Microsoft Patch Tuesday security updates for January 2026 fixed actively exploited zero-day
好的,我现在需要帮用户总结这篇文章的内容。用户的要求是用中文总结,控制在100字以内,不需要特定的开头,直接写文章描述即可。 首先,我通读了整篇文章。文章主要讲的是微软在2026年1月的Patch Tuesday发布了安全更新,修复了112个漏洞,其中8个是关键漏洞。这些漏洞影响了Windows、Office、Azure等多个产品。此外,文章提到其中一个漏洞CVE-2026-20805正在被积极利用,还有两个漏洞在发布时已经公开。 接下来,我需要提取关键信息:微软修复了112个漏洞,涉及多个产品;其中有8个是关键漏洞;一个漏洞被积极利用;另外两个是公开的。 然后,我要把这些信息浓缩到100字以内。需要注意用词简洁,避免冗余。例如,“修复了”比“解决了”更直接;“影响”比“涉及”更准确。 最后,检查字数是否符合要求,并确保信息完整准确。这样就能生成一个符合用户要求的总结。 </think> 微软于2026年1月通过Patch Tuesday更新修复了112个安全漏洞,涵盖Windows、Office、Azure等产品。其中8个为关键漏洞,另有三个漏洞已公开或被活跃利用。 2026-1-14 08:43:9 Author: securityaffairs.com(查看原文) 阅读量:0 收藏

Microsoft Patch Tuesday security updates for January 2026 fixed actively exploited zero-day

Microsoft Patch Tuesday addressed 112 security flaws across Windows, Office, Azure, Edge, and more, including eight critical vulnerabilities, kicking off the new year with a major patch update.

Microsoft Patch Tuesday security updates for January 2026 release 112 CVEs affecting Windows, Office, Azure, Edge, SharePoint, SQL Server, SMB, and Windows management services. Including third-party Chromium fixes, the total rises to 114 vulnerabilities. Eight flaws are rated Critical, while the rest are Important. Large January releases are common, as vendors often delay patches during the holidays to avoid disruptions.

One of these flaws, tracked as CVE-2026-20805 (CVSS score of 5.5), is actively exploited in attacks in the wild, while two others are labeled as publicly known at release. CVE-2026-20805 is a Windows Desktop Window Manager flaw that lets attackers leak small pieces of memory information. While it does not directly run malicious code, the leaked data can help attackers bypass security protections and make more serious exploits work.

“Exposure of sensitive information to an unauthorized actor in Desktop Windows Manager allows an authorized attacker to disclose information locally.” reads the advisory. “The type of information that could be disclosed if an attacker successfully exploited this vulnerability is a section address from a remote ALPC port which is user-mode memory.”

This weakness shows how even limited information leaks can play a key role in full system compromise.

Microsoft did not share details about the attacks exploiting this vulnerability.

The following vulnerabilities are labeled as publicly known at release:

  • CVE-2023-31096 (CVSS score of 7.8) – This flaw affects outdated Agere Soft Modem drivers included with Windows. The vulnerability allows attackers to gain higher system privileges by exploiting these drivers. If abused, it could let a local attacker take deeper control of a device. To eliminate the risk, Microsoft removed the vulnerable agrsm64.sys and agrsm.sys drivers in the January 2026 cumulative update.
  • CVE-2026-21265 (CVSS score of 6.4) – affects Windows Secure Boot and relates to expiring security certificates. If administrators do not update these certificates, systems may stop trusting new boot loaders and could fail to receive future security updates. While attackers are unlikely to exploit this issue directly, ignoring it can leave devices unpatched or unable to boot securely. Microsoft disclosed this issue months ago, which is why it is listed as publicly known.
  • CVE-2024-55414 (CVSS score of 6.4) – CVE-2024-55414 affects Motorola Soft Modem drivers included with Windows and allows attackers to gain elevated system privileges. The flaw exists in the smserl64.sys and smserial.sys drivers, which Microsoft removed in the January cumulative update. Systems that still rely on this legacy hardware may face compatibility issues, and Microsoft advises removing any remaining dependencies to reduce security risk.

The full list of CVEs addressed by Microsoft Patch Tuesday security updates for January 2026 is available here.

Follow me on Twitter: @securityaffairs and Facebook and Mastodon

Pierluigi Paganini

(SecurityAffairs – hacking, Patch Tuesday)




文章来源: https://securityaffairs.com/186888/hacking/microsoft-patch-tuesday-security-updates-for-january-2026-fixed-actively-exploited-zero-day.html
如有侵权请联系:admin#unsafe.sh