FREE TRIAL
Patch Tuesday

Microsoft Patch Tuesday – January 2026

8 min. read
13/01/2026
By Esben Dochy
Microsoft Patch Tuesday

⚡ TL;DR | Go Straight to the January 202Patch Tuesday Audit Report

Patch Tuesday is once again upon us. As always, our team has put together the monthly Patch Tuesday Report to help you manage your update progress. The audit report gives you a quick and clear overview of your Windows machines and their patching status. The January 2026 edition of Patch Tuesday brings us 114 fixes, with 8 rated as critical, 1 of which is actively exploited. We’ve listed the most important changes below.

Desktop Window Manager Information Disclosure Vulnerability

The only exploited vulnerability this month is CVE-2026-20805, an information disclosure issue in Windows Desktop Window Manager (DWM) where a local attacker with low privileges can, without user interaction, extract sensitive process/memory-related data. Specifically a user-mode memory section address from a remote ALPC port which can undermine protections like address randomization and make other attacks easier to chain.

Microsoft indicates exploitation has been detected.

Windows Local Security Authority Subsystem Service (LSASS) Remote Code Execution Vulnerability

CVE-2026-20854 is a Critical remote code execution vulnerability in Windows Local Security Authority Subsystem Service (LSASS) caused by a use-after-free memory flaw, where an authenticated attacker with low privileges can trigger LSASS to reference invalid memory during authentication.

While Microsoft rates exploitation less likely due to the high attack complexity, it’s still a high-signal remediation item because LSASS is central to Windows authentication and security enforcement.

Windows Virtualization-Based Security (VBS) Enclave Elevation of Privilege Vulnerability

CVE-2026-20876 is a Critical elevation-of-privilege issue in the Windows VBS Enclave caused by a heap-based buffer overflow, where a local attacker who already has high privileges can, without user interaction and with low complexity, exploit the enclave to elevate into Virtual Trust Level 2 (VTL2) effectively breaching a key virtualization-backed security boundary that’s meant to keep sensitive operations and secrets isolated.

Microsoft currently rates exploitation as less likely and there’s no public disclosure or known exploitation, the potential impact is high across confidentiality, integrity, and availability, so treat it as a high-priority hardening item on devices where VBS is enabled.

Run the Patch Tuesday January 2026 Audit

To help manage your update progress, we’ve created the Patch Tuesday Audit that checks if the assets in your network are on the latest patch updates. The report has been color-coded to see which machines are up-to-date and which ones still need to be updated. As always, system administrators are urged to update their environment as soon as possible to ensure all endpoints are secured.

The Lansweeper Patch Tuesday report is automatically added to your Lansweeper Site. Lansweeper Sites is included in all our licenses without any additional cost and allows you to federate all your installations into one single view so all you need to do is look at one report, automatically added every patch Tuesday!

Patch Tuesday January 2026 CVE Codes & Titles

CVE NumberCVE Title
CVE-2026-21265Secure Boot Certificate Expiration Security Feature Bypass Vulnerability
CVE-2026-21226Azure Core shared client library for Python Remote Code Execution Vulnerability
CVE-2026-21224Azure Connected Machine Agent Elevation of Privilege Vulnerability
CVE-2026-21221Capability Access Management Service (camsvc) Elevation of Privilege Vulnerability
CVE-2026-21219Inbox COM Objects (Global Memory) Remote Code Execution Vulnerability
CVE-2026-20965Windows Admin Center Elevation of Privilege Vulnerability
CVE-2026-20963Microsoft SharePoint Remote Code Execution Vulnerability
CVE-2026-20962Dynamic Root of Trust for Measurement (DRTM) Information Disclosure Vulnerability
CVE-2026-20959Microsoft SharePoint Server Spoofing Vulnerability
CVE-2026-20958Microsoft SharePoint Information Disclosure Vulnerability
CVE-2026-20957Microsoft Excel Remote Code Execution Vulnerability
CVE-2026-20956Microsoft Excel Remote Code Execution Vulnerability
CVE-2026-20955Microsoft Excel Remote Code Execution Vulnerability
CVE-2026-20953Microsoft Office Remote Code Execution Vulnerability
CVE-2026-20952Microsoft Office Remote Code Execution Vulnerability
CVE-2026-20951Microsoft SharePoint Server Remote Code Execution Vulnerability
CVE-2026-20950Microsoft Excel Remote Code Execution Vulnerability
CVE-2026-20949Microsoft Excel Security Feature Bypass Vulnerability
CVE-2026-20948Microsoft Word Remote Code Execution Vulnerability
CVE-2026-20947Microsoft SharePoint Server Remote Code Execution Vulnerability
CVE-2026-20946Microsoft Excel Remote Code Execution Vulnerability
CVE-2026-20944Microsoft Word Remote Code Execution Vulnerability
CVE-2026-20943Microsoft Office Click-To-Run Elevation of Privilege Vulnerability
CVE-2026-20941Host Process for Windows Tasks Elevation of Privilege Vulnerability
CVE-2026-20940Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability
CVE-2026-20939Windows File Explorer Information Disclosure Vulnerability
CVE-2026-20938Windows Virtualization-Based Security (VBS) Enclave Elevation of Privilege Vulnerability
CVE-2026-20937Windows File Explorer Information Disclosure Vulnerability
CVE-2026-20936Windows NDIS Information Disclosure Vulnerability
CVE-2026-20935Windows Virtualization-Based Security (VBS) Information Disclosure Vulnerability
CVE-2026-20934Windows SMB Server Elevation of Privilege Vulnerability
CVE-2026-20932Windows File Explorer Information Disclosure Vulnerability
CVE-2026-20931Windows Telephony Service Elevation of Privilege Vulnerability
CVE-2026-20929Windows HTTP.sys Elevation of Privilege Vulnerability
CVE-2026-20927Windows SMB Server Denial of Service Vulnerability
CVE-2026-20926Windows SMB Server Elevation of Privilege Vulnerability
CVE-2026-20925NTLM Hash Disclosure Spoofing Vulnerability
CVE-2026-20924Windows Management Services Elevation of Privilege Vulnerability
CVE-2026-20923Windows Management Services Elevation of Privilege Vulnerability
CVE-2026-20922Windows NTFS Remote Code Execution Vulnerability
CVE-2026-20921Windows SMB Server Elevation of Privilege Vulnerability
CVE-2026-20920Win32k Elevation of Privilege Vulnerability
CVE-2026-20919Windows SMB Server Elevation of Privilege Vulnerability
CVE-2026-20918Windows Management Services Elevation of Privilege Vulnerability
CVE-2026-20877Windows Management Services Elevation of Privilege Vulnerability
CVE-2026-20876Windows Virtualization-Based Security (VBS) Enclave Elevation of Privilege Vulnerability
CVE-2026-20875Windows Local Security Authority Subsystem Service (LSASS) Denial of Service Vulnerability
CVE-2026-20874Windows Management Services Elevation of Privilege Vulnerability
CVE-2026-20873Windows Management Services Elevation of Privilege Vulnerability
CVE-2026-20872NTLM Hash Disclosure Spoofing Vulnerability
CVE-2026-20871Desktop Windows Manager Elevation of Privilege Vulnerability
CVE-2026-20870Windows Win32 Kernel Subsystem Elevation of Privilege Vulnerability
CVE-2026-20869Windows Local Session Manager (LSM) Elevation of Privilege Vulnerability
CVE-2026-20868Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
CVE-2026-20867Windows Management Services Elevation of Privilege Vulnerability
CVE-2026-20866Windows Management Services Elevation of Privilege Vulnerability
CVE-2026-20865Windows Management Services Elevation of Privilege Vulnerability
CVE-2026-20864Windows Connected Devices Platform Service Elevation of Privilege Vulnerability
CVE-2026-20863Win32k Elevation of Privilege Vulnerability
CVE-2026-20862Windows Management Services Information Disclosure Vulnerability
CVE-2026-20861Windows Management Services Elevation of Privilege Vulnerability
CVE-2026-20860Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
CVE-2026-20859Windows Kernel-Mode Driver Elevation of Privilege Vulnerability
CVE-2026-20858Windows Management Services Elevation of Privilege Vulnerability
CVE-2026-20857Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability
CVE-2026-20856Windows Server Update Service (WSUS) Remote Code Execution Vulnerability
CVE-2026-20854Windows Local Security Authority Subsystem Service (LSASS) Remote Code Execution Vulnerability
CVE-2026-20853Windows WalletService Elevation of Privilege Vulnerability
CVE-2026-20852Windows Hello Tampering Vulnerability
CVE-2026-20851Capability Access Management Service (camsvc) Information Disclosure Vulnerability
CVE-2026-20849Windows Kerberos Elevation of Privilege Vulnerability
CVE-2026-20848Windows SMB Server Elevation of Privilege Vulnerability
CVE-2026-20847Microsoft Windows File Explorer Spoofing Vulnerability
CVE-2026-20844Windows Clipboard Server Elevation of Privilege Vulnerability
CVE-2026-20843Windows Routing and Remote Access Service (RRAS) Elevation of Privilege Vulnerability
CVE-2026-20842Microsoft DWM Core Library Elevation of Privilege Vulnerability
CVE-2026-20840Windows NTFS Remote Code Execution Vulnerability
CVE-2026-20839Windows Client-Side Caching (CSC) Service Information Disclosure Vulnerability
CVE-2026-20838Windows Kernel Information Disclosure Vulnerability
CVE-2026-20837Windows Media Remote Code Execution Vulnerability
CVE-2026-20836DirectX Graphics Kernel Elevation of Privilege Vulnerability
CVE-2026-20835Capability Access Management Service (camsvc) Information Disclosure Vulnerability
CVE-2026-20834Windows Spoofing Vulnerability
CVE-2026-20833Windows Kerberos Information Disclosure Vulnerability
CVE-2026-20832Windows Remote Procedure Call Interface Definition Language (IDL) Elevation of Privilege Vulnerability
CVE-2026-20831Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
CVE-2026-20830Capability Access Management Service (camsvc) Elevation of Privilege Vulnerability
CVE-2026-20829TPM Trustlet Information Disclosure Vulnerability
CVE-2026-20828Windows rndismp6.sys Information Disclosure Vulnerability
CVE-2026-20827Tablet Windows User Interface (TWINUI) Subsystem Information Disclosure Vulnerability
CVE-2026-20826Tablet Windows User Interface (TWINUI) Subsystem Information Disclosure Vulnerability
CVE-2026-20825Windows Hyper-V Information Disclosure Vulnerability
CVE-2026-20824Windows Remote Assistance Security Feature Bypass Vulnerability
CVE-2026-20823Windows File Explorer Information Disclosure Vulnerability
CVE-2026-20822Windows Graphics Component Elevation of Privilege Vulnerability
CVE-2026-20821Remote Procedure Call Information Disclosure Vulnerability
CVE-2026-20820Windows Common Log File System Driver Elevation of Privilege Vulnerability
CVE-2026-20819Windows Virtualization-Based Security (VBS) Information Disclosure Vulnerability
CVE-2026-20818Windows Kernel Information Disclosure Vulnerability
CVE-2026-20817Windows Error Reporting Service Elevation of Privilege Vulnerability
CVE-2026-20816Windows Installer Elevation of Privilege Vulnerability
CVE-2026-20815Capability Access Management Service (camsvc) Elevation of Privilege Vulnerability
CVE-2026-20814DirectX Graphics Kernel Elevation of Privilege Vulnerability
CVE-2026-20812LDAP Tampering Vulnerability
CVE-2026-20811Win32k Elevation of Privilege Vulnerability
CVE-2026-20810Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
CVE-2026-20809Windows Kernel Memory Elevation of Privilege Vulnerability
CVE-2026-20808Windows File Explorer Elevation of Privilege Vulnerability
CVE-2026-20805Desktop Window Manager Information Disclosure Vulnerability
CVE-2026-20804Windows Hello Tampering Vulnerability
CVE-2026-20803Microsoft SQL Server Elevation of Privilege Vulnerability
CVE-2026-0386Windows Deployment Services Remote Code Execution Vulnerability
CVE-2024-55414Windows Motorola Soft Modem Driver Elevation of Privilege Vulnerability
CVE-2023-31096MITRE: CVE-2023-31096 Windows Agere Soft Modem Driver Elevation of Privilege Vulnerability
NO CREDIT CARD REQUIRED

Ready to get started?
You’ll be up and running in no time.

Explore all our features, free for 14 days.