top of page

Security Bulletin

Public·3 members

George SuttonGeorge Sutton
George Sutton

Patch Tuesday Special: January 2026

January 15, 2026


Overview:

Microsoft’s January 13, 2026 Patch Tuesday addressed ~114 vulnerabilities (counts vary slightly by tracker methodology), including one actively exploited zero-day, two publicly disclosed zero-days, and eight critical issues.


Vulnerability Category Breakdown:

  • Elevation of Privilege (EoP): ~57 vulnerabilities (~50%)

  • Remote Code Execution (RCE): ~22 vulnerabilities (~19%)

  • Information Disclosure: ~22 vulnerabilities (~19%)

  • Security Feature Bypass: ~3 vulnerabilities

  • Denial of Service (DoS): ~2 vulnerabilities

  • Spoofing: ~5 vulnerabilities


Top 5:

1) CVE-2026-20805: Windows Desktop Window Manager (DWM) Information Disclosure (Exploited in the wild / zero-day)

  • Why it matters: This one is confirmed exploited, and while it’s “only” info disclosure, these bugs are often used to make other exploits reliable.

  • Affected systems: Windows endpoints and servers running the Desktop Window Manager component (most Windows client systems; many server systems depending on configuration).

  • Pivotalogic Priority Rating: SHUT IT DOWN - treat as “patch now,” especially for high-risk user populations and internet-exposed RDP/VDI environments.

2) CVE-2026-20952 & CVE-2026-20953: Microsoft Office Remote Code Execution (RCE) 

  • Why it matters: RCE via malicious Office files is evergreen, but the spicy detail here: Preview Pane can be an attack vector, meaning the user may not need to open the document for the exploit path to trigger.

  • Affected systems: Microsoft Office installations (user endpoints, terminal servers, shared jump boxes where Office exists).

  • Pivotalogic Priority Rating: SHUT IT DOWN - Patch applicable systems ASAP.

3) CVE-2026-20854: Windows LSASS Remote Code Execution

  • Why it matters: Local Security Authority Subsystem Service (LSASS) is the backbone of Windows authentication. Bugs here are high-value because they can become privilege escalation, credential access, or domain-impacting footholds depending on exploitation context.

  • Affected systems: Windows clients and servers (domain-joined systems deserve special attention).

  • Pivotalogic Priority Rating: SHUT IT DOWN - Patch ASAP for servers and endpoints.

4) CVE-2026-20856: Windows Server Update Services (WSUS) Remote Code Execution

  • Why it matters: WSUS is patching infrastructure. If an attacker lands RCE here, it’s not just “a server got popped” — it can become a software distribution / trust problem. Multiple sources describe this as a network-exploitable RCE.

  • Affected systems: Windows Server systems running the WSUS role.

  • Pivotalogic Priority Rating: SHUT IT DOWN - Apply patch immediately to internet facing and high-risk WSUS servers.

5) CVE-2026-20840 & CVE-2026-20922: Windows NTFS Remote Code Execution

  • Why it matters: NTFS bugs have nasty reach because they can be triggered through how systems parse file system data. Tenable highlights both as heap-based buffer overflow issues and notes Microsoft assessed them as “Exploitation More Likely.”

  • Affected systems: Windows endpoints and servers using NTFS (i.e., almost everything Windows).

  • Pivotalogic Priority Rating: Yikes! - Apply patch to applicable systems within 1 week, 72 hours for higher risk systems/environments.


Pivotalogic Priority Rating Scale:

💥SHUT IT DOWN (not literally) = Critical

🚨Yikes! = High

⚠️Welp. = Medium

💡Eh = Low

Full Microsoft release notes HERE


34 Views
bottom of page