← Back to Blog
·Jan 28, 2026·7 min read

Microsoft Patch Tuesday January 2026: 114 Fixes Including Actively Exploited Zero-Day

Microsoft's first Patch Tuesday of 2026 patches 114 vulnerabilities including a Desktop Window Manager zero-day being exploited in the wild. Here's what developers need to know and patch immediately.

SecurityMicrosoftWindowsVulnerabilitiesPatch ManagementCVE
JV

Jose Viscasillas

January 28, 2026 · 7 min read

Microsoft Patch Tuesday January 2026: 114 Fixes Including Actively Exploited Zero-Day

Microsoft kicked off 2026 with one of the larger Patch Tuesday releases in recent memory: 114 security vulnerabilities across Windows, Office, and supported software.

Eight of these earned Microsoft's "critical" rating. One is actively being exploited in the wild.

If you manage Windows systems in production, this article breaks down what matters and what you need to patch immediately.

The Actively Exploited Zero-Day: CVE-2026-20805

Desktop Window Manager (DWM) Elevation of Privilege

What Is DWM?

Desktop Window Manager is the Windows compositing engine responsible for:

  • Window animations and transparency effects
  • Aero Glass visual effects
  • Multiple monitor support
  • Thumbnail previews in the taskbar

It's a core component that runs with SYSTEM privileges—the highest permission level in Windows.

The Vulnerability

CVE-2026-20805 allows a local attacker to elevate privileges from a low-privilege user to SYSTEM.

CVSS Score: 5.5 (Medium)

This score is misleading. Microsoft confirmed active exploitation, making this high-priority regardless of the numerical rating.

How It's Exploited

While Microsoft hasn't disclosed full technical details (to prevent widespread exploitation), security researchers indicate the flaw involves:

  1. Race condition in window message handling

- DWM processes window messages from user-space applications - Improper synchronization allows manipulation of kernel objects

  1. Use-after-free vulnerability

- Attacker triggers window destruction - DWM still holds a reference to freed memory - Attacker controls freed memory contents - DWM executes attacker-controlled code as SYSTEM

Real-World Attack Chain

text
Step 1: Attacker gains low-privilege access
        (phishing, vulnerable web app, etc.)

Step 2: Drop CVE-2026-20805 exploit on system
        (compiled .exe, ~50KB)

Step 3: Execute exploit
        → Elevates to SYSTEM privileges

Step 4: Install persistence mechanisms
        → Backdoors, rootkits, credential theft

Step 5: Lateral movement across network
        → Compromise additional systems

The entire chain executes in under 10 seconds on a vulnerable system.

Who's Exploiting This?

Microsoft hasn't attributed the attacks, but threat intelligence firms report:

  • Observed in ransomware campaigns (initial access → privilege escalation)
  • State-sponsored APT groups (espionage operations)
  • Commodity malware (generic trojans leveraging public exploits)

Once a zero-day becomes known, exploit code spreads rapidly.

Remediation

Immediate Action:

powershell
# Check if January 2026 updates are installed
Get-HotFix | Where-Object { $_.InstalledOn -ge "2026-01-14" }

# If not installed, force Windows Update
Install-WindowsUpdate -AcceptAll -AutoReboot

For Enterprise Environments:

powershell
# Deploy via WSUS, SCCM, or Intune
# KB5048732 (Windows 11)
# KB5048733 (Windows 10)

# Verify deployment across fleet
Get-ADComputer -Filter * | ForEach-Object {
    Invoke-Command -ComputerName $_.Name -ScriptBlock {
        Get-HotFix -Id KB5048732, KB5048733
    }
}

No Workaround: Microsoft does not provide a mitigation short of patching. DWM cannot be disabled without breaking the Windows UI.

Critical Office Remote Code Execution: CVE-2026-20952 & CVE-2026-20953

Two Office vulnerabilities allow remote code execution just by previewing an email.

The Attack Vector

Traditional Office RCE: User opens a malicious document → Macros execute → System compromised

These Vulnerabilities: User selects an email in Outlook → Preview pane renders content → Exploit triggers → System compromised

The user doesn't even need to open the attachment.

Technical Details

CVE-2026-20952: Word Processing Component RCE

  • Crafted RTF document triggers buffer overflow
  • Embedded in email body
  • Outlook Preview Pane processes RTF by default

CVE-2026-20953: Excel Parsing Engine RCE

  • Malformed Excel spreadsheet (.xlsx) attached to email
  • Preview generation parses malicious cells
  • Heap corruption leads to code execution

Why This Is Critical

Attack Scenario:

text
Attacker sends email:
├─ Subject: "Q4 Financial Report"
├─ Body: (Crafted RTF with exploit)
└─ Attachment: Quarterly_Results.xlsx (malicious)

User opens Outlook:
├─ Preview pane loads email
├─ RTF parsing triggers CVE-2026-20952
└─ System compromised (no user interaction beyond selecting email)

Affected Versions

  • Microsoft 365 (all versions)
  • Office 2024
  • Office 2021
  • Office 2019
  • Office 2016

Remediation

Immediate Mitigation (Before Patching):

text
Outlook → File → Options → Trust Center → Trust Center Settings
→ Uncheck "Use the Preview Pane"

This breaks the attack vector until patches are applied.

Permanent Fix: Install January 2026 Office updates via:

  • Microsoft Update (consumer)
  • WSUS/SCCM (enterprise)
  • Microsoft 365 automatic updates

Other Notable Vulnerabilities

CVE-2026-20801: Windows Kernel Information Disclosure

CVSS: 7.5 (High)

Allows attackers to read kernel memory, bypassing ASLR (Address Space Layout Randomization).

Why It Matters: ASLR defeats many exploits by randomizing memory addresses. This leak makes other vulnerabilities easier to exploit.

Use in Attack Chains:

text
CVE-2026-20801 (Info Disclosure) → Leak ASLR offsets
CVE-2026-20805 (Privilege Escalation) → Use leaked addresses for reliable exploit
Full system compromise

CVE-2026-20877: Windows Hyper-V RCE

CVSS: 8.8 (High)

Guest-to-host escape in Hyper-V.

Impact: Attacker with access to a Hyper-V guest VM can execute code on the host machine.

Cloud Provider Concern: If you're running Hyper-V in multi-tenant environments (Azure, on-prem VDI), this is critical.

CVE-2026-20923: Windows TCP/IP Denial of Service

CVSS: 7.5 (High)

Specially crafted IPv6 packets cause BSOD (Blue Screen of Death).

Attack Vector: Remote, unauthenticated attacker sends packets → System crashes

Remediation: Patch immediately if your systems are IPv6-reachable from untrusted networks.

Patch Management Best Practices

1. Prioritize by Exposure

Not all systems are equal.

Critical (Patch Within 24 Hours):

  • Internet-facing servers
  • Systems running Office (RCE via Preview Pane)
  • Hyper-V hosts
  • Domain controllers

High (Patch Within 1 Week):

  • Internal workstations
  • Development environments
  • Non-critical infrastructure

Medium (Patch Within 1 Month):

  • Air-gapped systems
  • Legacy systems with change control

2. Test in Staging First

Even critical patches can break things.

Our Process:

text
Day 0 (Patch Tuesday):
├─ Download updates to WSUS
└─ Deploy to isolated test environment

Day 1-2:
├─ Validate business-critical applications
└─ Monitor for crashes, performance issues

Day 3:
├─ Deploy to 10% of production (canary)
└─ Monitor metrics

Day 4-5:
└─ Full production rollout

3. Automate Patch Verification

powershell
# Script to verify critical patches across fleet
$criticalKBs = @("KB5048732", "KB5048733", "KB5048740")

$computers = Get-ADComputer -Filter * -Property Name

foreach ($computer in $computers) {
    $patches = Invoke-Command -ComputerName $computer.Name -ScriptBlock {
        Get-HotFix -Id $using:criticalKBs -ErrorAction SilentlyContinue
    }

    if ($patches.Count -lt $criticalKBs.Count) {
        Write-Warning "$($computer.Name): Missing patches!"
        Send-AlertToSlack "$($computer.Name) is unpatched"
    }
}

4. Have a Rollback Plan

Patches occasionally break production systems.

Windows Rollback:

powershell
# Uninstall specific KB
wusa /uninstall /kb:5048732 /quiet /norestart

# Or via PowerShell
Remove-WindowsUpdate -KBArticleID KB5048732 -NoRestart

Keep offline backups or VM snapshots before major patch deployments.

What About Linux and macOS?

Microsoft patches only affect Windows. But January 2026 had security releases for other platforms too:

  • macOS Sonoma 14.7.3 (fixes kernel exploits)
  • Ubuntu 24.04 LTS updates (systemd, OpenSSL patches)
  • Red Hat Enterprise Linux (kernel patches)

Cross-platform teams: check your vendor's security advisories.

The Bigger Picture: Vulnerability Trends

January 2026 Patch Count:

  • Microsoft: 114 vulnerabilities
  • Adobe: 32 vulnerabilities
  • Google Chrome: 18 vulnerabilities
  • Mozilla Firefox: 12 vulnerabilities

Trend: Vulnerability counts are increasing, but time-to-patch is decreasing.

Why:

  • More complex software → More bugs
  • Better fuzzing tools → More discoveries
  • Faster update mechanisms → Quicker deployment

The modern security posture: Assume breaches, minimize dwell time.

Conclusion

Microsoft's January 2026 Patch Tuesday is significant:

  • 114 vulnerabilities
  • 1 actively exploited zero-day (CVE-2026-20805)
  • 2 critical Office RCEs (CVE-2026-20952, CVE-2026-20953)

Action Items:

  1. Patch CVE-2026-20805 (DWM) immediately
  2. Patch Office RCEs (CVE-2026-20952/953) this week
  3. Disable Outlook Preview Pane until patched
  4. Verify patches across your fleet
  5. Review your patch management process

Security isn't about perfection. It's about reducing risk and responding quickly when threats emerge.

January 2026 is a reminder: patch management isn't optional. It's survival.

---

Resources:

JV

Written by Jose Viscasillas

Senior Software Engineer building video platforms at ON24. 21 years of coding experience. I write about React, TypeScript, AI, and developer tools.

Recommended Reads

📬

Subscribe to the Newsletter

New articles delivered to your inbox. No spam, unsubscribe anytime.

Join 500+ developers getting weekly insights on React, TypeScript, and building products.