Microsoft’s January Security Update of High-Risk Vulnerability Notice for Multiple Products

Microsoft’s January Security Update of High-Risk Vulnerability Notice for Multiple Products

janeiro 16, 2026 | NSFOCUS

Overview

On January 14, NSFOCUS CERT detected that Microsoft released the January Security Update patch, which fixed 112 security issues involving widely used products such as Windows, Microsoft Office, Microsoft SQL Server, Azure, etc., including high-risk vulnerability types such as privilege escalation and remote code execution.

Among the vulnerabilities fixed by Microsoft’s monthly update this month, there are 8 critical vulnerabilities and 104 important vulnerabilities. These include 1 vulnerability that has been detected for wild exploitation:Desktop Window Manager Information Disclosure Vulnerability (CVE-2026-20805)Please update the patch as soon as possible for protection. For a complete list of vulnerabilities, please refer to the appendix.

Reference link: https://msrc.microsoft.com/update-guide/releaseNote/2026-Jan

Key Vulnerabilities

Based on the product popularity and vulnerability importance, this update contains vulnerabilities with greater impact. Relevant users are requested to pay special attention:

Desktop Window Manager Information Disclosure Vulnerability (CVE-2026-20805):

An information disclosure vulnerability exists in Desktop Window Manager (DWM). Since DWM fails to properly protect memory information when processing operations related to remote ALPC ports, an authenticated attacker can obtain sensitive information of the system through specially crafted requests. This vulnerability has been exploited in the wild, with a CVSS score of 5.5.

Official announcement link:

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20805

Microsoft Office Remote Code Execution Vulnerability (CVE-2026-20952/CVE-2026-20953):

A remote code execution vulnerability exists in Microsoft Office. Due to the use-after-free problem of Microsoft Office when processing specially crafted documents, an unauthenticated attacker can send an email containing a malicious link to the user, which will cause remote code execution after the user previews or clicks it. CVSS score is 8.4.

Official announcement link:

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20952

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20953

Microsoft Excel Remote Code Execution Vulnerability (CVE-2026-20955/CVE-2026-20957):

A remote code execution vulnerability exists in Microsoft Excel. Due to the untrusted pointer dereference and integer underflow problems of Excel, an unauthenticated attacker can trick a user into opening a malicious file, thereby executing arbitrary code on the victim’s host. CVSS score is 7.8.

Official announcement link:

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20955

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20957

Microsoft Word Remote Code Execution Vulnerability (CVE-2026-20944):

A remote code execution vulnerability exists in Microsoft Word. Due to the out-of-bounds read problem of Word, an unauthenticated attacker can trick a user into opening or previewing a pane by making a malicious file, thereby executing arbitrary code in the user’s context. CVSS score is 8.4.

Official announcement link:

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20944

Windows Local Security Authority Subsystem Service (LSASS) Remote Code Execution Vulnerability (CVE-2026-20854):

A remote code execution vulnerability exists in Windows LSASS. Due to the use-after-free issue of Windows LSASS, an authenticated attacker can modify specific directory attributes and provide specially crafted data, causing the system to reference invalid memory to execute arbitrary code. CVSS score is 7.5.

Official announcement link:

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20854

Windows NTFS Remote Code Execution Vulnerability (CVE-2026-20840):

A remote code execution vulnerability exists in Windows NTFS, which could allow an authenticated attacker to execute arbitrary code locally due to a heap-based buffer overflow in Windows NTFS. CVSS score is 7.8.

Official announcement link:

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20840

Windows Graphics Component Privilege Escalation Vulnerability (CVE-2026-20822):

A privilege escalation vulnerability exists in the Windows Graphics Component, which allows an authenticated local attacker to elevate privileges to SYSTEM through conditional competition release reuse (use-after-free). CVSS score is 7.8.

Official announcement link:

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20822

Windows Virtualization-Based Security (VBS) Enclave Privilege Escalation Vulnerability (CVE-2026-20876):

There is a privilege escalation vulnerability in Windows VBS. Due to the heap-based buffer overflow problem of VBS Enclave, an authenticated local attacker can elevate privileges to SYSTEM. CVSS score is 6.7.

Official announcement link:

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20876

Scope of Impact

The following are the affected product versions of some key vulnerabilities. For the scope of products affected by other vulnerabilities, please refer to the official announcement link.

Vulnerability NumberAffected product versions
CVE-2026-20805Windows 10 Version 1809 for x64-based Systems
Windows 10 Version 1809 for 32-bit Systems
Windows Server 2012 R2 (Server Core installation)
Windows Server 2012 R2
Windows Server 2012 (Server Core installation)
Windows Server 2012
Windows Server 2016 (Server Core installation)
Windows Server 2016
Windows 10 Version 1607 for x64-based Systems
Windows 10 Version 1607 for 32-bit Systems
Windows Server 2025
Windows 11 Version 24H2 for x64-based Systems
Windows 11 Version 24H2 for ARM64-based Systems
Windows Server 2022, 23H2 Edition (Server Core installation)
Windows 11 Version 23H2 for x64-based Systems
Windows 11 Version 23H2 for ARM64-based Systems
Windows 11 Version 25H2 for x64-based Systems
Windows 11 Version 25H2 for ARM64-based Systems
Windows Server 2025 (Server Core installation)
Windows 10 Version 22H2 for 32-bit Systems
Windows 10 Version 22H2 for ARM64-based Systems
Windows 10 Version 22H2 for x64-based Systems
Windows 10 Version 21H2 for x64-based Systems
Windows 10 Version 21H2 for ARM64-based Systems
Windows 10 Version 21H2 for 32-bit Systems
Windows Server 2022 (Server Core installation)
Windows Server 2022
Windows Server 2019 (Server Core installation)
Windows Server 2019
CVE-2026-20952/CVE-2026-20953Microsoft Office 2016 (64-bit edition)
Microsoft Office 2016 (32-bit edition)
Microsoft Office LTSC for Mac 2024
Microsoft Office LTSC 2024 for 64-bit editions
Microsoft Office LTSC 2024 for 32-bit editions
Microsoft Office LTSC 2021 for 32-bit editions
Microsoft Office LTSC 2021 for 64-bit editions
Microsoft Office LTSC for Mac 2021
Microsoft 365 Apps for Enterprise for 64-bit Systems
Microsoft 365 Apps for Enterprise for 32-bit Systems
Microsoft Office 2019 for 32-bit editions
Microsoft Office 2019 for 64-bit editions
CVE-2026-20955Microsoft Office LTSC for Mac 2024
Microsoft Office LTSC 2024 for 64-bit editions
Microsoft Office LTSC 2024 for 32-bit editions
Microsoft Office LTSC 2021 for 32-bit editions
Microsoft Office LTSC 2021 for 64-bit editions
Microsoft Office LTSC for Mac 2021
Microsoft 365 Apps for Enterprise for 64-bit Systems
Microsoft 365 Apps for Enterprise for 32-bit Systems
Microsoft Office 2019 for 64-bit editions
Microsoft Office 2019 for 32-bit editions Office Online Server
CVE-2026-20957Microsoft Excel 2016 (64-bit edition)
Microsoft Excel 2016 (32-bit edition)
Microsoft Office LTSC for Mac 2024
Microsoft Office LTSC 2024 for 64-bit editions
Microsoft Office LTSC 2024 for 32-bit editions
Microsoft Office LTSC 2021 for 32-bit editions
Microsoft Office LTSC 2021 for 64-bit editions
Microsoft Office LTSC for Mac 2021
Microsoft 365 Apps for Enterprise for 64-bit Systems
Microsoft 365 Apps for Enterprise for 32-bit Systems
Microsoft Office 2019 for 64-bit editions
Microsoft Office 2019 for 32-bit editions Office Online Server
CVE-2026-20944Microsoft Office LTSC for Mac 2024
Microsoft Office LTSC for Mac 2021
Microsoft 365 Apps for Enterprise for 64-bit Systems
Microsoft 365 Apps for Enterprise for 32-bit Systems
CVE-2026-20854Windows Server 2025
Windows 11 Version 24H2 for x64-based Systems
Windows 11 Version 24H2 for ARM64-based Systems
Windows 11 Version 25H2 for x64-based Systems
Windows 11 Version 25H2 for ARM64-based Systems
Windows Server 2025 (Server Core installation)
CVE-2026-20840Windows 11 Version 24H2 for x64-based Systems
Windows 11 Version 24H2 for ARM64-based Systems
Windows Server 2022, 23H2 Edition (Server Core installation)
Windows 11 Version 23H2 for x64-based Systems
Windows 11 Version 23H2 for ARM64-based Systems
Windows 11 Version 25H2 for x64-based Systems
Windows 11 Version 25H2 for ARM64-based Systems
Windows Server 2025 (Server Core installation)
Windows 10 Version 22H2 for 32-bit Systems
Windows 10 Version 22H2 for ARM64-based Systems
Windows 10 Version 22H2 for x64-based Systems
Windows 10 Version 21H2 for x64-based Systems
Windows Server 2012 R2 (Server Core installation)
Windows Server 2012 R2
Windows Server 2012 (Server Core installation)
Windows Server 2012
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)
Windows Server 2008 R2 for x64-based Systems Service Pack 1
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)
Windows Server 2008 for x64-based Systems Service Pack 2
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)
Windows Server 2008 for 32-bit Systems Service Pack 2
Windows Server 2016 (Server Core installation)
Windows Server 2016
Windows 10 Version 1607 for x64-based Systems
Windows 10 Version 1607 for 32-bit Systems
Windows Server 2025
Windows 10 Version 21H2 for ARM64-based Systems
Windows 10 Version 21H2 for 32-bit Systems
Windows Server 2022 (Server Core installation)
Windows Server 2022
Windows Server 2019 (Server Core installation)
Windows Server 2019
Windows 10 Version 1809 for x64-based Systems
Windows 10 Version 1809 for 32-bit Systems
CVE-2026-20822Windows Server 2016 (Server Core installation)
Windows Server 2016
Windows 10 Version 1607 for x64-based Systems
Windows 10 Version 1607 for 32-bit Systems
Windows Server 2025
Windows 11 Version 24H2 for x64-based Systems
Windows 11 Version 24H2 for ARM64-based Systems
Windows Server 2022, 23H2 Edition (Server Core installation)
Windows 11 Version 23H2 for x64-based Systems
Windows 11 Version 23H2 for ARM64-based Systems
Windows 11 Version 25H2 for x64-based Systems
Windows 11 Version 25H2 for ARM64-based Systems
Windows Server 2025 (Server Core installation)
Windows 10 Version 22H2 for 32-bit Systems
Windows 10 Version 22H2 for ARM64-based Systems
Windows 10 Version 22H2 for x64-based Systems
Windows 10 Version 21H2 for x64-based Systems
Windows 10 Version 21H2 for ARM64-based Systems
Windows 10 Version 21H2 for 32-bit Systems
Windows Server 2022 (Server Core installation)
Windows Server 2022
Windows Server 2019 (Server Core installation)
Windows Server 2019
Windows 10 Version 1809 for x64-based Systems
Windows 10 Version 1809 for 32-bit Systems
CVE-2026-20876Windows Server 2025
Windows 11 Version 24H2 for x64-based Systems
Windows 11 Version 24H2 for ARM64-based Systems
Windows Server 2022, 23H2 Edition (Server Core installation)
Windows 11 Version 23H2 for x64-based Systems
Windows 11 Version 23H2 for ARM64-based Systems
Windows 11 Version 25H2 for x64-based Systems
Windows 11 Version 25H2 for ARM64-based Systems
Windows Server 2025 (Server Core installation)

Mitigation

Patch update

At present, Microsoft has officially released security patches to fix the above vulnerabilities for supported product versions. It is strongly recommended that affected users install patches as soon as possible for protection. The official download link:

https://msrc.microsoft.com/update-guide/releaseNote/2026-Jan

Note: Patch updates for Windows Update may fail due to network problems, computer environment problems, etc. After installing the patch, users should check whether the patch has been successfully updated in time.

Right-click the Windows icon, select “Settings (N)”, select “Update and Security”-“Windows Update”, view the prompt information on this page, or click “View Update History” to view the historical update status.

For updates that have not been successfully installed, you can click the update name to jump to the Microsoft official download page. It is recommended that users click the link on this page and go to the “Microsoft Update Catalog” website to download the independent program package and install it.

Appendix

Affected productsCVE No.Vulnerability TitleSeverity
WindowsCVE-2026-20822Windows Graphics Component Escalation VulnerabilityCritical
WindowsCVE-2026-20876Windows Virtualization-Based Security (VBS) Enclave Escalation VulnerabilityCritical
Microsoft OfficeCVE-2026-20944Microsoft Word remote code execution vulnerabilityCritical
Microsoft OfficeCVE-2026-20953Microsoft Office Remote Code Execution VulnerabilityCritical
Microsoft OfficeCVE-2026-20955Microsoft Excel Remote Code Execution VulnerabilityCritical
WindowsCVE-2026-20854Windows Local Security Authority Subsystem Service (LSASS) Remote Code Execution VulnerabilityCritical
Microsoft OfficeCVE-2026-20952Microsoft Office Remote Code Execution VulnerabilityCritical
Microsoft OfficeCVE-2026-20957Microsoft Excel Remote Code Execution VulnerabilityCritical
WindowsCVE-2026-20962Dynamic Root of Trust for Measurement (DRTM) information disclosure vulnerabilityImportant
WindowsCVE-2026-21265Secure Boot Certificate Expiration security feature bypass vulnerabilityImportant
WindowsCVE-2026-0386Windows Deployment Services Remote Code Execution VulnerabilityImportant
Microsoft SQL ServerCVE-2026-20803Microsoft SQL Server Privilege Escalation VulnerabilityImportant
AzureCVE-2026-20965Windows Admin Center Privilege Escalation VulnerabilityImportant
WindowsCVE-2026-20804Windows Hello tampering vulnerabilityImportant
WindowsCVE-2026-20805Desktop Window Manager Information Disclosure VulnerabilityImportant
WindowsCVE-2026-20808Windows File Explorer Privilege Escalation VulnerabilityImportant
WindowsCVE-2026-20809Windows Kernel Memory Permission Escalation VulnerabilityImportant
WindowsCVE-2026-20810Windows Ancillary Function Driver for WinSock Privilege Escalation VulnerabilityImportant
WindowsCVE-2026-20811Win32k Privilege Escalation VulnerabilityImportant
WindowsCVE-2026-20812LDAP Tampering VulnerabilityImportant
WindowsCVE-2026-20814DirectX Graphics Kernel privilege escalation vulnerabilityImportant
WindowsCVE-2026-20815Capability Access Management Service (camsvc) privilege escalation vulnerabilityImportant
WindowsCVE-2026-20816Windows Installer privilege escalation vulnerabilityImportant
WindowsCVE-2026-20817Windows Error Reporting Service privilege escalation vulnerabilityImportant
WindowsCVE-2026-20818Windows Kernel Information Disclosure VulnerabilityImportant
WindowsCVE-2026-20819Windows Virtualization-Based Security (VBS) Information Disclosure VulnerabilityImportant
WindowsCVE-2026-20820Windows Common Log File System Driver Escalation VulnerabilityImportant
WindowsCVE-2026-20821Remote Procedure Call information leakage vulnerabilityImportant
WindowsCVE-2026-20823Windows File Explorer Information Disclosure VulnerabilityImportant
WindowsCVE-2026-20824Windows Remote Assistance security feature bypass vulnerabilityImportant
WindowsCVE-2026-20825Windows Hyper-V Information Disclosure VulnerabilityImportant
WindowsCVE-2026-20826Tablet Windows User Interface (TWINUI) Subsystem Information Disclosure VulnerabilityImportant
WindowsCVE-2026-20827Tablet Windows User Interface (TWINUI) Subsystem Information Disclosure VulnerabilityImportant
WindowsCVE-2026-20828Windows rndismp6.sys information disclosure vulnerabilityImportant
WindowsCVE-2026-20829TPM Trustlet information leakage vulnerabilityImportant
WindowsCVE-2026-20831Windows Ancillary Function Driver for WinSock Privilege Escalation VulnerabilityImportant
WindowsCVE-2026-20832Windows Remote Procedure Call Interface Definition Language (IDL) Privilege Escalation VulnerabilityImportant
WindowsCVE-2026-20833Windows Kerberos Information Disclosure VulnerabilityImportant
WindowsCVE-2026-20834Windows spoofing vulnerabilityImportant
WindowsCVE-2026-20835Capability Access Management Service (camsvc) information disclosure vulnerabilityImportant
WindowsCVE-2026-20836DirectX Graphics Kernel privilege escalation vulnerabilityImportant
WindowsCVE-2026-20837Windows Media Remote Code Execution VulnerabilityImportant
WindowsCVE-2026-20838Windows Kernel Information Disclosure VulnerabilityImportant
WindowsCVE-2026-20839Windows Client-Side Caching (CSC) Service Information Disclosure VulnerabilityImportant
WindowsCVE-2026-20840Windows NTFS Remote Code Execution VulnerabilityImportant
WindowsCVE-2026-20842Microsoft DWM Core Library Privilege Escalation VulnerabilityImportant
WindowsCVE-2026-20844Windows Clipboard Server Privilege Escalation VulnerabilityImportant
WindowsCVE-2026-20847Microsoft Windows File Explorer spoofing vulnerabilityImportant
WindowsCVE-2026-20851Capability Access Management Service (camsvc) information disclosure vulnerabilityImportant
WindowsCVE-2026-20852Windows Hello tampering vulnerabilityImportant
WindowsCVE-2026-20856Windows Server Update Service (WSUS) Remote Code Execution VulnerabilityImportant
WindowsCVE-2026-20857Windows Cloud Files Mini Filter Driver privilege escalation vulnerabilityImportant
WindowsCVE-2026-20858Windows Management Services Privilege Escalation VulnerabilityImportant
WindowsCVE-2026-20859Windows Kernel-Mode Driver privilege escalation vulnerabilityImportant
WindowsCVE-2026-20860Windows Ancillary Function Driver for WinSock Privilege Escalation VulnerabilityImportant
WindowsCVE-2026-20864Windows Connected Devices Platform Service privilege escalation vulnerabilityImportant
WindowsCVE-2026-20865Windows Management Services Privilege Escalation VulnerabilityImportant
WindowsCVE-2026-20869Windows Local Session Manager (LSM) Privilege Escalation VulnerabilityImportant
WindowsCVE-2026-20875Windows Local Security Authority Subsystem Service (LSASS) Denial of Service VulnerabilityImportant
WindowsCVE-2026-20877Windows Management Services Privilege Escalation VulnerabilityImportant
WindowsCVE-2026-20918Windows Management Services Privilege Escalation VulnerabilityImportant
WindowsCVE-2026-20919Windows SMB Server Privilege Escalation VulnerabilityImportant
WindowsCVE-2026-20920Win32k Privilege Escalation VulnerabilityImportant
WindowsCVE-2026-20921Windows SMB Server Privilege Escalation VulnerabilityImportant
WindowsCVE-2026-20922Windows NTFS Remote Code Execution VulnerabilityImportant
WindowsCVE-2026-20923Windows Management Services Privilege Escalation VulnerabilityImportant
WindowsCVE-2026-20924Windows Management Services Privilege Escalation VulnerabilityImportant
WindowsCVE-2026-20925NTLM Hash Disclosure spoofing vulnerabilityImportant
WindowsCVE-2026-20926Windows SMB Server Privilege Escalation VulnerabilityImportant
WindowsCVE-2026-20927Windows SMB Server Denial of Service VulnerabilityImportant
WindowsCVE-2026-20932Windows File Explorer Information Disclosure VulnerabilityImportant
WindowsCVE-2026-20934Windows SMB Server Privilege Escalation VulnerabilityImportant
WindowsCVE-2026-20938Windows Virtualization-Based Security (VBS) Enclave Escalation VulnerabilityImportant
WindowsCVE-2026-20940Windows Cloud Files Mini Filter Driver privilege escalation vulnerabilityImportant
Microsoft OfficeCVE-2026-20943Microsoft Office Click-To-Run privilege escalation vulnerabilityImportant
Microsoft OfficeCVE-2026-20946Microsoft Excel Remote Code Execution VulnerabilityImportant
Microsoft OfficeCVE-2026-20951Microsoft SharePoint Server Remote Code Execution VulnerabilityImportant
Microsoft OfficeCVE-2026-20956Microsoft Excel Remote Code Execution VulnerabilityImportant
Microsoft OfficeCVE-2026-20959Microsoft SharePoint Server Spoofing VulnerabilityImportant
Microsoft OfficeCVE-2026-20963Microsoft SharePoint Remote Code Execution VulnerabilityImportant
WindowsCVE-2026-20830Capability Access Management Service (camsvc) privilege escalation vulnerabilityImportant
WindowsCVE-2026-21221Capability Access Management Service (camsvc) privilege escalation vulnerabilityImportant
AzureCVE-2026-21224Azure Connected Machine Agent privilege escalation vulnerabilityImportant
Microsoft OfficeCVE-2026-20947Microsoft SharePoint Server Remote Code Execution VulnerabilityImportant
WindowsCVE-2026-20843Windows Routing and Remote Access Service (RRAS) Privilege Escalation VulnerabilityImportant
WindowsCVE-2026-20848Windows SMB Server Privilege Escalation VulnerabilityImportant
WindowsCVE-2026-20849Windows Kerberos privilege escalation vulnerabilityImportant
WindowsCVE-2026-20853Windows WalletService privilege escalation vulnerabilityImportant
Windows SDKCVE-2026-21219Inbox COM Objects (Global Memory) Remote Code Execution VulnerabilityImportant
WindowsCVE-2026-20861Windows Management Services Privilege Escalation VulnerabilityImportant
WindowsCVE-2026-20862Windows Management Services Information Disclosure VulnerabilityImportant
WindowsCVE-2026-20863Win32k Privilege Escalation VulnerabilityImportant
WindowsCVE-2026-20866Windows Management Services Privilege Escalation VulnerabilityImportant
WindowsCVE-2026-20867Windows Management Services Privilege Escalation VulnerabilityImportant
WindowsCVE-2026-20868Windows Routing and Remote Access Service (RRAS) remote code execution vulnerabilityImportant
WindowsCVE-2026-20870Windows Win32 Kernel Subsystem Privilege Escalation VulnerabilityImportant
WindowsCVE-2026-20871Desktop Windows Manager privilege escalation vulnerabilityImportant
WindowsCVE-2026-20872NTLM Hash Disclosure spoofing vulnerabilityImportant
WindowsCVE-2026-20873Windows Management Services Privilege Escalation VulnerabilityImportant
WindowsCVE-2026-20874Windows Management Services Privilege Escalation VulnerabilityImportant
WindowsCVE-2026-20929Windows HTTP.sys Privilege Escalation VulnerabilityImportant
WindowsCVE-2026-20931Windows Telephony Service privilege escalation vulnerabilityImportant
WindowsCVE-2026-20935Windows Virtualization-Based Security (VBS) Information Disclosure VulnerabilityImportant
WindowsCVE-2026-20936Windows NDIS Information Disclosure VulnerabilityImportant
WindowsCVE-2026-20937Windows File Explorer Information Disclosure VulnerabilityImportant
WindowsCVE-2026-20939Windows File Explorer Information Disclosure VulnerabilityImportant
Microsoft OfficeCVE-2026-20948Microsoft Word remote code execution vulnerabilityImportant
Microsoft OfficeCVE-2026-20949Microsoft Excel security feature bypass vulnerabilityImportant
Microsoft OfficeCVE-2026-20950Microsoft Excel Remote Code Execution VulnerabilityImportant
Microsoft OfficeCVE-2026-20958Microsoft SharePoint Information Disclosure VulnerabilityImportant
WindowsCVE-2026-20941Host Process for Windows Tasks Privilege Escalation VulnerabilityImportant
AzureCVE-2026-21226Azure Core shared client library for Python remote code execution vulnerabilityImportant

Statement

This advisory is only used to describe a potential risk. NSFOCUS does not provide any commitment or promise on this advisory. NSFOCUS and the author will not bear any liability for any direct and/or indirect consequences and losses caused by transmitting and/or using this advisory. NSFOCUS reserves all the rights to modify and interpret this advisory. Please include this statement paragraph when reproducing or transferring this advisory. Do not modify this advisory, add/delete any information to/from it, or use this advisory for commercial purposes without permission from NSFOCUS.

About NSFOCUS

NSFOCUS, a pioneering leader in cybersecurity, is dedicated to safeguarding telecommunications, Internet service providers, hosting providers, and enterprises from sophisticated cyberattacks.

Founded in 2000, NSFOCUS operates globally with over 4000 employees at two headquarters in Beijing, China, and Santa Clara, CA, USA, and over 50 offices worldwide. It has a proven track record of protecting over 25% of the Fortune Global 500 companies, including four of the five largest banks and six of the world’s top ten telecommunications companies.

Leveraging technical prowess and innovation, NSFOCUS delivers a comprehensive suite of security solutions, including the Intelligent Security Operations Platform (ISOP) for modern SOC, DDoS Protection, Continuous Threat Exposure Management (CTEM) Service and Web Application and API Protection (WAAP). All the solutions and services are augmented by the Security Large Language Model (SecLLM), ML, patented algorithms and other cutting-edge research achievements developed by NSFOCUS.