Skip to Content

Patch Tuesday - 01.2026

Monthly Vendor Security Updates
14 January 2026 by
Security Team

January Security Updates

Each month we round up the regular security releases from major product vendors, providing a basic overview for consumers and small businesses along with a more technical summary for IT professionals.

General Overview Technical Summary

LANDR Security. International consultants.

General Overview

This January update roundup covers security fixes released by Microsoft, Apple, Google for Android and Chrome, and Mozilla for the Firefox browser.

Together, these updates address a range of security weaknesses in computers, mobile phones, tablets, and web browsers that many small businesses and individuals use every day. Some fixes close more serious gaps that could allow attackers to access systems or data, while others improve overall safety and reliability.

For small business owners, the key takeaway is straightforward. Regularly applying updates is one of the simplest and most effective steps you can take to protect your business. Keep devices, software and browsers up to date, apply updates when prompted - even when you think you know best. While updates can sometimes be inconvenient, delaying them increases the risk of security issues later on. Where possible, major updates should be planned outside of busy working hours, and any systems that support critical business functions should be checked afterwards to confirm everything is running smoothly.

Windows Updates - 25H2 / 24H2

Microsoft fixes 112 security issues, including 8 rated Critical. These updates close gaps that could have allowed attackers to remotely compromise a computer or gain higher access without the user’s knowledge. Installing the updates helps protect home and small business devices from data loss, fraud, and disruption.


Apple macOS - 26.2 / 18.7.3

macOS security updates from Apple address vulnerabilities that could have allowed malicious software or websites to access personal data, bypass built-in protections, or gain greater control of a Mac without the user’s knowledge.

Google Chrome Web Browser - 144

Updates for the Chrome web browser from Google fix security flaws that could have allowed malicious websites to run harmful code, steal information, or interfere with normal browsing. Web browsers are a common target for attackers because they are used daily, often to access email, banking, and cloud services. Keeping Chrome up to date helps protect users from online scams, data theft, and compromised websites, particularly for small businesses and home users who rely heavily on the browser for everyday tasks.


Firefox Web Browser - 143

Updates for the Firefox web browser address security flaws that could have allowed malicious websites to access data, track users, or interfere with normal browsing.


Apple iPhone iOS - 26.2 / 18.7.3

Apple fix vulnerabilities that could have allowed malicious apps or websites to access personal information, interfere with normal phone operation, or bypass built-in security controls. While most users would not notice these issues, keeping iPhones up to date helps protect against data exposure, scams, and unauthorised access, particularly where devices are used for email, messaging, and work related activity.


Android Updates

Google address vulnerabilities that could have allowed malicious apps or websites to access data, track users, or gain greater control of a device without permission. 



Subscribe To Our Security Update Mailing List

Get all the latest security release & Patch Tuesday updates, delivered directly to your inbox.

Thanks for registering!



Technical Summary

Microsoft opens 2026 with a substantial Patch Tuesday release, delivering 112 security updates across Windows and its core components, Microsoft Office, Azure, Microsoft Edge (Chromium based), SharePoint Server, SQL Server, the SMB Server stack, and Windows Management Services.

Eight of the vulnerabilities addressed in this cycle are rated Critical, with the remaining fixes classified as Important. As usual, the Critical issues largely relate to remote code execution and privilege escalation scenarios that could be exploited without user interaction or with minimal preconditions, particularly within core Windows services and widely deployed enterprise platforms. For IT and security teams, this reinforces the need to prioritise rapid testing and deployment, especially where exposed services, legacy protocols, or shared infrastructure components are in use.

January releases are often heavier than average, and this month follows a familiar pattern. Many vendors, Microsoft included, deliberately defer non urgent fixes during the Christmas and New Year period to reduce the risk of unplanned outages or operational disruption when staffing levels are lower. The result is a compressed release cycle in early January, where multiple months of remediation activity converge into a single update window.

From an operational perspective, organisations should expect a broader than normal testing scope, with attention paid not just to endpoints but also to server roles, identity dependent services, and line of business applications that integrate with Windows, SQL Server, or SharePoint. Change management, rollback planning, and clear internal communications are particularly important during these larger patch cycles, as the likelihood of compatibility issues or performance regressions is inherently higher.


High Profile Vulnerabilities

CVE-2026-20952 - Microsoft Office Remote Code Execution Vulnerability

CVSS: 8.4

Type: RCE

Overview
CVE-2026-20952 is a use-after-free memory corruption vulnerability in Microsoft Office products. A use-after-free flaw occurs when software continues to access memory that has already been released, creating an opportunity for attackers to insert malicious data or code into that memory and change how the program behaves. In this case, the vulnerability could allow an unauthorised attacker to execute code on the affected system with the same privileges as the logged-in user.

Susceptibility
Devices running unpatched versions of Microsoft Office that are affected by this issue are susceptible if a local attacker can run crafted code, for example through a malicious document or automated script. Because the flaw requires local code execution and does not involve remote network access on its own, it is less likely to be weaponised across the internet without additional conditions. However, successful exploitation could allow a malicious actor already on the system to execute arbitrary code, potentially leading to data compromise or further system abuse. Applying the January 2026 security update from Microsoft fully mitigates this vulnerability.

Public: No

Exploited: No

CVE-2026-20809 - Windows Kernel Memory Elevation of Privilege Vulnerability

CVSS: 7.8

Type: EoP

Overview
CVE-2026-20809 is a Windows Kernel Memory elevation of privilege vulnerability addressed in Microsoft’s January 2026 Patch Tuesday updates. The flaw is caused by a race condition in how the Windows kernel handles memory operations, which could allow a locally authenticated attacker to manipulate system behaviour and execute code with higher privileges than intended. Successful exploitation could result in an attacker gaining SYSTEM level access, giving them broad control over the affected device.

Susceptibility
Any supported Windows system that has not applied the January 2026 security updates from Microsoft is potentially vulnerable. Exploitation requires local access, meaning the attacker must already be able to run code on the system, but no user interaction is required. This makes the issue particularly relevant for shared systems, servers, and environments where users do not operate with strict privilege separation. Applying the relevant Windows updates fully mitigates the vulnerability.

Public: No

Exploited: No

CVE-2026-20963 - Microsoft SharePoint Remote Code Execution Vulnerability

CVSS: 8.8

Type: RCE

Overview
CVE-2026-20963 is a remote code execution vulnerability in Microsoft Office SharePoint caused by deserialisation of untrusted data. An authorised attacker could execute code over a network if the vulnerable SharePoint Server is not patched.

Susceptibility
SharePoint Server Subscription Edition, SharePoint Server 2019, and SharePoint Server 2016 are susceptible if they have not applied the January 2026 security updates that remediate CVE-2026-20963. Exposure is highest where on premises SharePoint is reachable over the network by untrusted users or untrusted traffic paths

Public: No

Exploited: No


DISCLAIMER

As always, enable auto-updates in product packages. This will address wider vulnerabilities than disclosed here.
Where applying updates automatically is not possible, exercise good vulnerability triage and apply all security patches within 14 days.

Security Team 14 January 2026
Share this post
Tags
PT
Archive