January, 2026: Patch Tuesday - Starting 2026 with a Bang; 3 Zero Days

Welcome to 2026. Let's see what Microsoft has in store for us this year. Our first Patch Tuesday of the year gives us 3 zero days to deal with. Today, Microsoft released 114 updates and in the last 30 days a long list of 227 additional updates for a total of 341 updates in the past 30 days. That's 30 more updates for this month than we had in lasts months newsletter. Now keep in mind that a very large number of the 227 additional updates are related to open source software in the chart below.

So let's dive in to the three zero-day vulnerabilities.

Our first zero day is CVE-2026-20805. This information disclosure is currently being exploited but not publicly disclosed. This vulnerability could allow an unauthorized actor to disclose local information in Desktop Windows Manager. The fix for this vulnerability was released today and rated "Important" by Microsoft.

Next is CVE-2026-21265. This security feature bypass is publicly disclosed but exploitation has not been detected at this time. An attacker who is successful could bypass a systems secure boot process. A systems certificates related to UEFI KEK and DB which are reaching expiration could allow the system to be vulnerable. You can click on the CVE link to see which certificates are suspect.

Our third and final zero day is CVE-2023-31096. Don't let the 2023 fool you. This update was released today. This elevation of privilege affects 3rd party Agere Soft Modem drivers that ship natively on all currently supported OS's. Both driver files, agrsm64.sys and agrsm.sys, are being removed in this update. If you currently have any soft modem's using these drivers, be aware that they will no longer work after the update is applied.

So, welcome to 2026. Another year and here we go again. Be sure to check out the chart below to see if any of the affected products are in your environment. Besides that it is a pretty normal month. Below the chart you will find a long list of Azure Linux and CBL Mariner products and versions. I didn't want to "clog up" the chart with all that data so I put it below the chart. See you next month!

So, without further ado, here’s the chart of MS patches that affect Windows platforms in the past month.

Patch data provided by:

LOGbinder.com

Technology

Products Affected

Severity

Reference

Workaround/ Exploited / Publicly Disclosed

Vulnerability Info

Windows

Windows 10, 11

Server 2008 SP2, 2008 R2 SP1, 2012, 2012 R2, 2016, 2019, 2022, 2025 including Server Core Installations

Critical

CVE-2023-31096**
CVE-2024-55414
CVE-2026-0386
CVE-2026-20804
CVE-2026-20805*
CVE-2026-20808
CVE-2026-20809
CVE-2026-20810
CVE-2026-20811
CVE-2026-20812
CVE-2026-20814
CVE-2026-20815
CVE-2026-20816
CVE-2026-20817
CVE-2026-20818
CVE-2026-20819
CVE-2026-20820
CVE-2026-20821
CVE-2026-20822
CVE-2026-20823
CVE-2026-20824
CVE-2026-20825
CVE-2026-20826
CVE-2026-20827
CVE-2026-20828
CVE-2026-20829
CVE-2026-20830
CVE-2026-20831
CVE-2026-20832
CVE-2026-20833
CVE-2026-20834
CVE-2026-20835
CVE-2026-20836
CVE-2026-20837
CVE-2026-20838
CVE-2026-20839
CVE-2026-20840
CVE-2026-20842
CVE-2026-20843
CVE-2026-20844
CVE-2026-20847
CVE-2026-20848
CVE-2026-20849
CVE-2026-20851
CVE-2026-20852
CVE-2026-20853
CVE-2026-20854
CVE-2026-20856
CVE-2026-20857
CVE-2026-20858
CVE-2026-20859
CVE-2026-20860
CVE-2026-20861
CVE-2026-20862
CVE-2026-20863
CVE-2026-20864
CVE-2026-20865
CVE-2026-20866
CVE-2026-20867
CVE-2026-20868
CVE-2026-20869
CVE-2026-20870
CVE-2026-20871
CVE-2026-20872
CVE-2026-20873
CVE-2026-20874
CVE-2026-20875
CVE-2026-20876
CVE-2026-20877
CVE-2026-20918
CVE-2026-20919
CVE-2026-20920
CVE-2026-20921
CVE-2026-20922
CVE-2026-20923
CVE-2026-20924
CVE-2026-20925
CVE-2026-20926
CVE-2026-20927
CVE-2026-20929
CVE-2026-20931
CVE-2026-20932
CVE-2026-20934
CVE-2026-20935
CVE-2026-20936
CVE-2026-20937
CVE-2026-20938
CVE-2026-20939
CVE-2026-20940
CVE-2026-20941
CVE-2026-20962
CVE-2026-21221
CVE-2026-21265**

Workaround: No
Exploited: Yes*
Public: Yes**

Denial of Service

Elevation of Privilege

Information Disclosure

Remote Code Execution

Security Feature Bypass

Spoofing

Tampering

Edge

Edge (Chromium-based)

Edge for Android

Low

CVE-2025-14174
CVE-2025-14372
CVE-2025-14373
CVE-2025-14765
CVE-2025-14766
CVE-2025-65046
CVE-2026-0628

Workaround: No
Exploited: No
Public: No

Spoofing

Office

365 Apps for Enterprise

Excel, Word 2016

Office 2016, 2019

LTSC 2021, 2024 including for Mac

Office Online Server

Office Deployment Tool

Purview

Office Out-of-Box Experience

Critical

CVE-2025-64676
CVE-2025-64677
CVE-2026-20943
CVE-2026-20944
CVE-2026-20946
CVE-2026-20948
CVE-2026-20949
CVE-2026-20950
CVE-2026-20952
CVE-2026-20953
CVE-2026-20955
CVE-2026-20956
CVE-2026-20957

Workaround: No
Exploited: No
Public: No

Remote Code Execution

Security Feature Bypass

Spoofing

SharePoint

Enterprise Server 2016

Server 2019

Server Subscription Edition

Important

CVE-2026-20943
CVE-2026-20947
CVE-2026-20948
CVE-2026-20951
CVE-2026-20958
CVE-2026-20959
CVE-2026-20963

Workaround: No
Exploited: No
Public: No
Information Disclosure

Remote Code Execution

Spoofing

Azure

Cognitive Service for Language

Connected Machine Agent

Container Apps

Core shared client library for Python

Cosmos DB

Partner Center

Admin Center in Azure Portal

Critical

CVE-2025-64663
CVE-2025-64675
CVE-2025-65037
CVE-2025-65041
CVE-2026-20965
CVE-2026-21224
CVE-2026-21226

Workaround: No
Exploited: No
Public: No

Elevation of Privilege

Remote Code Execution

Spoofing

Developer Tools

Windows SDK

Important

CVE-2026-21219

Workaround: No
Exploited: No
Public: No

Remote Code Execution

SQL Server

2022 GDR and CU22

2025 GDR

Important

CVE-2026-20803

Workaround: No
Exploited: No
Public: No

Elevation of Privilege

Open Source Software

*See more products and versions below chart

Critical

CVE-2022-48843
CVE-2022-50357
CVE-2022-50390
CVE-2022-50393
CVE-2022-50406
CVE-2022-50407
CVE-2022-50418
CVE-2023-53323
CVE-2023-53332
CVE-2023-53347
CVE-2023-53348
CVE-2023-53353
CVE-2023-53355
CVE-2023-53366
CVE-2023-53367
CVE-2023-53370
CVE-2023-53371
CVE-2023-53376
CVE-2023-53383
CVE-2023-53387
CVE-2023-53401
CVE-2023-53410
CVE-2023-53421
CVE-2023-53424
CVE-2023-53429
CVE-2023-53438
CVE-2023-53447
CVE-2023-54061
CVE-2023-54082
CVE-2023-54161
CVE-2024-26800
CVE-2024-27400
CVE-2024-35949
CVE-2024-58241
CVE-2025-11961
CVE-2025-11964
CVE-2025-12105
CVE-2025-13281
CVE-2025-13699
CVE-2025-13912
CVE-2025-14087
CVE-2025-14104
CVE-2025-14177
CVE-2025-14178
CVE-2025-14180
CVE-2025-14512
CVE-2025-14523
CVE-2025-15284
CVE-2025-2296
CVE-2025-3001
CVE-2025-34468
CVE-2025-37731
CVE-2025-37959
CVE-2025-38095
CVE-2025-38177
CVE-2025-38350
CVE-2025-38371
CVE-2025-38387
CVE-2025-38400
CVE-2025-38441
CVE-2025-38473
CVE-2025-38488
CVE-2025-40345
CVE-2025-40353
CVE-2025-40354
CVE-2025-40355
CVE-2025-40362
CVE-2025-44904
CVE-2025-49014
CVE-2025-55753
CVE-2025-58098
CVE-2025-58160
CVE-2025-59529
CVE-2025-61594
CVE-2025-62408
CVE-2025-67897
CVE-2025-68114
CVE-2025-68146
CVE-2025-68156
CVE-2025-68161
CVE-2025-68174
CVE-2025-68175
CVE-2025-68188
CVE-2025-68190
CVE-2025-68193
CVE-2025-68196
CVE-2025-68198
CVE-2025-68201
CVE-2025-68203
CVE-2025-68204
CVE-2025-68206
CVE-2025-68209
CVE-2025-68211
CVE-2025-68214
CVE-2025-68217
CVE-2025-68219
CVE-2025-68220
CVE-2025-68222
CVE-2025-68223
CVE-2025-68224
CVE-2025-68227
CVE-2025-68229
CVE-2025-68230
CVE-2025-68231
CVE-2025-68233
CVE-2025-68235
CVE-2025-68236
CVE-2025-68237
CVE-2025-68239
CVE-2025-68254
CVE-2025-68255
CVE-2025-68256
CVE-2025-68257
CVE-2025-68258
CVE-2025-68259
CVE-2025-68261
CVE-2025-68263
CVE-2025-68264
CVE-2025-68265
CVE-2025-68266
CVE-2025-68281
CVE-2025-68282
CVE-2025-68283
CVE-2025-68284
CVE-2025-68285
CVE-2025-68286
CVE-2025-68287
CVE-2025-68288
CVE-2025-68289
CVE-2025-68290
CVE-2025-68295
CVE-2025-68296
CVE-2025-68297
CVE-2025-68301
CVE-2025-68302
CVE-2025-68303
CVE-2025-68304
CVE-2025-68307
CVE-2025-68308
CVE-2025-68309
CVE-2025-68311
CVE-2025-68313
CVE-2025-68315
CVE-2025-68317
CVE-2025-68318
CVE-2025-68322
CVE-2025-68324
CVE-2025-68327
CVE-2025-68328
CVE-2025-68330
CVE-2025-68331
CVE-2025-68332
CVE-2025-68333
CVE-2025-68334
CVE-2025-68335
CVE-2025-68336
CVE-2025-68337
CVE-2025-68338
CVE-2025-68339
CVE-2025-68340
CVE-2025-68342
CVE-2025-68343
CVE-2025-68344
CVE-2025-68345
CVE-2025-68346
CVE-2025-68347
CVE-2025-68349
CVE-2025-68354
CVE-2025-68356
CVE-2025-68357
CVE-2025-68358
CVE-2025-68362
CVE-2025-68363
CVE-2025-68364
CVE-2025-68365
CVE-2025-68366
CVE-2025-68367
CVE-2025-68371
CVE-2025-68372
CVE-2025-68374
CVE-2025-68376
CVE-2025-68378
CVE-2025-68379
CVE-2025-68380
CVE-2025-68384
CVE-2025-68390
CVE-2025-68476
CVE-2025-68615
CVE-2025-68724
CVE-2025-68725
CVE-2025-68727
CVE-2025-68728
CVE-2025-68729
CVE-2025-68732
CVE-2025-68733
CVE-2025-68736
CVE-2025-68740
CVE-2025-68741
CVE-2025-68742
CVE-2025-68744
CVE-2025-68745
CVE-2025-68746
CVE-2025-68755
CVE-2025-68756
CVE-2025-68757
CVE-2025-68758
CVE-2025-68759
CVE-2025-68763
CVE-2025-68764
CVE-2025-68765
CVE-2025-68972
CVE-2025-68973
CVE-2025-69277
CVE-2026-21444

Workaround: No
Exploited: No
Public: No

N/A

I didn't want to overflow the chart with the products and versions in this month's release for "Open Source Software". Below is a list of products and versions included:

Azure Linux:
azl3 avahi 0.8-5, azl3 coredns 1.11.4-11, azl3 edk2 20240524git3e722403cd16-10, azl3 fluent-bit 3.1.10-2, azl3 glib 2.78.6-5, azl3 gnupg2 2.4.7-1, azl3 hdf5 1.14.6-1, azl3 httpd 2.4.65-1, azl3 javapackages-bootstrap 1.14.0-3, azl3 jq 1.7.1-4, azl3 kata-containers 3.19.1.kata2-2, azl3 kata-containers-cc 3.15.0.aks0-5, azl3 keda 2.14.1-7, azl3 kernel 6.6.117.1-1, azl3 kernel 6.6.119.3-1, azl3 kubernetes 1.30.10-16, azl3 libcap 2.69-10, azl3 libpcap 1.10.5-1, azl3 libsodium 1.0.19-1, azl3 libsoup 3.4.4-10, azl3 libtpms 0.9.6-8, azl3 mariadb 10.11.11-1, azl3 net-snmp 5.9.4-1, azl3 nmap 7.95-2, azl3 php 8.3.23-1, azl3 python-filelock 3.14.0-1, azl3 python-tensorboard 2.16.2-6, azl3 pytorch 2.2.2-9, azl3 qemu 8.2.0-25, azl3 rpm-ostree 2024.4-5, azl3 ruby 3.3.5-6, azl3 rubygem-elasticsearch 8.9.0-1, azl3 rust 1.75.0-22, azl3 rust 1.86.0-10, azl3 util-linux 2.40.2-1

CBL Mariner:
cbl2 avahi 0.8-4, cbl2 coredns 1.11.1-24, cbl2 edk2 20230301gitf80f052277c8-43, cbl2 glib 2.71.0-8, cbl2 glib 2.71.0-9, cbl2 gnupg2 2.4.0-2, cbl2 hdf5 1.14.6-1, cbl2 httpd 2.4.65-1, cbl2 hvloader 1.0.1-14, cbl2 jq 1.6-5, cbl2 kata-containers 3.2.0.azl2-7, cbl2 kata-containers-cc 3.2.0.azl2-8, cbl2 keda 2.4.0-30, cbl2 kernel 5.15.186.1-1, cbl2 kubernetes 1.28.4-19, cbl2 kubernetes 1.28.4-21, cbl2 libpcap 1.10.1-4, cbl2 libsodium 1.0.18-6, cbl2 libsoup 3.0.4-10, cbl2 mariadb 10.6.21-1, cbl2 mariadb 10.6.24-1, cbl2 net-snmp 5.9.4-1, cbl2 nmap 7.93-3, cbl2 php 8.1.33-1, cbl2 python-tensorboard 2.11.0-3, cbl2 pytorch 2.0.0-11, cbl2 qemu 6.2.0-26, cbl2 reaper 3.1.1-22, cbl2 rpm-ostree 2022.1-7, cbl2 ruby 3.1.7-3, cbl2 rubygem-elasticsearch 8.3.0-1, cbl2 rust 1.72.0-11, cbl2 util-linux 2.37.4-10, cbl2 util-linux 2.37.4-9