top of page
perceptive_background_267k.jpg

Microsoft Fixes 114 Windows Flaws in January 2026 Patch, One Actively Exploited

Published:

14 January 2026 at 09:38:00

Alert date:

14 January 2026 at 11:36:08

Source:

thehackernews.com

Click to open the original link from this advisory

Operating Systems, Zero-Day Vulnerabilities

Microsoft released its first security update for 2026, addressing 114 security flaws in Windows. One vulnerability has been actively exploited in the wild. Of the 114 flaws, 8 are rated Critical and 106 are rated Important in severity. The vulnerabilities include 58 privilege escalation flaws, 22 information disclosure issues, and 21 remote code execution vulnerabilities. This represents a significant monthly patch release with active exploitation occurring.

Technical details

Microsoft patched 114 security flaws in Windows, including CVE-2026-20805, an actively exploited information disclosure vulnerability in Desktop Window Manager (DWM) with CVSS score 5.5. The flaw allows authorized attackers to disclose section addresses from remote ALPC ports in user-mode memory, potentially defeating ASLR protections. Other critical issues include CVE-2026-21265 affecting Secure Boot Certificate Expiration (CVSS 6.4) and CVE-2026-20876 in Windows Virtualization-Based Security Enclave (CVSS 6.7) enabling VTL2 privilege escalation. Microsoft is also expiring three Windows Secure Boot certificates from 2011 in June 2026 and removed vulnerable Agere Soft Modem drivers.

Mitigation steps:

Apply Microsoft's January 2026 Patch Tuesday updates immediately, especially for CVE-2026-20805 which is actively exploited and must be patched by February 3, 2026 according to CISA KEV catalog. Update Windows Secure Boot certificates from 2011 versions to 2023 counterparts before expiration in June 2026. Remove vulnerable Agere Modem drivers. Federal agencies must comply with CISA's patching deadline.

Affected products:

Microsoft Windows
Microsoft Edge browser
Microsoft Edge Android app
Desktop Window Manager (DWM)
Windows Virtualization-Based Security (VBS) Enclave
Windows Secure Boot
Agere Soft Modem drivers (agrsm64.sys
agrsm.sys)
Chromium WebView tag

Related links:

Related CVE's:

Related threat actors:

IOC's:

This article was created with the assistance of AI technology by Perceptive.

© 2025 by Perceptive Security. All rights reserved.

email: info@perceptivesecurity.com

Disclaimer: Deze website toont informatie afkomstig van externe bronnen. Perceptive aanvaardt geen verantwoordelijkheid voor de inhoud, juistheid of volledigheid van deze informatie.

bottom of page