Microsoft Monthly Security Update – 14 January 2026

In Cyber Security by Matsco Engineering Team

 

Microsoft has released a security advisory on the 14th of January 2026 in line with their regular monthly patch schedule which includes a number of updates to address vulnerabilities in six (6) medium risk and three (3) low risk products.

These updates address vulnerabilities which may impact services through Information Disclosure, Security Restriction Bypass, Remote Code Execution, Data Manipulation, Elevation of Privilege, Spoofing and Denial of Service. 

For more information please see: Microsoft Security Update

This release consists of security updates for the following products, features and roles:

  • Azure Connected Machine Agent
  • Azure Core shared client library for Python
  • Capability Access Management Service (camsvc)
  • Connected Devices Platform Service (Cdpsvc)
  • Desktop Window Manager
  • Dynamic Root of Trust for Measurement (DRTM)
  • Graphics Kernel
  • Host Process for Windows Tasks
  • Inbox COM Objects
  • Microsoft Graphics Component
  • Microsoft Office
  • Microsoft Office Excel
  • Microsoft Office SharePoint
  • Microsoft Office Word
  • Printer Association Object
  • SQL Server
  • Tablet Windows User Interface (TWINUI) Subsystem
  • Windows Admin Center
  • Windows Ancillary Function Driver for WinSock
  • Windows Client-Side Caching (CSC) Service
  • Windows Clipboard Server
  • Windows Cloud Files Mini Filter Driver
  • Windows Common Log File System Driver
  • Windows Deployment Services
  • Windows DWM
  • Windows Error Reporting
  • Windows File Explorer
  • Windows Hello
  • Windows HTTP.sys
  • Windows Hyper-V
  • Windows Installer
  • Windows Internet Connection Sharing (ICS)
  • Windows Kerberos
  • Windows Kernel
  • Windows Kernel Memory
  • Windows Kernel-Mode Drivers
  • Windows LDAP - Lightweight Directory Access Protocol
  • Windows Local Security Authority Subsystem Service (LSASS)
  • Windows Local Session Manager (LSM)
  • Windows Management Services
  • Windows Media
  • Windows NDIS
  • Windows NTFS
  • Windows NTLM
  • Windows Remote Assistance
  • Windows Remote Procedure Call
  • Windows Remote Procedure Call Interface Definition Language (IDL)
  • Windows Routing and Remote Access Service (RRAS)
  • Windows Secure Boot
  • Windows Server Update Service
  • Windows Shell
  • Windows SMB Server
  • Windows Telephony Service
  • Windows TPM
  • Windows Virtualization-Based Security (VBS) Enclave
  • Windows WalletService
  • Windows Win32K - ICOMP

 

CVE-2026-20805 is being exploited in the wild and this vulnerability exist in Desktop Window Manager. Successful exploitation of this vulnerability could allow an authorised attacker to disclose information locally.

CVE-2026-21265 is considered publicly disclosed and this vulnerability exist in the Windows Secure Boot. An attacker who successfully exploited this vulnerability could bypass Secure Boot. 

Please contact the Matsco Solutions team on the below if you would like any further information or would like to schedule a maintenance.

support@matscosolutions.com

Beijing  +86 400 120 2782
Hong Kong  +852 8101 8418
London   +44 (0)20 7821 4950
New York  +1 866 446 9226
Singapore  +65 6100 1090

Share this Post