Microsoft January 2026 Patch Tuesday Addresses 3 Zero-Days, 114 Flaws
Summary
Hide ▲
Show ▼
Microsoft's January 2026 Patch Tuesday addressed 114 vulnerabilities, including three zero-days: one actively exploited (CVE-2026-20805) and two publicly disclosed (CVE-2026-21265 and CVE-2023-31096). The updates covered a range of flaw types, with eight classified as 'Critical,' including remote code execution and elevation-of-privilege vulnerabilities. Additionally, Microsoft released emergency out-of-band security updates to patch a high-severity Microsoft Office zero-day vulnerability (CVE-2026-21509) exploited in attacks, affecting multiple Office versions. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added CVE-2026-20805 and CVE-2026-21509 to its Known Exploited Vulnerabilities (KEV) catalog, mandating Federal Civilian Executive Branch (FCEB) agencies to apply the latest fixes by February 3, 2026, and February 16, 2026, respectively. The flaw was discovered by the Microsoft Threat Intelligence Center (MSTIC), the Microsoft Security Response Center (MSRC), and the Office Product Group Security Team, and affects several versions of Microsoft Office 2016, 2019, LTSC 2021, LTSC 2024, and Microsoft 365 Apps for Enterprise.
Timeline
-
26.01.2026 20:20 3 articles · 1d ago
Microsoft Releases Emergency Patch for Actively Exploited Office Zero-Day
The article provides additional details on the high-severity Microsoft Office zero-day vulnerability (CVE-2026-21509), including its discovery by the Microsoft Threat Intelligence Center (MSTIC), the Microsoft Security Response Center (MSRC), and the Office Product Group Security Team. It also confirms the vulnerability's impact on multiple versions of Microsoft Office and the necessity for users to install updates to be protected.
Show sources
- Microsoft patches actively exploited Office zero-day vulnerability — www.bleepingcomputer.com — 26.01.2026 20:20
- Microsoft Office Zero-Day (CVE-2026-21509) - Emergency Patch Issued for Active Exploitation — thehackernews.com — 27.01.2026 09:19
- Microsoft Releases Patch for Office Zero Day Amid Evidence of Exploitation — www.infosecurity-magazine.com — 27.01.2026 12:45
-
13.01.2026 21:57 5 articles · 14d ago
Microsoft Automatically Replaces Expiring Secure Boot Certificates
The article provides additional context on the Secure Boot certificate expiration vulnerability (CVE-2026-21265), including the specific certificates that will expire in June and October 2026.
Show sources
- New Windows updates replace expiring Secure Boot certificates — www.bleepingcomputer.com — 13.01.2026 21:57
- Patch Tuesday, January 2026 Edition — krebsonsecurity.com — 14.01.2026 02:47
- Microsoft Fixes Three Zero-Days on Busy Patch Tuesday — www.infosecurity-magazine.com — 14.01.2026 12:45
- Microsoft Fixes 114 Windows Flaws in January 2026 Patch, One Actively Exploited — thehackernews.com — 14.01.2026 11:38
- Microsoft patches actively exploited Office zero-day vulnerability — www.bleepingcomputer.com — 26.01.2026 20:20
-
13.01.2026 20:34 6 articles · 14d ago
Microsoft January 2026 Patch Tuesday Addresses 3 Zero-Days, 114 Flaws
The article provides additional details on the actively exploited zero-day vulnerability CVE-2026-20805, including its impact on Address Space Layout Randomization (ASLR) and the involvement of the U.S. Cybersecurity and Infrastructure Security Agency (CISA). It also highlights the removal of Agere Soft Modem drivers and the critical-rated privilege escalation flaw in Windows Virtualization-Based Security (VBS) Enclave (CVE-2026-20876). The article mentions that Microsoft previously addressed an actively exploited zero-day flaw in DWM in May 2024 (CVE-2024-30051). Additionally, Microsoft released emergency out-of-band security updates to patch a high-severity Microsoft Office zero-day vulnerability (CVE-2026-21509) exploited in attacks, affecting multiple Office versions.
Show sources
- Microsoft January 2026 Patch Tuesday fixes 3 zero-days, 114 flaws — www.bleepingcomputer.com — 13.01.2026 20:34
- New Windows updates replace expiring Secure Boot certificates — www.bleepingcomputer.com — 13.01.2026 21:57
- Patch Tuesday, January 2026 Edition — krebsonsecurity.com — 14.01.2026 02:47
- Microsoft Fixes Three Zero-Days on Busy Patch Tuesday — www.infosecurity-magazine.com — 14.01.2026 12:45
- Microsoft Fixes 114 Windows Flaws in January 2026 Patch, One Actively Exploited — thehackernews.com — 14.01.2026 11:38
- Microsoft patches actively exploited Office zero-day vulnerability — www.bleepingcomputer.com — 26.01.2026 20:20
Information Snippets
-
Microsoft's January 2026 Patch Tuesday fixes 114 vulnerabilities, including three zero-days.
First reported: 13.01.2026 20:344 sources, 5 articlesShow sources
- Microsoft January 2026 Patch Tuesday fixes 3 zero-days, 114 flaws — www.bleepingcomputer.com — 13.01.2026 20:34
- Patch Tuesday, January 2026 Edition — krebsonsecurity.com — 14.01.2026 02:47
- Microsoft Fixes Three Zero-Days on Busy Patch Tuesday — www.infosecurity-magazine.com — 14.01.2026 12:45
- Microsoft Fixes 114 Windows Flaws in January 2026 Patch, One Actively Exploited — thehackernews.com — 14.01.2026 11:38
- Microsoft patches actively exploited Office zero-day vulnerability — www.bleepingcomputer.com — 26.01.2026 20:20
-
One zero-day (CVE-2026-20805) is actively exploited, affecting the Desktop Window Manager.
First reported: 13.01.2026 20:344 sources, 5 articlesShow sources
- Microsoft January 2026 Patch Tuesday fixes 3 zero-days, 114 flaws — www.bleepingcomputer.com — 13.01.2026 20:34
- Patch Tuesday, January 2026 Edition — krebsonsecurity.com — 14.01.2026 02:47
- Microsoft Fixes Three Zero-Days on Busy Patch Tuesday — www.infosecurity-magazine.com — 14.01.2026 12:45
- Microsoft Fixes 114 Windows Flaws in January 2026 Patch, One Actively Exploited — thehackernews.com — 14.01.2026 11:38
- Microsoft patches actively exploited Office zero-day vulnerability — www.bleepingcomputer.com — 26.01.2026 20:20
-
Two zero-days (CVE-2026-21265 and CVE-2023-31096) are publicly disclosed.
First reported: 13.01.2026 20:344 sources, 6 articlesShow sources
- Microsoft January 2026 Patch Tuesday fixes 3 zero-days, 114 flaws — www.bleepingcomputer.com — 13.01.2026 20:34
- New Windows updates replace expiring Secure Boot certificates — www.bleepingcomputer.com — 13.01.2026 21:57
- Patch Tuesday, January 2026 Edition — krebsonsecurity.com — 14.01.2026 02:47
- Microsoft Fixes Three Zero-Days on Busy Patch Tuesday — www.infosecurity-magazine.com — 14.01.2026 12:45
- Microsoft Fixes 114 Windows Flaws in January 2026 Patch, One Actively Exploited — thehackernews.com — 14.01.2026 11:38
- Microsoft patches actively exploited Office zero-day vulnerability — www.bleepingcomputer.com — 26.01.2026 20:20
-
Eight 'Critical' vulnerabilities are addressed, including remote code execution and elevation-of-privilege flaws.
First reported: 13.01.2026 20:344 sources, 5 articlesShow sources
- Microsoft January 2026 Patch Tuesday fixes 3 zero-days, 114 flaws — www.bleepingcomputer.com — 13.01.2026 20:34
- Patch Tuesday, January 2026 Edition — krebsonsecurity.com — 14.01.2026 02:47
- Microsoft Fixes Three Zero-Days on Busy Patch Tuesday — www.infosecurity-magazine.com — 14.01.2026 12:45
- Microsoft Fixes 114 Windows Flaws in January 2026 Patch, One Actively Exploited — thehackernews.com — 14.01.2026 11:38
- Microsoft patches actively exploited Office zero-day vulnerability — www.bleepingcomputer.com — 26.01.2026 20:20
-
The actively exploited zero-day allows attackers to read memory addresses associated with the remote ALPC port.
First reported: 13.01.2026 20:344 sources, 5 articlesShow sources
- Microsoft January 2026 Patch Tuesday fixes 3 zero-days, 114 flaws — www.bleepingcomputer.com — 13.01.2026 20:34
- Patch Tuesday, January 2026 Edition — krebsonsecurity.com — 14.01.2026 02:47
- Microsoft Fixes Three Zero-Days on Busy Patch Tuesday — www.infosecurity-magazine.com — 14.01.2026 12:45
- Microsoft Fixes 114 Windows Flaws in January 2026 Patch, One Actively Exploited — thehackernews.com — 14.01.2026 11:38
- Microsoft patches actively exploited Office zero-day vulnerability — www.bleepingcomputer.com — 26.01.2026 20:20
-
The Secure Boot certificate expiration vulnerability (CVE-2026-21265) risks threat actors bypassing Secure Boot.
First reported: 13.01.2026 20:342 sources, 3 articlesShow sources
- Microsoft January 2026 Patch Tuesday fixes 3 zero-days, 114 flaws — www.bleepingcomputer.com — 13.01.2026 20:34
- New Windows updates replace expiring Secure Boot certificates — www.bleepingcomputer.com — 13.01.2026 21:57
- Microsoft Fixes Three Zero-Days on Busy Patch Tuesday — www.infosecurity-magazine.com — 14.01.2026 12:45
-
Vulnerable Agere Soft Modem drivers (CVE-2023-31096) have been removed from Windows.
First reported: 13.01.2026 20:344 sources, 5 articlesShow sources
- Microsoft January 2026 Patch Tuesday fixes 3 zero-days, 114 flaws — www.bleepingcomputer.com — 13.01.2026 20:34
- Patch Tuesday, January 2026 Edition — krebsonsecurity.com — 14.01.2026 02:47
- Microsoft Fixes Three Zero-Days on Busy Patch Tuesday — www.infosecurity-magazine.com — 14.01.2026 12:45
- Microsoft Fixes 114 Windows Flaws in January 2026 Patch, One Actively Exploited — thehackernews.com — 14.01.2026 11:38
- Microsoft patches actively exploited Office zero-day vulnerability — www.bleepingcomputer.com — 26.01.2026 20:20
-
Microsoft has started automatically replacing expiring Secure Boot certificates on eligible Windows 11 24H2 and 25H2 systems.
First reported: 13.01.2026 21:574 sources, 5 articlesShow sources
- New Windows updates replace expiring Secure Boot certificates — www.bleepingcomputer.com — 13.01.2026 21:57
- Patch Tuesday, January 2026 Edition — krebsonsecurity.com — 14.01.2026 02:47
- Microsoft Fixes Three Zero-Days on Busy Patch Tuesday — www.infosecurity-magazine.com — 14.01.2026 12:45
- Microsoft Fixes 114 Windows Flaws in January 2026 Patch, One Actively Exploited — thehackernews.com — 14.01.2026 11:38
- Microsoft patches actively exploited Office zero-day vulnerability — www.bleepingcomputer.com — 26.01.2026 20:20
-
Secure Boot certificates used by most Windows devices are set to expire starting in June 2026.
First reported: 13.01.2026 21:574 sources, 5 articlesShow sources
- New Windows updates replace expiring Secure Boot certificates — www.bleepingcomputer.com — 13.01.2026 21:57
- Patch Tuesday, January 2026 Edition — krebsonsecurity.com — 14.01.2026 02:47
- Microsoft Fixes Three Zero-Days on Busy Patch Tuesday — www.infosecurity-magazine.com — 14.01.2026 12:45
- Microsoft Fixes 114 Windows Flaws in January 2026 Patch, One Actively Exploited — thehackernews.com — 14.01.2026 11:38
- Microsoft patches actively exploited Office zero-day vulnerability — www.bleepingcomputer.com — 26.01.2026 20:20
-
Microsoft will automatically update high-confidence devices via Windows Update, but organizations can also deploy Secure Boot certificates using registry keys, the Windows Configuration System (WinCS), and Group Policy settings.
First reported: 13.01.2026 21:574 sources, 5 articlesShow sources
- New Windows updates replace expiring Secure Boot certificates — www.bleepingcomputer.com — 13.01.2026 21:57
- Patch Tuesday, January 2026 Edition — krebsonsecurity.com — 14.01.2026 02:47
- Microsoft Fixes Three Zero-Days on Busy Patch Tuesday — www.infosecurity-magazine.com — 14.01.2026 12:45
- Microsoft Fixes 114 Windows Flaws in January 2026 Patch, One Actively Exploited — thehackernews.com — 14.01.2026 11:38
- Microsoft patches actively exploited Office zero-day vulnerability — www.bleepingcomputer.com — 26.01.2026 20:20
-
CVE-2026-20805 is actively exploited and affects all currently supported and extended security update supported versions of the Windows OS.
First reported: 14.01.2026 02:474 sources, 4 articlesShow sources
- Patch Tuesday, January 2026 Edition — krebsonsecurity.com — 14.01.2026 02:47
- Microsoft Fixes Three Zero-Days on Busy Patch Tuesday — www.infosecurity-magazine.com — 14.01.2026 12:45
- Microsoft Fixes 114 Windows Flaws in January 2026 Patch, One Actively Exploited — thehackernews.com — 14.01.2026 11:38
- Microsoft patches actively exploited Office zero-day vulnerability — www.bleepingcomputer.com — 26.01.2026 20:20
-
CVE-2026-20805 can undermine Address Space Layout Randomization (ASLR), a core operating system security control.
First reported: 14.01.2026 02:474 sources, 4 articlesShow sources
- Patch Tuesday, January 2026 Edition — krebsonsecurity.com — 14.01.2026 02:47
- Microsoft Fixes Three Zero-Days on Busy Patch Tuesday — www.infosecurity-magazine.com — 14.01.2026 12:45
- Microsoft Fixes 114 Windows Flaws in January 2026 Patch, One Actively Exploited — thehackernews.com — 14.01.2026 11:38
- Microsoft patches actively exploited Office zero-day vulnerability — www.bleepingcomputer.com — 26.01.2026 20:20
-
CVE-2026-20952 and CVE-2026-20953 are critical Microsoft Office remote code execution bugs that can be triggered by viewing a booby-trapped message in the Preview Pane.
First reported: 14.01.2026 02:474 sources, 5 articlesShow sources
- Patch Tuesday, January 2026 Edition — krebsonsecurity.com — 14.01.2026 02:47
- Microsoft Fixes Three Zero-Days on Busy Patch Tuesday — www.infosecurity-magazine.com — 14.01.2026 12:45
- Microsoft Fixes 114 Windows Flaws in January 2026 Patch, One Actively Exploited — thehackernews.com — 14.01.2026 11:38
- Microsoft patches actively exploited Office zero-day vulnerability — www.bleepingcomputer.com — 26.01.2026 20:20
- Microsoft Office Zero-Day (CVE-2026-21509) - Emergency Patch Issued for Active Exploitation — thehackernews.com — 27.01.2026 09:19
-
CVE-2023-31096 is an elevation of privilege vulnerability in a modem driver, and Microsoft has removed agrsm64.sys and agrsm.sys from Windows.
First reported: 14.01.2026 02:474 sources, 4 articlesShow sources
- Patch Tuesday, January 2026 Edition — krebsonsecurity.com — 14.01.2026 02:47
- Microsoft Fixes Three Zero-Days on Busy Patch Tuesday — www.infosecurity-magazine.com — 14.01.2026 12:45
- Microsoft Fixes 114 Windows Flaws in January 2026 Patch, One Actively Exploited — thehackernews.com — 14.01.2026 11:38
- Microsoft patches actively exploited Office zero-day vulnerability — www.bleepingcomputer.com — 26.01.2026 20:20
-
CVE-2026-21265 is a critical Security Feature Bypass vulnerability affecting Windows Secure Boot, with certificates set to expire in June 2026 and October 2026.
First reported: 14.01.2026 02:474 sources, 4 articlesShow sources
- Patch Tuesday, January 2026 Edition — krebsonsecurity.com — 14.01.2026 02:47
- Microsoft Fixes Three Zero-Days on Busy Patch Tuesday — www.infosecurity-magazine.com — 14.01.2026 12:45
- Microsoft Fixes 114 Windows Flaws in January 2026 Patch, One Actively Exploited — thehackernews.com — 14.01.2026 11:38
- Microsoft patches actively exploited Office zero-day vulnerability — www.bleepingcomputer.com — 26.01.2026 20:20
-
CVE-2026-20805 is an information disclosure vulnerability in the Desktop Window Manager that leaks sensitive memory details, allowing attackers to weaken system protections and prepare for deeper compromise.
First reported: 14.01.2026 11:383 sources, 3 articlesShow sources
- Microsoft Fixes Three Zero-Days on Busy Patch Tuesday — www.infosecurity-magazine.com — 14.01.2026 12:45
- Microsoft Fixes 114 Windows Flaws in January 2026 Patch, One Actively Exploited — thehackernews.com — 14.01.2026 11:38
- Microsoft patches actively exploited Office zero-day vulnerability — www.bleepingcomputer.com — 26.01.2026 20:20
-
An authorized local attacker can trigger CVE-2026-20805 to disclose a section address from a remote ALPC port residing in user-mode memory, undermining address space layout randomization (ASLR) and other defenses.
First reported: 14.01.2026 11:383 sources, 3 articlesShow sources
- Microsoft Fixes Three Zero-Days on Busy Patch Tuesday — www.infosecurity-magazine.com — 14.01.2026 12:45
- Microsoft Fixes 114 Windows Flaws in January 2026 Patch, One Actively Exploited — thehackernews.com — 14.01.2026 11:38
- Microsoft patches actively exploited Office zero-day vulnerability — www.bleepingcomputer.com — 26.01.2026 20:20
-
CVE-2026-21265 affects nearly every Windows bootloader since Windows 8, with certificates set to expire in June and October 2026.
First reported: 14.01.2026 11:383 sources, 3 articlesShow sources
- Microsoft Fixes Three Zero-Days on Busy Patch Tuesday — www.infosecurity-magazine.com — 14.01.2026 12:45
- Microsoft Fixes 114 Windows Flaws in January 2026 Patch, One Actively Exploited — thehackernews.com — 14.01.2026 11:38
- Microsoft patches actively exploited Office zero-day vulnerability — www.bleepingcomputer.com — 26.01.2026 20:20
-
CVE-2026-21265 could be chained with other vulnerabilities to prevent systems from updating their forbidden signature database before deploying a rootkit.
First reported: 14.01.2026 11:383 sources, 3 articlesShow sources
- Microsoft Fixes Three Zero-Days on Busy Patch Tuesday — www.infosecurity-magazine.com — 14.01.2026 12:45
- Microsoft Fixes 114 Windows Flaws in January 2026 Patch, One Actively Exploited — thehackernews.com — 14.01.2026 11:38
- Microsoft patches actively exploited Office zero-day vulnerability — www.bleepingcomputer.com — 26.01.2026 20:20
-
CVE-2023-31096 is an elevation of privilege (EoP) in the Agere Modem driver that ships with some Windows versions, and Microsoft has removed agrsm64.sys and agrsm.sys from Windows.
First reported: 14.01.2026 11:383 sources, 3 articlesShow sources
- Microsoft Fixes Three Zero-Days on Busy Patch Tuesday — www.infosecurity-magazine.com — 14.01.2026 12:45
- Microsoft Fixes 114 Windows Flaws in January 2026 Patch, One Actively Exploited — thehackernews.com — 14.01.2026 11:38
- Microsoft patches actively exploited Office zero-day vulnerability — www.bleepingcomputer.com — 26.01.2026 20:20
-
Among the 114 CVEs patched by Microsoft this month, 57 are elevation of privilege, 22 are remote code execution, 22 are information disclosure, and 8 are classed as critical.
First reported: 14.01.2026 11:383 sources, 3 articlesShow sources
- Microsoft Fixes Three Zero-Days on Busy Patch Tuesday — www.infosecurity-magazine.com — 14.01.2026 12:45
- Microsoft Fixes 114 Windows Flaws in January 2026 Patch, One Actively Exploited — thehackernews.com — 14.01.2026 11:38
- Microsoft patches actively exploited Office zero-day vulnerability — www.bleepingcomputer.com — 26.01.2026 20:20
-
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added CVE-2026-20805 to its Known Exploited Vulnerabilities (KEV) catalog, mandating Federal Civilian Executive Branch (FCEB) agencies to apply the latest fixes by February 3, 2026.
First reported: 14.01.2026 11:382 sources, 2 articlesShow sources
- Microsoft Fixes 114 Windows Flaws in January 2026 Patch, One Actively Exploited — thehackernews.com — 14.01.2026 11:38
- Microsoft patches actively exploited Office zero-day vulnerability — www.bleepingcomputer.com — 26.01.2026 20:20
-
CVE-2026-20876 is a critical-rated privilege escalation flaw in Windows Virtualization-Based Security (VBS) Enclave, enabling an attacker to obtain Virtual Trust Level 2 (VTL2) privileges.
First reported: 14.01.2026 11:382 sources, 2 articlesShow sources
- Microsoft Fixes 114 Windows Flaws in January 2026 Patch, One Actively Exploited — thehackernews.com — 14.01.2026 11:38
- Microsoft patches actively exploited Office zero-day vulnerability — www.bleepingcomputer.com — 26.01.2026 20:20
-
Microsoft has removed the Agere Soft Modem drivers 'agrsm64.sys' and 'agrsm.sys' due to a two-year-old local privilege escalation flaw (CVE-2023-31096).
First reported: 14.01.2026 11:382 sources, 2 articlesShow sources
- Microsoft Fixes 114 Windows Flaws in January 2026 Patch, One Actively Exploited — thehackernews.com — 14.01.2026 11:38
- Microsoft patches actively exploited Office zero-day vulnerability — www.bleepingcomputer.com — 26.01.2026 20:20
-
In October 2025, Microsoft removed another Agere Modem driver called 'ltmdm64.sys' following in-the-wild exploitation of a privilege escalation vulnerability (CVE-2025-24990).
First reported: 14.01.2026 11:382 sources, 2 articlesShow sources
- Microsoft Fixes 114 Windows Flaws in January 2026 Patch, One Actively Exploited — thehackernews.com — 14.01.2026 11:38
- Microsoft patches actively exploited Office zero-day vulnerability — www.bleepingcomputer.com — 26.01.2026 20:20
-
The article mentions that Microsoft previously addressed an actively exploited zero-day flaw in DWM in May 2024 (CVE-2024-30051).
First reported: 14.01.2026 11:382 sources, 2 articlesShow sources
- Microsoft Fixes 114 Windows Flaws in January 2026 Patch, One Actively Exploited — thehackernews.com — 14.01.2026 11:38
- Microsoft patches actively exploited Office zero-day vulnerability — www.bleepingcomputer.com — 26.01.2026 20:20
-
Microsoft has released emergency out-of-band security updates to patch a high-severity Microsoft Office zero-day vulnerability (CVE-2026-21509) exploited in attacks.
First reported: 26.01.2026 20:203 sources, 3 articlesShow sources
- Microsoft patches actively exploited Office zero-day vulnerability — www.bleepingcomputer.com — 26.01.2026 20:20
- Microsoft Office Zero-Day (CVE-2026-21509) - Emergency Patch Issued for Active Exploitation — thehackernews.com — 27.01.2026 09:19
- Microsoft Releases Patch for Office Zero Day Amid Evidence of Exploitation — www.infosecurity-magazine.com — 27.01.2026 12:45
-
CVE-2026-21509 affects multiple Office versions, including Microsoft Office 2016, Microsoft Office 2019, Microsoft Office LTSC 2021, Microsoft Office LTSC 2024, and Microsoft 365 Apps for Enterprise.
First reported: 26.01.2026 20:203 sources, 3 articlesShow sources
- Microsoft patches actively exploited Office zero-day vulnerability — www.bleepingcomputer.com — 26.01.2026 20:20
- Microsoft Office Zero-Day (CVE-2026-21509) - Emergency Patch Issued for Active Exploitation — thehackernews.com — 27.01.2026 09:19
- Microsoft Releases Patch for Office Zero Day Amid Evidence of Exploitation — www.infosecurity-magazine.com — 27.01.2026 12:45
-
Security updates for Microsoft Office 2016 and 2019 are not yet available and will be released as soon as possible.
First reported: 26.01.2026 20:203 sources, 3 articlesShow sources
- Microsoft patches actively exploited Office zero-day vulnerability — www.bleepingcomputer.com — 26.01.2026 20:20
- Microsoft Office Zero-Day (CVE-2026-21509) - Emergency Patch Issued for Active Exploitation — thehackernews.com — 27.01.2026 09:19
- Microsoft Releases Patch for Office Zero Day Amid Evidence of Exploitation — www.infosecurity-magazine.com — 27.01.2026 12:45
-
The vulnerability allows unauthenticated local attackers to bypass security features through low-complexity attacks that require user interaction.
First reported: 26.01.2026 20:202 sources, 2 articlesShow sources
- Microsoft patches actively exploited Office zero-day vulnerability — www.bleepingcomputer.com — 26.01.2026 20:20
- Microsoft Releases Patch for Office Zero Day Amid Evidence of Exploitation — www.infosecurity-magazine.com — 27.01.2026 12:45
-
Microsoft has provided mitigation measures for Office 2016 and 2019 users to reduce the severity of exploitation until patches are available.
First reported: 26.01.2026 20:203 sources, 3 articlesShow sources
- Microsoft patches actively exploited Office zero-day vulnerability — www.bleepingcomputer.com — 26.01.2026 20:20
- Microsoft Office Zero-Day (CVE-2026-21509) - Emergency Patch Issued for Active Exploitation — thehackernews.com — 27.01.2026 09:19
- Microsoft Releases Patch for Office Zero Day Amid Evidence of Exploitation — www.infosecurity-magazine.com — 27.01.2026 12:45
-
The flaw bypasses OLE mitigations in Microsoft 365 and Microsoft Office which protect users from vulnerable COM/OLE controls.
First reported: 26.01.2026 20:203 sources, 3 articlesShow sources
- Microsoft patches actively exploited Office zero-day vulnerability — www.bleepingcomputer.com — 26.01.2026 20:20
- Microsoft Office Zero-Day (CVE-2026-21509) - Emergency Patch Issued for Active Exploitation — thehackernews.com — 27.01.2026 09:19
- Microsoft Releases Patch for Office Zero Day Amid Evidence of Exploitation — www.infosecurity-magazine.com — 27.01.2026 12:45
-
CVE-2026-21509 has a CVSS score of 7.8 out of 10.0.
First reported: 27.01.2026 09:191 source, 1 articleShow sources
- Microsoft Office Zero-Day (CVE-2026-21509) - Emergency Patch Issued for Active Exploitation — thehackernews.com — 27.01.2026 09:19
-
CVE-2026-21509 bypasses OLE mitigations in Microsoft 365 and Microsoft Office.
First reported: 27.01.2026 09:192 sources, 2 articlesShow sources
- Microsoft Office Zero-Day (CVE-2026-21509) - Emergency Patch Issued for Active Exploitation — thehackernews.com — 27.01.2026 09:19
- Microsoft Releases Patch for Office Zero Day Amid Evidence of Exploitation — www.infosecurity-magazine.com — 27.01.2026 12:45
-
Successful exploitation of CVE-2026-21509 requires user interaction to open a specially crafted Office file.
First reported: 27.01.2026 09:192 sources, 2 articlesShow sources
- Microsoft Office Zero-Day (CVE-2026-21509) - Emergency Patch Issued for Active Exploitation — thehackernews.com — 27.01.2026 09:19
- Microsoft Releases Patch for Office Zero Day Amid Evidence of Exploitation — www.infosecurity-magazine.com — 27.01.2026 12:45
-
The Preview Pane is not an attack vector for CVE-2026-21509.
First reported: 27.01.2026 09:192 sources, 2 articlesShow sources
- Microsoft Office Zero-Day (CVE-2026-21509) - Emergency Patch Issued for Active Exploitation — thehackernews.com — 27.01.2026 09:19
- Microsoft Releases Patch for Office Zero Day Amid Evidence of Exploitation — www.infosecurity-magazine.com — 27.01.2026 12:45
-
Customers running Office 2021 and later will be automatically protected via a service-side change.
First reported: 27.01.2026 09:192 sources, 2 articlesShow sources
- Microsoft Office Zero-Day (CVE-2026-21509) - Emergency Patch Issued for Active Exploitation — thehackernews.com — 27.01.2026 09:19
- Microsoft Releases Patch for Office Zero Day Amid Evidence of Exploitation — www.infosecurity-magazine.com — 27.01.2026 12:45
-
Customers running Office 2016 and 2019 need to install specific updates to patch CVE-2026-21509.
First reported: 27.01.2026 09:192 sources, 2 articlesShow sources
- Microsoft Office Zero-Day (CVE-2026-21509) - Emergency Patch Issued for Active Exploitation — thehackernews.com — 27.01.2026 09:19
- Microsoft Releases Patch for Office Zero Day Amid Evidence of Exploitation — www.infosecurity-magazine.com — 27.01.2026 12:45
-
Microsoft has provided mitigation measures for Office 2016 and 2019 users to reduce the severity of exploitation until patches are available.
First reported: 27.01.2026 09:192 sources, 2 articlesShow sources
- Microsoft Office Zero-Day (CVE-2026-21509) - Emergency Patch Issued for Active Exploitation — thehackernews.com — 27.01.2026 09:19
- Microsoft Releases Patch for Office Zero Day Amid Evidence of Exploitation — www.infosecurity-magazine.com — 27.01.2026 12:45
-
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added CVE-2026-21509 to its Known Exploited Vulnerabilities (KEV) catalog, requiring Federal Civilian Executive Branch (FCEB) agencies to apply the patches by February 16, 2026.
First reported: 27.01.2026 09:192 sources, 2 articlesShow sources
- Microsoft Office Zero-Day (CVE-2026-21509) - Emergency Patch Issued for Active Exploitation — thehackernews.com — 27.01.2026 09:19
- Microsoft Releases Patch for Office Zero Day Amid Evidence of Exploitation — www.infosecurity-magazine.com — 27.01.2026 12:45
-
The flaw was discovered by the Microsoft Threat Intelligence Center (MSTIC), the Microsoft Security Response Center (MSRC), and the Office Product Group Security Team.
First reported: 27.01.2026 12:451 source, 1 articleShow sources
- Microsoft Releases Patch for Office Zero Day Amid Evidence of Exploitation — www.infosecurity-magazine.com — 27.01.2026 12:45
-
The vulnerability affects several versions of Microsoft Office 2016, 2019, LTSC 2021, LTSC 2024, and Microsoft 365 Apps for Enterprise.
First reported: 27.01.2026 12:451 source, 1 articleShow sources
- Microsoft Releases Patch for Office Zero Day Amid Evidence of Exploitation — www.infosecurity-magazine.com — 27.01.2026 12:45
Similar Happenings
CVE-2024-37079 in VMware vCenter Exploited in the Wild
CVE-2024-37079, a critical heap overflow flaw in VMware vCenter Server, is being actively exploited in the wild. The vulnerability, patched in June 2024, allows remote code execution via a specially crafted network packet. Broadcom confirmed the active exploitation and advised customers to apply security patches immediately. CISA added the flaw to its KEV catalog, mandating FCEB agencies to secure their systems by February 13, 2026, under BOD 22-01. There are no known workarounds or mitigations, emphasizing the urgency of applying the latest patches.
CISA Adds Four Actively Exploited Vulnerabilities to KEV Catalog
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has updated its Known Exploited Vulnerabilities (KEV) catalog with four new vulnerabilities that are being actively exploited in the wild. The vulnerabilities affect Synacor Zimbra Collaboration Suite, Versa Concerto SD-WAN, Vite Vitejs, and eslint-config-prettier. Federal agencies are required to apply patches by February 12, 2026. The vulnerabilities include a PHP remote file inclusion flaw, an authentication bypass, an improper access control issue, and a supply chain attack involving malicious code execution. Exploitation of one of the vulnerabilities, CVE-2025-68645, has been ongoing since January 14, 2026. CVE-2025-31125 affects only exposed dev instances and has been patched in versions 6.2.4, 6.1.3, 6.0.13, 5.4.16, and 4.5.11. CVE-2025-34026 is caused by a Traefik reverse proxy misconfiguration that allows access to administrative endpoints, including the internal Actuator endpoint, exposing heap dumps and trace logs. Affected products for CVE-2025-34026 are Concerto 12.1.2 through 12.2.0, although additional versions may also be impacted. Researchers at cybersecurity company ProjectDiscovery reported the issues to the vendor on February 13, 2025, and Versa Concerto confirmed to BleepingComputer that they had fixed them on March 7, 2025. Installing an affected package (versions 8.10.1, 9.1.1, 10.1.6, and 10.1.7) for CVE-2025-54313 would run a malicious install.js script that launched the node-gyp.dll payload on Windows to steal npm authentication tokens. CVE-2025-68645 is a local file inclusion vulnerability in the Webmail Classic UI of Zimbra Collaboration Suite 10.0 and 10.1 caused by improper handling of user-supplied parameters in the RestFilter servlet.
Windows 11 Update KB5074109 Causes Outlook Freezes for POP Users
Microsoft has released emergency out-of-band updates on January 25, 2026, to address an issue causing Microsoft Outlook to freeze for users with POP email accounts. The problem, which affects users of Windows 11 25H2 and 24H2, Windows 10, and multiple Windows Server platforms, occurs when PST files are stored in cloud storage like OneDrive or Dropbox. The issue prevents Outlook from exiting properly and restarting after being closed. Users can temporarily resolve the issue by uninstalling the KB5074109 update or accessing their email accounts via webmail or moving their Outlook PST files out of OneDrive. The out-of-band updates include fixes for other issues, such as access to Microsoft 365 Cloud PC sessions and Secure Launch bugs.
Windows 11 23H2 Shutdown Issue with System Guard Secure Launch
Windows 11 23H2 devices with System Guard Secure Launch enabled fail to shut down properly after installing the January 13, 2026, cumulative update (KB5073455). Affected systems restart instead of shutting down or entering hibernation. This issue impacts Enterprise and IoT editions of Windows 11, version 23H2. Microsoft has provided a temporary workaround for shutdown but no solution for hibernation. The company is also addressing a separate bug in the January 2026 KB5074109 update causing Remote Desktop connection failures. Microsoft has released an out-of-band update (KB5077797) to fix the shutdown issue in Windows 11 23H2.
Microsoft Releases Windows 10 KB5073724 Extended Security Update
Microsoft has released the KB5073724 extended security update for Windows 10, addressing three zero-day vulnerabilities and expiring Secure Boot certificates. The update is available for Windows 10 Enterprise LTSC and systems enrolled in the Extended Security Update (ESU) program. It removes specific modem drivers, updates the WinSqlite3.dll component, and phases in new Secure Boot certificates to prevent potential security breaches. The update brings Windows 10 to build 19045.6809 and Windows 10 Enterprise LTSC 2021 to build 19044.6809.