Webinar Library
Welcome to 2026. Let's see what Microsoft has in store for us this year. Our first Patch Tuesday of the year gives us 3 zero days to deal with. Today, Microsoft released 114 updates and in the last 30 days a long list of 227 additional updates for a total of 341 updates in the past 30 days. That's 30 more updates for this month than we had in lasts months newsletter. Now keep in mind that a very large number of the 227 additional updates are related to open source software in the chart below. So let's dive in to the three zero-day vulnerabilities. Our first zero day is CVE-2026-20805. This information disclosure is currently being exploited but not publicly disclosed. This vulnerability could allow an unauthorized actor to disclose local information in Desktop Windows Manager. The fix for this vulnerability was released today and rated "Important" by Microsoft. Next is CVE-2026-21265. This security feature bypass is publicly disclosed but exploitation has not been detected at this time. An attacker who is successful could bypass a systems secure boot process. A systems certificates related to UEFI KEK and DB which are reaching expiration could allow the system to be vulnerable. You can click on the CVE link to see which certificates are suspect. Our third and final zero day is CVE-2023-31096. Don't let the 2023 fool you. This update was released today. This elevation of privilege affects 3rd party Agere Soft Modem drivers that ship natively on all currently supported OS's. Both driver files, agrsm64.sys and agrsm.sys, are being removed in this update. If you currently have any soft modem's using these drivers, be aware that they will no longer work after the update is applied. So, welcome to 2026. Another year and here we go again. Be sure to check out the chart below to see if any of the affected products are in your environment. Besides that it is a pretty normal month. Below the chart you will find a long list of Azure Linux and CBL Mariner products and versions. I didn't want to "clog up" the chart with all that data so I put it below the chart. See you next month!
So, without further ado, here’s the chart of MS patches that affect Windows platforms in the past month.
Patch data provided by:
Technology
Products Affected
Severity
Reference
Workaround/ Exploited / Publicly Disclosed
Vulnerability Info
Windows
Windows 10, 11
Server 2008 SP2, 2008 R2 SP1, 2012, 2012 R2, 2016, 2019, 2022, 2025 including Server Core Installations
Critical
CVE-2023-31096** CVE-2024-55414 CVE-2026-0386 CVE-2026-20804 CVE-2026-20805* CVE-2026-20808 CVE-2026-20809 CVE-2026-20810 CVE-2026-20811 CVE-2026-20812 CVE-2026-20814 CVE-2026-20815 CVE-2026-20816 CVE-2026-20817 CVE-2026-20818 CVE-2026-20819 CVE-2026-20820 CVE-2026-20821 CVE-2026-20822 CVE-2026-20823 CVE-2026-20824 CVE-2026-20825 CVE-2026-20826 CVE-2026-20827 CVE-2026-20828 CVE-2026-20829 CVE-2026-20830 CVE-2026-20831 CVE-2026-20832 CVE-2026-20833 CVE-2026-20834 CVE-2026-20835 CVE-2026-20836 CVE-2026-20837 CVE-2026-20838 CVE-2026-20839 CVE-2026-20840 CVE-2026-20842 CVE-2026-20843 CVE-2026-20844 CVE-2026-20847 CVE-2026-20848 CVE-2026-20849 CVE-2026-20851 CVE-2026-20852 CVE-2026-20853 CVE-2026-20854 CVE-2026-20856 CVE-2026-20857 CVE-2026-20858 CVE-2026-20859 CVE-2026-20860 CVE-2026-20861 CVE-2026-20862 CVE-2026-20863 CVE-2026-20864 CVE-2026-20865 CVE-2026-20866 CVE-2026-20867 CVE-2026-20868 CVE-2026-20869 CVE-2026-20870 CVE-2026-20871 CVE-2026-20872 CVE-2026-20873 CVE-2026-20874 CVE-2026-20875 CVE-2026-20876 CVE-2026-20877 CVE-2026-20918 CVE-2026-20919 CVE-2026-20920 CVE-2026-20921 CVE-2026-20922 CVE-2026-20923 CVE-2026-20924 CVE-2026-20925 CVE-2026-20926 CVE-2026-20927 CVE-2026-20929 CVE-2026-20931 CVE-2026-20932 CVE-2026-20934 CVE-2026-20935 CVE-2026-20936 CVE-2026-20937 CVE-2026-20938 CVE-2026-20939 CVE-2026-20940 CVE-2026-20941 CVE-2026-20962 CVE-2026-21221 CVE-2026-21265**
Denial of Service Elevation of Privilege Information Disclosure Remote Code Execution Security Feature Bypass Spoofing Tampering
Edge
Edge (Chromium-based) Edge for Android
Low
CVE-2025-14174 CVE-2025-14372 CVE-2025-14373 CVE-2025-14765 CVE-2025-14766 CVE-2025-65046 CVE-2026-0628
Workaround: No Exploited: No Public: No
Office
365 Apps for Enterprise Excel, Word 2016 Office 2016, 2019 LTSC 2021, 2024 including for Mac Office Online Server Office Deployment Tool Purview Office Out-of-Box Experience
CVE-2025-64676 CVE-2025-64677 CVE-2026-20943 CVE-2026-20944 CVE-2026-20946 CVE-2026-20948 CVE-2026-20949 CVE-2026-20950 CVE-2026-20952 CVE-2026-20953 CVE-2026-20955 CVE-2026-20956 CVE-2026-20957
Remote Code Execution Security Feature Bypass Spoofing
SharePoint
Enterprise Server 2016 Server 2019 Server Subscription Edition
Important
CVE-2026-20943 CVE-2026-20947 CVE-2026-20948 CVE-2026-20951 CVE-2026-20958 CVE-2026-20959 CVE-2026-20963
Azure
Cognitive Service for Language Connected Machine Agent Container Apps Core shared client library for Python Cosmos DB Partner Center Admin Center in Azure Portal
CVE-2025-64663 CVE-2025-64675 CVE-2025-65037 CVE-2025-65041 CVE-2026-20965 CVE-2026-21224 CVE-2026-21226
Developer Tools
Windows SDK
CVE-2026-21219
SQL Server
2022 GDR and CU22 2025 GDR
CVE-2026-20803
Elevation of Privilege
Open Source Software
*See more products and versions below chart
CVE-2022-48843 CVE-2022-50357 CVE-2022-50390 CVE-2022-50393 CVE-2022-50406 CVE-2022-50407 CVE-2022-50418 CVE-2023-53323 CVE-2023-53332 CVE-2023-53347 CVE-2023-53348 CVE-2023-53353 CVE-2023-53355 CVE-2023-53366 CVE-2023-53367 CVE-2023-53370 CVE-2023-53371 CVE-2023-53376 CVE-2023-53383 CVE-2023-53387 CVE-2023-53401 CVE-2023-53410 CVE-2023-53421 CVE-2023-53424 CVE-2023-53429 CVE-2023-53438 CVE-2023-53447 CVE-2023-54061 CVE-2023-54082 CVE-2023-54161 CVE-2024-26800 CVE-2024-27400 CVE-2024-35949 CVE-2024-58241 CVE-2025-11961 CVE-2025-11964 CVE-2025-12105 CVE-2025-13281 CVE-2025-13699 CVE-2025-13912 CVE-2025-14087 CVE-2025-14104 CVE-2025-14177 CVE-2025-14178 CVE-2025-14180 CVE-2025-14512 CVE-2025-14523 CVE-2025-15284 CVE-2025-2296 CVE-2025-3001 CVE-2025-34468 CVE-2025-37731 CVE-2025-37959 CVE-2025-38095 CVE-2025-38177 CVE-2025-38350 CVE-2025-38371 CVE-2025-38387 CVE-2025-38400 CVE-2025-38441 CVE-2025-38473 CVE-2025-38488 CVE-2025-40345 CVE-2025-40353 CVE-2025-40354 CVE-2025-40355 CVE-2025-40362 CVE-2025-44904 CVE-2025-49014 CVE-2025-55753 CVE-2025-58098 CVE-2025-58160 CVE-2025-59529 CVE-2025-61594 CVE-2025-62408 CVE-2025-67897 CVE-2025-68114 CVE-2025-68146 CVE-2025-68156 CVE-2025-68161 CVE-2025-68174 CVE-2025-68175 CVE-2025-68188 CVE-2025-68190 CVE-2025-68193 CVE-2025-68196 CVE-2025-68198 CVE-2025-68201 CVE-2025-68203 CVE-2025-68204 CVE-2025-68206 CVE-2025-68209 CVE-2025-68211 CVE-2025-68214 CVE-2025-68217 CVE-2025-68219 CVE-2025-68220 CVE-2025-68222 CVE-2025-68223 CVE-2025-68224 CVE-2025-68227 CVE-2025-68229 CVE-2025-68230 CVE-2025-68231 CVE-2025-68233 CVE-2025-68235 CVE-2025-68236 CVE-2025-68237 CVE-2025-68239 CVE-2025-68254 CVE-2025-68255 CVE-2025-68256 CVE-2025-68257 CVE-2025-68258 CVE-2025-68259 CVE-2025-68261 CVE-2025-68263 CVE-2025-68264 CVE-2025-68265 CVE-2025-68266 CVE-2025-68281 CVE-2025-68282 CVE-2025-68283 CVE-2025-68284 CVE-2025-68285 CVE-2025-68286 CVE-2025-68287 CVE-2025-68288 CVE-2025-68289 CVE-2025-68290 CVE-2025-68295 CVE-2025-68296 CVE-2025-68297 CVE-2025-68301 CVE-2025-68302 CVE-2025-68303 CVE-2025-68304 CVE-2025-68307 CVE-2025-68308 CVE-2025-68309 CVE-2025-68311 CVE-2025-68313 CVE-2025-68315 CVE-2025-68317 CVE-2025-68318 CVE-2025-68322 CVE-2025-68324 CVE-2025-68327 CVE-2025-68328 CVE-2025-68330 CVE-2025-68331 CVE-2025-68332 CVE-2025-68333 CVE-2025-68334 CVE-2025-68335 CVE-2025-68336 CVE-2025-68337 CVE-2025-68338 CVE-2025-68339 CVE-2025-68340 CVE-2025-68342 CVE-2025-68343 CVE-2025-68344 CVE-2025-68345 CVE-2025-68346 CVE-2025-68347 CVE-2025-68349 CVE-2025-68354 CVE-2025-68356 CVE-2025-68357 CVE-2025-68358 CVE-2025-68362 CVE-2025-68363 CVE-2025-68364 CVE-2025-68365 CVE-2025-68366 CVE-2025-68367 CVE-2025-68371 CVE-2025-68372 CVE-2025-68374 CVE-2025-68376 CVE-2025-68378 CVE-2025-68379 CVE-2025-68380 CVE-2025-68384 CVE-2025-68390 CVE-2025-68476 CVE-2025-68615 CVE-2025-68724 CVE-2025-68725 CVE-2025-68727 CVE-2025-68728 CVE-2025-68729 CVE-2025-68732 CVE-2025-68733 CVE-2025-68736 CVE-2025-68740 CVE-2025-68741 CVE-2025-68742 CVE-2025-68744 CVE-2025-68745 CVE-2025-68746 CVE-2025-68755 CVE-2025-68756 CVE-2025-68757 CVE-2025-68758 CVE-2025-68759 CVE-2025-68763 CVE-2025-68764 CVE-2025-68765 CVE-2025-68972 CVE-2025-68973 CVE-2025-69277 CVE-2026-21444
N/A
I didn't want to overflow the chart with the products and versions in this month's release for "Open Source Software". Below is a list of products and versions included: Azure Linux: azl3 avahi 0.8-5, azl3 coredns 1.11.4-11, azl3 edk2 20240524git3e722403cd16-10, azl3 fluent-bit 3.1.10-2, azl3 glib 2.78.6-5, azl3 gnupg2 2.4.7-1, azl3 hdf5 1.14.6-1, azl3 httpd 2.4.65-1, azl3 javapackages-bootstrap 1.14.0-3, azl3 jq 1.7.1-4, azl3 kata-containers 3.19.1.kata2-2, azl3 kata-containers-cc 3.15.0.aks0-5, azl3 keda 2.14.1-7, azl3 kernel 6.6.117.1-1, azl3 kernel 6.6.119.3-1, azl3 kubernetes 1.30.10-16, azl3 libcap 2.69-10, azl3 libpcap 1.10.5-1, azl3 libsodium 1.0.19-1, azl3 libsoup 3.4.4-10, azl3 libtpms 0.9.6-8, azl3 mariadb 10.11.11-1, azl3 net-snmp 5.9.4-1, azl3 nmap 7.95-2, azl3 php 8.3.23-1, azl3 python-filelock 3.14.0-1, azl3 python-tensorboard 2.16.2-6, azl3 pytorch 2.2.2-9, azl3 qemu 8.2.0-25, azl3 rpm-ostree 2024.4-5, azl3 ruby 3.3.5-6, azl3 rubygem-elasticsearch 8.9.0-1, azl3 rust 1.75.0-22, azl3 rust 1.86.0-10, azl3 util-linux 2.40.2-1 CBL Mariner: cbl2 avahi 0.8-4, cbl2 coredns 1.11.1-24, cbl2 edk2 20230301gitf80f052277c8-43, cbl2 glib 2.71.0-8, cbl2 glib 2.71.0-9, cbl2 gnupg2 2.4.0-2, cbl2 hdf5 1.14.6-1, cbl2 httpd 2.4.65-1, cbl2 hvloader 1.0.1-14, cbl2 jq 1.6-5, cbl2 kata-containers 3.2.0.azl2-7, cbl2 kata-containers-cc 3.2.0.azl2-8, cbl2 keda 2.4.0-30, cbl2 kernel 5.15.186.1-1, cbl2 kubernetes 1.28.4-19, cbl2 kubernetes 1.28.4-21, cbl2 libpcap 1.10.1-4, cbl2 libsodium 1.0.18-6, cbl2 libsoup 3.0.4-10, cbl2 mariadb 10.6.21-1, cbl2 mariadb 10.6.24-1, cbl2 net-snmp 5.9.4-1, cbl2 nmap 7.93-3, cbl2 php 8.1.33-1, cbl2 python-tensorboard 2.11.0-3, cbl2 pytorch 2.0.0-11, cbl2 qemu 6.2.0-26, cbl2 reaper 3.1.1-22, cbl2 rpm-ostree 2022.1-7, cbl2 ruby 3.1.7-3, cbl2 rubygem-elasticsearch 8.3.0-1, cbl2 rust 1.72.0-11, cbl2 util-linux 2.37.4-10, cbl2 util-linux 2.37.4-9