2026-20957Microsoft Excel Remote Code Execution Vulnerability
Important severity
CVE-2026-20946Microsoft Excel Remote Code Execution Vulnerability
CVE-2026-20950Microsoft Excel Remote Code Execution Vulnerability

 

Azure (2 CVEs)

Important severity
CVE-2026-21224Azure Connected Machine Agent Elevation of Privilege Vulnerability
CVE-2026-21226Azure Core shared client library for Python Remote Code Execution Vulnerability

 

Power Apps (1 CVE)

Important severity
CVE-2026-20960Microsoft Power Apps Remote Code Execution Vulnerability


SQL (1 CVE)

Important severity
CVE-2026-20803Microsoft SQL Server Elevation of Privilege Vulnerability


Windows Admin Center (1 CVE)

Important severity
CVE-2026-20965Windows Admin Center Elevation of Privilege Vulnerability


Windows SDK (1 CVE)

Important severity
CVE-2026-21219Inbox COM Objects (Global Memory) Remote Code Execution Vulnerability

 

Word (1 CVE)

Important severity
CVE-2026-20948Microsoft Word Remote Code Execution Vulnerability

 

Appendix D: Advisories and Other Products

There is one Edge-related advisory noted in January’s release:

  
CVE-2026-0628Chromium: CVE-2026-0628 Insufficient policy enforcement in WebView tag


There are also the usual Servicing Stack updates, ADV990001.

 

Apendix E: Affected Windows Server versions

This is a table of the 91 CVEs in the January release affecting Windows Server versions 2008 through 2025. The table differentiates among major versions of the platform but doesn’t go into deeper detail (eg., Server Core). An “x” indicates that the CVE does not apply to that version; in the case of the four client-only patches this month, we’ve italicized the whole row to emphasize that no server version is affected. We have also, for convenience, indicated information on the two Windows-related advisories (CVE-2023-31096, CVE-2024-55414), since both affect all versions of the platform. 

Administrators are encouraged to use this appendix as a starting point to ascertain their specific exposure, as each reader’s situation, especially as it concerns products out of mainstream support, will vary. For specific Knowledge Base numbers, please consult Microsoft. 

CVE

S-08

8r2

S-12

12r2

S-16

S-19

S-22

23h2

S-25

CVE-2023-31096

CVE-2024-55414

CVE-2026-0386

CVE-2026-20804

×

×

×

×

CVE-2026-20805

×

×

CVE-2026-20808

×

×

×

×

×

×

×

CVE-2026-20809

×

×

×

CVE-2026-20810

×

×

×

×

×

×

×

×

CVE-2026-20811

×

×

×

×

×

×

CVE-2026-20812

×

×

×

×

CVE-2026-20814

×

×

×

×

CVE-2026-20815

×

×

×

×

×

×

×

×

CVE-2026-20816

CVE-2026-20817

×

×

×

×

×

×

CVE-2026-20818

×

×

×

×

CVE-2026-20819

×

×

×

×

×

×

×

×

×

CVE-2026-20820

CVE-2026-20821

CVE-2026-20822

×

×

×

×

■ ■ ■ ■ ■ 
CVE-2026-20823

×

×

×

×

CVE-2026-20824

×

×

CVE-2026-20825

×

×

×

×

×

CVE-2026-20826

×

×

×

×

CVE-2026-20827

×

×

×

×

CVE-2026-20828

CVE-2026-20829

×

×

×

×

×

CVE-2026-20830

×

×

×

×

×

×

×

×

CVE-2026-20831

CVE-2026-20832

×

×

×

×

CVE-2026-20833

CVE-2026-20834

CVE-2026-20835

×

×

×

×

×

×

×

CVE-2026-20836

×

×

×

×

CVE-2026-20837

×

×

×

×

×

CVE-2026-20838

×

×

×

×

×

×

CVE-2026-20839

×

CVE-2026-20840

CVE-2026-20842

×

×

×

×

×

×

CVE-2026-20843

CVE-2026-20844

×

×

×

×

CVE-2026-20847

×

CVE-2026-20848

×

×

CVE-2026-20849

CVE-2026-20851

×

×

×

×

×

×

×

×

CVE-2026-20852

×

×

×

×

CVE-2026-20853

×

×

×

×

×

×

×

×

×

CVE-2026-20854

×

×

×

×

×

×

×

×

■ 

CVE-2026-20856

×

×

CVE-2026-20857

×

×

×

×

×

CVE-2026-20858

×

×

×

×

×

CVE-2026-20859

×

×

×

×

×

×

×

×

CVE-2026-20860

CVE-2026-20861

×

×

×

×

×

CVE-2026-20862

×

×

×

×

×

CVE-2026-20863

×

×

×

×

×

×

CVE-2026-20864

×

×

×

×

×

CVE-2026-20865

×

×

×

×

×

CVE-2026-20866

×

×

×

×

×

CVE-2026-20867

×

×

×

×

×

CVE-2026-20868

CVE-2026-20869

CVE-2026-20870

×

×

×

×

×

×

×

×

CVE-2026-20871

×

×

×

×

×

×

CVE-2026-20872

CVE-2026-20873

×

×

×

×

×

CVE-2026-20874

×

×

×

×

×

CVE-2026-20875

CVE-2026-20876

×

×

×

×

×

×

×

■ ■ 
CVE-2026-20877

×

×

×

×

×

CVE-2026-20918

×

×

×

×

×

CVE-2026-20919

×

×

CVE-2026-20920

×

×

×

×

×

×

×

CVE-2026-20921

CVE-2026-20922

CVE-2026-20923

×

×

×

×

×

CVE-2026-20924

×

×

×

×

×

CVE-2026-20925

CVE-2026-20926

×

×

CVE-2026-20927

CVE-2026-20929

×

CVE-2026-20931

CVE-2026-20932

×

×

×

×

CVE-2026-20934

×

×

CVE-2026-20935

×

×

×

×

×

×

×

×

×

CVE-2026-20936

CVE-2026-20937

×

×

×

×

CVE-2026-20938

×

×

×

×

×

×

×

×

×

CVE-2026-20939

×

×

×

×

CVE-2026-20940

×

×

CVE-2026-20941

×

×

×

×

×

×

×

×

CVE-2026-20962

×

×

×

×

×

CVE-2026-21221

×

×

×

×

×

×

×

×

CVE-2026-21265

×

×