Back to Blog
Patch Tuesday January 2026
Security Update

Patch Tuesday January 2026

Security Team
January 14, 2026
3 min read

Microsoft's January 2026 Patch Tuesday dropped on January 13, delivering fixes for 114 vulnerabilities across Windows, Office, and server components—making it one of the heavier releases to kick off the year.

#Patch Tuesday#Microsoft#Windows Server#Office#Zero-Day

Microsoft's January 2026 Patch Tuesday dropped on January 13, delivering fixes for 114 vulnerabilities across Windows, Office, and server components—making it one of the heavier releases to kick off the year. For IT systems administrators managing enterprise fleets, this update cycle demands immediate triage of three zero-days and prioritisation across WSUS, Intune, or SCCM pipelines to minimise exposure in Active Directory-bound environments. Focus first on endpoints and admin workstations, as the flaws here chain easily into privilege escalation paths familiar to any sysadmin hardening Windows Server or Microsoft 365 stacks.^1^3

Key Stats at a Glance

This Patch Tuesday addresses 114 CVEs: eight Critical, with the bulk comprising elevation of privilege (EoP) bugs (47), remote code execution (RCE, 29), and information disclosure issues (21).^2 Server admins will note broad coverage for Windows Server 2019–2025, including the new OS Build 26100.32230 for Windows 11/Server 2025 via KB5073379, which rolls up security and quality fixes.^3 Zero-days flagged by Microsoft include actively exploited flaws—treat these as Week 1 emergencies in your change windows, especially if you're running unpatched Windows 10/11 or Server 2016+ in hybrid setups.^5

Zero-Days: Patch Now

Three publicly disclosed zero-days headline this release, two under active exploit. Sysadmins should query WSUS or Intune for these immediately.

| CVE ID | Component | Severity | Exploit Status | Action for Sysadmins | | :-- | :-- | :-- | :-- | :-- | | https://cvedatabase.com/cve/CVE-2026-20805 | Desktop Window Manager (DWM) | Important (Info Disclosure) | Actively exploited | Deploy to all Windows 10/11/Server endpoints via WSUS priority groups; block via AppLocker if patching lags. Affects broad fleet—chain risk with EoP. ^2 | | https://cvedatabase.com/cve/CVE-2026-21265 | Secure Boot Bypass | Important | Publicly known | Validate boot integrity on DCs/servers; push via Intune for BYOD. Long-tail risk in VM/lab sprawl. ^2 | | Third zero-day (check MSRC) | Windows (TBD) | Critical | Public disclosure | Filter MS Update Guide for "Zero Day"; emergency CAB files if needed. ^2 |

Office RCE: Phishing Vectors for Admins

Office apps bear 20+ RCE flaws, perfect for document-based attacks targeting helpdesk or finance teams. Key ones:

Sysadmin playbook: Stagger via Intune rings—executives/admins first. Enable Attack Surface Reduction (ASR) rules like "Block Office apps from creating child processes" if not already. Monitor via Defender for Endpoint for failed exploits post-patch.^4

Server and Endpoint Coverage

Patches span Windows 10 (22H2), 11 (23H2/25H2), and Servers 2012R2–2025. Notable for AD/LDAP admins:

  • EoP in Win32k (e.g., kernel privilege jumps)—test in lab before prod DCs.
  • Hyper-V fixes: Patch hosts running nested virt for management clusters.^1

Windows Server 2025 now has dedicated KBs—update your SCCM/SCCM queries and CMDB mappings accordingly. No reboot required for some Office updates, but plan for DWM/server rollups.^4

Deployment Roadmap for Sysadmins

Day 1–3 (Now):

  • Inventory exposed assets via SCCM/Intune reports; force zero-day KBs (e.g., KB5073379).
  • Script WSUS approvals: `Get-WsusUpdate -ApprovalAction None -FromStartDate (Get-Date).AddDays(-2) | Approve-WsusUpdate`. ^7

Week 1:

  • Office/endpoint fleets: Ring-deploy, validate with `Get-HotFix`.
  • Monitor Event Viewer (IDs 1000–1020 for DWM crashes).

Ongoing: Export full CVE list from https://cvedatabase.com into your vuln mgmt tool—CVSS scores, affected products, and remediations speed triage. Align with CISA KEV for overlap. Tag unpatched assets in Defender; aim for 90% compliance by Jan 20.

This cycle underscores why layered controls (patching + ASR + EDR) remain non-negotiable for enterprise IT. Dive into details at cvedatabase.com for remediation scripts tailored to Windows stacks.

Views: 62

Back to Blog