Skip to content

Patch Tuesday January 2026

Brock Bingham candid headshot
Brock Bingham|January 13, 2026
Orange themed Patch Tuesday banner image
Orange themed Patch Tuesday banner image

It’s 2026, Patch Tuesday is once again upon us, and I’ve got some good news and some bad news. The bad news is that I really thought 2025 was going to be the year that Microsoft patched all the holes, exterminated all the bugs, and fixed all the exploits, but that doesn’t seem to be the case. The good news is that I’ll be here — talking about Patch Tuesday, with no end in sight … At least you won’t have to worry about any MDT related patches. Get it? Cuz Microsoft dropped MDT like a bad habit. 2026 is off to a fun start. Let’s get into the details!

Severity

  • Total exploits patched: 114

  • Critical patches: 8

  • Important: 106

  • Moderate: 0

  • Low: 0

Vulnerability impact

  • Remote code execution: 22

  • Elevation of privilege: 57

  • Information disclosure: 22

  • Spoofing: 5

  • Tampering: 3

  • Denial of service: 2

  • Feature bypass: 3

Availability

  • Publicly disclosed: 2

  • Actively exploited: 1

The highlights

  • CVE-2026-20944, 20952, 20953: Today we get a three-for-one special because our three highest rated critical CVEs all impact Microsoft Office. Two of these CVEs are use after free exploits, and the other is an out-of-bounds read exploit, all of which end up in remote code execution on your devices. What’s interesting is that all three of these were found by different researchers. Oh, and if you’re wondering if the preview pane is an attack vector, why yes — yes it is.

  • CVE-2026-21265: Next up we’ve got CVE-2026-21265 which is, let me get this correct, a Secure Boot certificate expiration security feature bypass vulnerability. Whew! Long story short, there are a lot of systems out there with Microsoft Secure Boot certificates from 2011 that are getting ready to expire this year, and certain defective firmware components can cause certificate trust updates to fail, which can cause disruption of the Secure Boot trust chain. And if that’s not bad enough, bad actors can use that defective cert rotation to bypass Secure Boot security features, though it sounds very difficult to pull off. Those certificates start expiring in June of this year, so definitely keep an eye on your systems.

  • CVE-2026-20805: Last up for our highlights, we’ve got CVE-2026-20805 which is a Desktop Windows Manager information disclosure vulnerability that is actively being exploited in the wild. What fun! Now there isn’t much information about how the exploit works, but the attack vector is local and it does require low level privileges, but obviously people are already taking advantage of this exploit, so definitely get this patched.

Wrapping up

If your New Year’s resolution was to get control of your patch management and possibly even automate the entire process, you’re in luck. PDQ Connect makes it easier than ever to patch your endpoints. And if you suddenly find yourself in need of an imaging solution (RIP MDT), check out SmartDeploy, the easiest and most powerful imaging platform on the market.

Brock Bingham candid headshot
Brock Bingham

Born in the '80s and raised by his NES, Brock quickly fell in love with everything tech. With over 15 years of IT experience, Brock now enjoys the life of luxury as a renowned tech blogger and receiver of many Dundie Awards. In his free time, Brock enjoys adventuring with his wife, kids, and dogs, while dreaming of retirement.

Related articles