{"id":34880,"date":"2026-01-16T01:57:00","date_gmt":"2026-01-16T01:57:00","guid":{"rendered":"https:\/\/nsfocusglobal.com\/?p=33089"},"modified":"2026-04-13T08:51:25","modified_gmt":"2026-04-13T08:51:25","slug":"microsofts-january-security-update-of-high-risk-vulnerability-notice-for-multiple-products","status":"publish","type":"post","link":"https:\/\/nsfocusglobal.com\/pt-br\/microsofts-january-security-update-of-high-risk-vulnerability-notice-for-multiple-products\/","title":{"rendered":"Microsoft\u2019s January Security Update of High-Risk Vulnerability Notice for Multiple Products"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">Overview<\/h2>\n\n\n\n<p>On January 14, NSFOCUS CERT detected that Microsoft released the January Security Update patch, which fixed 112 security issues involving<a><\/a><a><\/a> widely used products such as Windows, Microsoft Office, Microsoft SQL Server, Azure, etc., including high-risk vulnerability types such as privilege escalation and remote code execution.<\/p>\n\n\n\n<p>Among the vulnerabilities fixed by Microsoft&#8217;s monthly update this month, there are 8 critical vulnerabilities and 104 important vulnerabilities. These include 1 vulnerability that has been detected for wild exploitation:Desktop Window Manager Information Disclosure Vulnerability (CVE-2026-20805)Please update the patch as soon as possible for protection. For a complete list of vulnerabilities, please refer to the appendix.<\/p>\n\n\n\n<p>Reference link: <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/releaseNote\/2026-Jan\">https:\/\/msrc.microsoft.com\/update-guide\/releaseNote\/2026-Jan<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Key Vulnerabilities<\/h2>\n\n\n\n<p>Based on the product popularity and vulnerability importance, this update contains vulnerabilities with greater impact. Relevant users are requested to pay special attention:<\/p>\n\n\n\n<p><strong>Desktop Window Manager Information Disclosure Vulnerability (CVE-2026-20805):<\/strong><\/p>\n\n\n\n<p>An information disclosure vulnerability exists in Desktop Window Manager (DWM). Since DWM fails to properly protect memory information when processing operations related to remote ALPC ports, an authenticated attacker can obtain sensitive information of the system through specially crafted requests. This vulnerability has been exploited in the wild, with a CVSS score of 5.5.<\/p>\n\n\n\n<p>Official announcement link:<\/p>\n\n\n\n<p><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-20805\">https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-20805<\/a><\/p>\n\n\n\n<p><strong>Microsoft Office Remote Code Execution<\/strong><strong> Vulnerability (CVE-2026-20952\/CVE-2026-20953):<\/strong><strong><\/strong><\/p>\n\n\n\n<p>A remote code execution vulnerability exists in Microsoft Office. Due to the use-after-free problem of Microsoft Office when processing specially crafted documents, an unauthenticated attacker can send an email containing a malicious link to the user, which will cause remote code execution after the user previews or clicks it. CVSS score is 8.4.<\/p>\n\n\n\n<p>Official announcement link:<\/p>\n\n\n\n<p><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-20952\">https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-20952<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-20953\">https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-20953<\/a><\/p>\n\n\n\n<p><strong>Microsoft Excel Remote Code Execution Vulnerability (CVE-2026-20955\/CVE-2026-20957):<\/strong><strong><\/strong><\/p>\n\n\n\n<p>A remote code execution vulnerability exists in Microsoft Excel. Due to the untrusted pointer dereference and integer underflow problems of Excel, an unauthenticated attacker can trick a user into opening a malicious file, thereby executing arbitrary code on the victim&#8217;s host. CVSS score is 7.8.<\/p>\n\n\n\n<p>Official announcement link:<\/p>\n\n\n\n<p><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-20955\">https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-20955<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-20957\">https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-20957<\/a><\/p>\n\n\n\n<p><strong>Microsoft Word Remote Code Execution Vulnerability (CVE-2026-20944):<\/strong><strong><\/strong><\/p>\n\n\n\n<p>A remote code execution vulnerability exists in Microsoft Word. Due to the out-of-bounds read problem of Word, an unauthenticated attacker can trick a user into opening or previewing a pane by making a malicious file, thereby executing arbitrary code in the user&#8217;s context. CVSS score is 8.4.<\/p>\n\n\n\n<p>Official announcement link:<\/p>\n\n\n\n<p><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-20944\">https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-20944<\/a><\/p>\n\n\n\n<p><strong>Windows Local Security Authority Subsystem Service (LSASS) Remote Code Execution Vulnerability (CVE-2026-20854):<\/strong><strong><\/strong><\/p>\n\n\n\n<p>A remote code execution vulnerability exists in Windows LSASS. Due to the use-after-free issue of Windows LSASS, an authenticated attacker can modify specific directory attributes and provide specially crafted data, causing the system to reference invalid memory to execute arbitrary code. CVSS score is 7.5.<\/p>\n\n\n\n<p>Official announcement link:<\/p>\n\n\n\n<p><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-20854\">https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-20854<\/a><\/p>\n\n\n\n<p><strong>Windows NTFS Remote Code Execution Vulnerability (CVE-2026-20840):<\/strong><strong><\/strong><\/p>\n\n\n\n<p>A remote code execution vulnerability exists in Windows NTFS, which could allow an authenticated attacker to execute arbitrary code locally due to a heap-based buffer overflow in Windows NTFS. CVSS score is 7.8.<\/p>\n\n\n\n<p>Official announcement link:<\/p>\n\n\n\n<p><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-20840\">https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-20840<\/a><\/p>\n\n\n\n<p><strong>Windows Graphics Component Privilege Escalation Vulnerability (CVE-2026-20822):<\/strong><strong><\/strong><\/p>\n\n\n\n<p>A privilege escalation vulnerability exists in the Windows Graphics Component, which allows an authenticated local attacker to elevate privileges to SYSTEM through conditional competition release reuse (use-after-free). CVSS score is 7.8.<\/p>\n\n\n\n<p>Official announcement link:<\/p>\n\n\n\n<p><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-20822\">https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-20822<\/a><\/p>\n\n\n\n<p><strong>Windows Virtualization-Based Security (VBS) Enclave Privilege Escalation Vulnerability (CVE-2026-20876):<\/strong><\/p>\n\n\n\n<p>There is a privilege escalation vulnerability in Windows VBS. Due to the heap-based buffer overflow problem of VBS Enclave, an authenticated local attacker can elevate privileges to SYSTEM. CVSS score is 6.7.<\/p>\n\n\n\n<p>Official announcement link:<\/p>\n\n\n\n<p><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-20876\">https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-20876<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Scope of Impact<\/h2>\n\n\n\n<p>The following are the affected product versions of some key vulnerabilities. For the scope of products affected by other vulnerabilities, please refer to the official announcement link.<\/p>\n\n\n\n<figure class=\"wp-block-table is-style-stripes\"><table><thead><tr><th><strong>Vulnerability Number<\/strong><\/th><th><strong>Affected product versions<\/strong><\/th><\/tr><\/thead><tbody><tr><td>CVE-2026-20805<\/td><td>Windows 10 Version 1809 for x64-based Systems <br>Windows 10 Version 1809 for 32-bit Systems <br>Windows Server 2012 R2 (Server Core installation) <br>Windows Server 2012 R2 <br>Windows Server 2012 (Server Core installation) <br>Windows Server 2012 <br>Windows Server 2016 (Server Core installation) <br>Windows Server 2016 <br>Windows 10 Version 1607 for x64-based Systems <br>Windows 10 Version 1607 for 32-bit Systems <br>Windows Server 2025 <br>Windows 11 Version 24H2 for x64-based Systems <br>Windows 11 Version 24H2 for ARM64-based Systems <br>Windows Server 2022, 23H2 Edition (Server Core installation) <br>Windows 11 Version 23H2 for x64-based Systems <br>Windows 11 Version 23H2 for ARM64-based Systems <br>Windows 11 Version 25H2 for x64-based Systems <br>Windows 11 Version 25H2 for ARM64-based Systems <br>Windows Server 2025 (Server Core installation) <br>Windows 10 Version 22H2 for 32-bit Systems <br>Windows 10 Version 22H2 for ARM64-based Systems <br>Windows 10 Version 22H2 for x64-based Systems <br>Windows 10 Version 21H2 for x64-based Systems <br>Windows 10 Version 21H2 for ARM64-based Systems <br>Windows 10 Version 21H2 for 32-bit Systems <br>Windows Server 2022 (Server Core installation) <br>Windows Server 2022 <br>Windows Server 2019 (Server Core installation) <br>Windows Server 2019<\/td><\/tr><tr><td>CVE-2026-20952\/CVE-2026-20953<\/td><td>Microsoft Office 2016 (64-bit edition) <br>Microsoft Office 2016 (32-bit edition) <br>Microsoft Office LTSC for Mac 2024 <br>Microsoft Office LTSC 2024 for 64-bit editions <br>Microsoft Office LTSC 2024 for 32-bit editions <br>Microsoft Office LTSC 2021 for 32-bit editions <br>Microsoft Office LTSC 2021 for 64-bit editions <br>Microsoft Office LTSC for Mac 2021 <br>Microsoft 365 Apps for Enterprise for 64-bit Systems <br>Microsoft 365 Apps for Enterprise for 32-bit Systems <br>Microsoft Office 2019 for 32-bit editions <br>Microsoft Office 2019 for 64-bit editions<\/td><\/tr><tr><td>CVE-2026-20955<\/td><td>Microsoft Office LTSC for Mac 2024 <br>Microsoft Office LTSC 2024 for 64-bit editions <br>Microsoft Office LTSC 2024 for 32-bit editions <br>Microsoft Office LTSC 2021 for 32-bit editions <br>Microsoft Office LTSC 2021 for 64-bit editions <br>Microsoft Office LTSC for Mac 2021 <br>Microsoft 365 Apps for Enterprise for 64-bit Systems <br>Microsoft 365 Apps for Enterprise for 32-bit Systems <br>Microsoft Office 2019 for 64-bit editions <br>Microsoft Office 2019 for 32-bit editions Office Online Server<\/td><\/tr><tr><td>CVE-2026-20957<\/td><td>Microsoft Excel 2016 (64-bit edition) <br>Microsoft Excel 2016 (32-bit edition) <br>Microsoft Office LTSC for Mac 2024 <br>Microsoft Office LTSC 2024 for 64-bit editions <br>Microsoft Office LTSC 2024 for 32-bit editions <br>Microsoft Office LTSC 2021 for 32-bit editions <br>Microsoft Office LTSC 2021 for 64-bit editions <br>Microsoft Office LTSC for Mac 2021 <br>Microsoft 365 Apps for Enterprise for 64-bit Systems <br>Microsoft 365 Apps for Enterprise for 32-bit Systems <br>Microsoft Office 2019 for 64-bit editions <br>Microsoft Office 2019 for 32-bit editions Office Online Server<\/td><\/tr><tr><td>CVE-2026-20944<\/td><td>Microsoft Office LTSC for Mac 2024 <br>Microsoft Office LTSC for Mac 2021 <br>Microsoft 365 Apps for Enterprise for 64-bit Systems <br>Microsoft 365 Apps for Enterprise for 32-bit Systems<\/td><\/tr><tr><td>CVE-2026-20854<\/td><td>Windows Server 2025 <br>Windows 11 Version 24H2 for x64-based Systems <br>Windows 11 Version 24H2 for ARM64-based Systems <br>Windows 11 Version 25H2 for x64-based Systems <br>Windows 11 Version 25H2 for ARM64-based Systems <br>Windows Server 2025 (Server Core installation)<\/td><\/tr><tr><td>CVE-2026-20840<\/td><td>Windows 11 Version 24H2 for x64-based Systems <br>Windows 11 Version 24H2 for ARM64-based Systems <br>Windows Server 2022, 23H2 Edition (Server Core installation) <br>Windows 11 Version 23H2 for x64-based Systems <br>Windows 11 Version 23H2 for ARM64-based Systems <br>Windows 11 Version 25H2 for x64-based Systems <br>Windows 11 Version 25H2 for ARM64-based Systems <br>Windows Server 2025 (Server Core installation) <br>Windows 10 Version 22H2 for 32-bit Systems <br>Windows 10 Version 22H2 for ARM64-based Systems <br>Windows 10 Version 22H2 for x64-based Systems <br>Windows 10 Version 21H2 for x64-based Systems <br>Windows Server 2012 R2 (Server Core installation) <br>Windows Server 2012 R2 <br>Windows Server 2012 (Server Core installation) <br>Windows Server 2012 <br>Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) <br>Windows Server 2008 R2 for x64-based Systems Service Pack 1 <br>Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) <br>Windows Server 2008 for x64-based Systems Service Pack 2 <br>Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) <br>Windows Server 2008 for 32-bit Systems Service Pack 2 <br>Windows Server 2016 (Server Core installation) <br>Windows Server 2016 <br>Windows 10 Version 1607 for x64-based Systems <br>Windows 10 Version 1607 for 32-bit Systems <br>Windows Server 2025 <br>Windows 10 Version 21H2 for ARM64-based Systems <br>Windows 10 Version 21H2 for 32-bit Systems <br>Windows Server 2022 (Server Core installation) <br>Windows Server 2022 <br>Windows Server 2019 (Server Core installation) <br>Windows Server 2019 <br>Windows 10 Version 1809 for x64-based Systems <br>Windows 10 Version 1809 for 32-bit Systems<\/td><\/tr><tr><td>CVE-2026-20822<\/td><td>Windows Server 2016 (Server Core installation) <br>Windows Server 2016 <br>Windows 10 Version 1607 for x64-based Systems <br>Windows 10 Version 1607 for 32-bit Systems <br>Windows Server 2025 <br>Windows 11 Version 24H2 for x64-based Systems <br>Windows 11 Version 24H2 for ARM64-based Systems <br>Windows Server 2022, 23H2 Edition (Server Core installation) <br>Windows 11 Version 23H2 for x64-based Systems <br>Windows 11 Version 23H2 for ARM64-based Systems <br>Windows 11 Version 25H2 for x64-based Systems <br>Windows 11 Version 25H2 for ARM64-based Systems <br>Windows Server 2025 (Server Core installation) <br>Windows 10 Version 22H2 for 32-bit Systems <br>Windows 10 Version 22H2 for ARM64-based Systems <br>Windows 10 Version 22H2 for x64-based Systems <br>Windows 10 Version 21H2 for x64-based Systems <br>Windows 10 Version 21H2 for ARM64-based Systems <br>Windows 10 Version 21H2 for 32-bit Systems <br>Windows Server 2022 (Server Core installation) <br>Windows Server 2022 <br>Windows Server 2019 (Server Core installation) <br>Windows Server 2019 <br>Windows 10 Version 1809 for x64-based Systems <br>Windows 10 Version 1809 for 32-bit Systems<\/td><\/tr><tr><td>CVE-2026-20876<\/td><td>Windows Server 2025 <br>Windows 11 Version 24H2 for x64-based Systems <br>Windows 11 Version 24H2 for ARM64-based Systems <br>Windows Server 2022, 23H2 Edition (Server Core installation) <br>Windows 11 Version 23H2 for x64-based Systems <br>Windows 11 Version 23H2 for ARM64-based Systems <br>Windows 11 Version 25H2 for x64-based Systems <br>Windows 11 Version 25H2 for ARM64-based Systems <br>Windows Server 2025 (Server Core installation)<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">Mitigation<\/h2>\n\n\n\n<p><strong>Patch update<\/strong><\/p>\n\n\n\n<p>At present, Microsoft has officially released security patches to fix the above vulnerabilities for supported product versions. It is strongly recommended that affected users install patches as soon as possible for protection. The official download link:<\/p>\n\n\n\n<p><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/releaseNote\/2026-Jan\">https:\/\/msrc.microsoft.com\/update-guide\/releaseNote\/2026-Jan<\/a><\/p>\n\n\n\n<p>Note: Patch updates for Windows Update may fail due to network problems, computer environment problems, etc. After installing the patch, users should check whether the patch has been successfully updated in time.<\/p>\n\n\n\n<p>Right-click the Windows icon, select &#8220;Settings (N)&#8221;, select &#8220;Update and Security&#8221;-&#8220;Windows Update&#8221;, view the prompt information on this page, or click &#8220;View Update History&#8221; to view the historical update status.<\/p>\n\n\n\n<p>For updates that have not been successfully installed, you can click the update name to jump to the Microsoft official download page. It is recommended that users click the link on this page and go to the &#8220;Microsoft Update Catalog&#8221; website to download the independent program package and install it.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Appendix<\/h2>\n\n\n\n<figure class=\"wp-block-table is-style-stripes\"><table><thead><tr><th><strong>Affected products<\/strong><\/th><th><strong>CVE No.<\/strong><\/th><th><strong>Vulnerability Title<\/strong><\/th><th><strong>Severity<\/strong><\/th><\/tr><\/thead><tbody><tr><td>Windows<\/td><td>CVE-2026-20822<\/td><td>Windows Graphics Component Escalation Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Windows<\/td><td>CVE-2026-20876<\/td><td>Windows Virtualization-Based Security (VBS) Enclave Escalation Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Microsoft Office<\/td><td>CVE-2026-20944<\/td><td>Microsoft Word remote code execution vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Microsoft Office<\/td><td>CVE-2026-20953<\/td><td>Microsoft Office Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Microsoft Office<\/td><td>CVE-2026-20955<\/td><td>Microsoft Excel Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Windows<\/td><td>CVE-2026-20854<\/td><td>Windows Local Security Authority Subsystem Service (LSASS) Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Microsoft Office<\/td><td>CVE-2026-20952<\/td><td>Microsoft Office Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Microsoft Office<\/td><td>CVE-2026-20957<\/td><td>Microsoft Excel Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Windows<\/td><td>CVE-2026-20962<\/td><td>Dynamic Root of Trust for Measurement (DRTM) information disclosure vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows<\/td><td>CVE-2026-21265<\/td><td>Secure Boot Certificate Expiration security feature bypass vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows<\/td><td>CVE-2026-0386<\/td><td>Windows Deployment Services Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft SQL Server<\/td><td>CVE-2026-20803<\/td><td>Microsoft SQL Server Privilege Escalation Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Azure<\/td><td>CVE-2026-20965<\/td><td>Windows Admin Center Privilege Escalation Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows<\/td><td>CVE-2026-20804<\/td><td>Windows Hello tampering vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows<\/td><td>CVE-2026-20805<\/td><td>Desktop Window Manager Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows<\/td><td>CVE-2026-20808<\/td><td>Windows File Explorer Privilege Escalation Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows<\/td><td>CVE-2026-20809<\/td><td>Windows Kernel Memory Permission Escalation Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows<\/td><td>CVE-2026-20810<\/td><td>Windows Ancillary Function Driver for WinSock Privilege Escalation Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows<\/td><td>CVE-2026-20811<\/td><td>Win32k Privilege Escalation Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows<\/td><td>CVE-2026-20812<\/td><td>LDAP Tampering Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows<\/td><td>CVE-2026-20814<\/td><td>DirectX Graphics Kernel privilege escalation vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows<\/td><td>CVE-2026-20815<\/td><td>Capability Access Management Service (camsvc) privilege escalation vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows<\/td><td>CVE-2026-20816<\/td><td>Windows Installer privilege escalation vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows<\/td><td>CVE-2026-20817<\/td><td>Windows Error Reporting Service privilege escalation vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows<\/td><td>CVE-2026-20818<\/td><td>Windows Kernel Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows<\/td><td>CVE-2026-20819<\/td><td>Windows Virtualization-Based Security (VBS) Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows<\/td><td>CVE-2026-20820<\/td><td>Windows Common Log File System Driver Escalation Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows<\/td><td>CVE-2026-20821<\/td><td>Remote Procedure Call information leakage vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows<\/td><td>CVE-2026-20823<\/td><td>Windows File Explorer Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows<\/td><td>CVE-2026-20824<\/td><td>Windows Remote Assistance security feature bypass vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows<\/td><td>CVE-2026-20825<\/td><td>Windows Hyper-V Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows<\/td><td>CVE-2026-20826<\/td><td>Tablet Windows User Interface (TWINUI) Subsystem Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows<\/td><td>CVE-2026-20827<\/td><td>Tablet Windows User Interface (TWINUI) Subsystem Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows<\/td><td>CVE-2026-20828<\/td><td>Windows rndismp6.sys information disclosure vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows<\/td><td>CVE-2026-20829<\/td><td>TPM Trustlet information leakage vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows<\/td><td>CVE-2026-20831<\/td><td>Windows Ancillary Function Driver for WinSock Privilege Escalation Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows<\/td><td>CVE-2026-20832<\/td><td>Windows Remote Procedure Call Interface Definition Language (IDL) Privilege Escalation Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows<\/td><td>CVE-2026-20833<\/td><td>Windows Kerberos Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows<\/td><td>CVE-2026-20834<\/td><td>Windows spoofing vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows<\/td><td>CVE-2026-20835<\/td><td>Capability Access Management Service (camsvc) information disclosure vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows<\/td><td>CVE-2026-20836<\/td><td>DirectX Graphics Kernel privilege escalation vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows<\/td><td>CVE-2026-20837<\/td><td>Windows Media Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows<\/td><td>CVE-2026-20838<\/td><td>Windows Kernel Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows<\/td><td>CVE-2026-20839<\/td><td>Windows Client-Side Caching (CSC) Service Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows<\/td><td>CVE-2026-20840<\/td><td>Windows NTFS Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows<\/td><td>CVE-2026-20842<\/td><td>Microsoft DWM Core Library Privilege Escalation Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows<\/td><td>CVE-2026-20844<\/td><td>Windows Clipboard Server Privilege Escalation Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows<\/td><td>CVE-2026-20847<\/td><td>Microsoft Windows File Explorer spoofing vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows<\/td><td>CVE-2026-20851<\/td><td>Capability Access Management Service (camsvc) information disclosure vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows<\/td><td>CVE-2026-20852<\/td><td>Windows Hello tampering vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows<\/td><td>CVE-2026-20856<\/td><td>Windows Server Update Service (WSUS) Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows<\/td><td>CVE-2026-20857<\/td><td>Windows Cloud Files Mini Filter Driver privilege escalation vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows<\/td><td>CVE-2026-20858<\/td><td>Windows Management Services Privilege Escalation Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows<\/td><td>CVE-2026-20859<\/td><td>Windows Kernel-Mode Driver privilege escalation vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows<\/td><td>CVE-2026-20860<\/td><td>Windows Ancillary Function Driver for WinSock Privilege Escalation Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows<\/td><td>CVE-2026-20864<\/td><td>Windows Connected Devices Platform Service privilege escalation vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows<\/td><td>CVE-2026-20865<\/td><td>Windows Management Services Privilege Escalation Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows<\/td><td>CVE-2026-20869<\/td><td>Windows Local Session Manager (LSM) Privilege Escalation Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows<\/td><td>CVE-2026-20875<\/td><td>Windows Local Security Authority Subsystem Service (LSASS) Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows<\/td><td>CVE-2026-20877<\/td><td>Windows Management Services Privilege Escalation Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows<\/td><td>CVE-2026-20918<\/td><td>Windows Management Services Privilege Escalation Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows<\/td><td>CVE-2026-20919<\/td><td>Windows SMB Server Privilege Escalation Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows<\/td><td>CVE-2026-20920<\/td><td>Win32k Privilege Escalation Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows<\/td><td>CVE-2026-20921<\/td><td>Windows SMB Server Privilege Escalation Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows<\/td><td>CVE-2026-20922<\/td><td>Windows NTFS Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows<\/td><td>CVE-2026-20923<\/td><td>Windows Management Services Privilege Escalation Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows<\/td><td>CVE-2026-20924<\/td><td>Windows Management Services Privilege Escalation Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows<\/td><td>CVE-2026-20925<\/td><td>NTLM Hash Disclosure spoofing vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows<\/td><td>CVE-2026-20926<\/td><td>Windows SMB Server Privilege Escalation Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows<\/td><td>CVE-2026-20927<\/td><td>Windows SMB Server Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows<\/td><td>CVE-2026-20932<\/td><td>Windows File Explorer Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows<\/td><td>CVE-2026-20934<\/td><td>Windows SMB Server Privilege Escalation Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows<\/td><td>CVE-2026-20938<\/td><td>Windows Virtualization-Based Security (VBS) Enclave Escalation Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows<\/td><td>CVE-2026-20940<\/td><td>Windows Cloud Files Mini Filter Driver privilege escalation vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office<\/td><td>CVE-2026-20943<\/td><td>Microsoft Office Click-To-Run privilege escalation vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office<\/td><td>CVE-2026-20946<\/td><td>Microsoft Excel Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office<\/td><td>CVE-2026-20951<\/td><td>Microsoft SharePoint Server Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office<\/td><td>CVE-2026-20956<\/td><td>Microsoft Excel Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office<\/td><td>CVE-2026-20959<\/td><td>Microsoft SharePoint Server Spoofing Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office<\/td><td>CVE-2026-20963<\/td><td>Microsoft SharePoint Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows<\/td><td>CVE-2026-20830<\/td><td>Capability Access Management Service (camsvc) privilege escalation vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows<\/td><td>CVE-2026-21221<\/td><td>Capability Access Management Service (camsvc) privilege escalation vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Azure<\/td><td>CVE-2026-21224<\/td><td>Azure Connected Machine Agent privilege escalation vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office<\/td><td>CVE-2026-20947<\/td><td>Microsoft SharePoint Server Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows<\/td><td>CVE-2026-20843<\/td><td>Windows Routing and Remote Access Service (RRAS) Privilege Escalation Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows<\/td><td>CVE-2026-20848<\/td><td>Windows SMB Server Privilege Escalation Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows<\/td><td>CVE-2026-20849<\/td><td>Windows Kerberos privilege escalation vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows<\/td><td>CVE-2026-20853<\/td><td>Windows WalletService privilege escalation vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows SDK<\/td><td>CVE-2026-21219<\/td><td>Inbox COM Objects (Global Memory) Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows<\/td><td>CVE-2026-20861<\/td><td>Windows Management Services Privilege Escalation Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows<\/td><td>CVE-2026-20862<\/td><td>Windows Management Services Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows<\/td><td>CVE-2026-20863<\/td><td>Win32k Privilege Escalation Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows<\/td><td>CVE-2026-20866<\/td><td>Windows Management Services Privilege Escalation Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows<\/td><td>CVE-2026-20867<\/td><td>Windows Management Services Privilege Escalation Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows<\/td><td>CVE-2026-20868<\/td><td>Windows Routing and Remote Access Service (RRAS) remote code execution vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows<\/td><td>CVE-2026-20870<\/td><td>Windows Win32 Kernel Subsystem Privilege Escalation Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows<\/td><td>CVE-2026-20871<\/td><td>Desktop Windows Manager privilege escalation vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows<\/td><td>CVE-2026-20872<\/td><td>NTLM Hash Disclosure spoofing vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows<\/td><td>CVE-2026-20873<\/td><td>Windows Management Services Privilege Escalation Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows<\/td><td>CVE-2026-20874<\/td><td>Windows Management Services Privilege Escalation Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows<\/td><td>CVE-2026-20929<\/td><td>Windows HTTP.sys Privilege Escalation Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows<\/td><td>CVE-2026-20931<\/td><td>Windows Telephony Service privilege escalation vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows<\/td><td>CVE-2026-20935<\/td><td>Windows Virtualization-Based Security (VBS) Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows<\/td><td>CVE-2026-20936<\/td><td>Windows NDIS Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows<\/td><td>CVE-2026-20937<\/td><td>Windows File Explorer Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows<\/td><td>CVE-2026-20939<\/td><td>Windows File Explorer Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office<\/td><td>CVE-2026-20948<\/td><td>Microsoft Word remote code execution vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office<\/td><td>CVE-2026-20949<\/td><td>Microsoft Excel security feature bypass vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office<\/td><td>CVE-2026-20950<\/td><td>Microsoft Excel Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office<\/td><td>CVE-2026-20958<\/td><td>Microsoft SharePoint Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows<\/td><td>CVE-2026-20941<\/td><td>Host Process for Windows Tasks Privilege Escalation Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Azure<\/td><td>CVE-2026-21226<\/td><td>Azure Core shared client library for Python remote code execution vulnerability<\/td><td>Important<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">Statement<\/h2>\n\n\n\n<p>This advisory is only used to describe a potential risk. NSFOCUS does not provide any commitment or promise on this advisory. NSFOCUS and the author will not bear any liability for any direct and\/or indirect consequences and losses caused by transmitting and\/or using this advisory. NSFOCUS reserves all the rights to modify and interpret this advisory. Please include this statement paragraph when reproducing or transferring this advisory. Do not modify this advisory, add\/delete any information to\/from it, or use this advisory for commercial purposes without permission from NSFOCUS.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">About NSFOCUS<\/h2>\n\n\n\n<p>NSFOCUS, a pioneering leader in cybersecurity, is dedicated to safeguarding telecommunications, Internet service providers, hosting providers, and enterprises from sophisticated cyberattacks.<\/p>\n\n\n\n<p>Founded in 2000, NSFOCUS operates globally with over 4000 employees at two headquarters in Beijing, China, and Santa Clara, CA, USA, and over 50 offices worldwide. It has a proven track record of protecting over 25% of the Fortune Global 500 companies, including four of the five largest banks and six of the world\u2019s top ten telecommunications companies.<\/p>\n\n\n\n<p>Leveraging technical prowess and innovation, NSFOCUS delivers a comprehensive suite of security solutions, including the Intelligent Security Operations Platform (ISOP) for modern SOC, DDoS Protection, Continuous Threat Exposure Management (CTEM) Service and Web Application and API Protection (WAAP). All the solutions and services are augmented by the Security Large Language Model (SecLLM), ML, patented algorithms and other cutting-edge research achievements developed by NSFOCUS.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Overview On January 14, NSFOCUS CERT detected that Microsoft released the January Security Update patch, which fixed 112 security issues involving widely used products such as Windows, Microsoft Office, Microsoft SQL Server, Azure, etc., including high-risk vulnerability types such as privilege escalation and remote code execution. Among the vulnerabilities fixed by Microsoft&#8217;s monthly update this [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":28664,"comment_status":"open","ping_status":"open","sticky":false,"template":"post-templates\/single-layout-8.php","format":"standard","meta":{"_acf_changed":false,"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","footnotes":""},"categories":[3,6],"tags":[1052,852,647,2095,752],"class_list":["post-34880","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","category-emergency-response","tag-microsoft-azure","tag-office","tag-security-update","tag-sql-server","tag-windows"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Microsoft\u2019s January Security Update of High-Risk Vulnerability Notice for Multiple Products - NSFOCUS<\/title>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Microsoft\u2019s January Security Update of High-Risk Vulnerability Notice for Multiple Products - NSFOCUS\" \/>\n<meta property=\"og:description\" content=\"Overview On January 14, NSFOCUS CERT detected that Microsoft released the January Security Update patch, which fixed 112 security issues involving widely\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nsfocusglobal.com\/microsofts-january-security-update-of-high-risk-vulnerability-notice-for-multiple-products\/\" \/>\n<meta property=\"og:site_name\" content=\"NSFOCUS\" \/>\n<meta property=\"article:published_time\" content=\"2026-01-16T01:57:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-13T08:51:25+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/04\/Critical.png\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Microsoft\u2019s January Security Update of High-Risk Vulnerability Notice for Multiple Products - NSFOCUS\" \/>\n<meta name=\"twitter:description\" content=\"Overview On January 14, NSFOCUS CERT detected that Microsoft released the January Security Update patch, which fixed 112 security issues involving widely\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/04\/Critical.png\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"14 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/microsofts-january-security-update-of-high-risk-vulnerability-notice-for-multiple-products\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/microsofts-january-security-update-of-high-risk-vulnerability-notice-for-multiple-products\\\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/person\\\/fd9ab61c9c77a81bbd870f725cc0c61d\"},\"headline\":\"Microsoft\u2019s January Security Update of High-Risk Vulnerability Notice for Multiple Products\",\"datePublished\":\"2026-01-16T01:57:00+00:00\",\"dateModified\":\"2026-04-13T08:51:25+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/microsofts-january-security-update-of-high-risk-vulnerability-notice-for-multiple-products\\\/\"},\"wordCount\":3140,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/microsofts-january-security-update-of-high-risk-vulnerability-notice-for-multiple-products\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/Critical.png\",\"keywords\":[\"Microsoft Azure\",\"Office\",\"Security Update\",\"SQL Server\",\"Windows\"],\"articleSection\":[\"Blog\",\"Emergency Response\"],\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/microsofts-january-security-update-of-high-risk-vulnerability-notice-for-multiple-products\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/microsofts-january-security-update-of-high-risk-vulnerability-notice-for-multiple-products\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/microsofts-january-security-update-of-high-risk-vulnerability-notice-for-multiple-products\\\/\",\"name\":\"Microsoft\u2019s January Security Update of High-Risk Vulnerability Notice for Multiple Products - NSFOCUS\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/microsofts-january-security-update-of-high-risk-vulnerability-notice-for-multiple-products\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/microsofts-january-security-update-of-high-risk-vulnerability-notice-for-multiple-products\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/Critical.png\",\"datePublished\":\"2026-01-16T01:57:00+00:00\",\"dateModified\":\"2026-04-13T08:51:25+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/microsofts-january-security-update-of-high-risk-vulnerability-notice-for-multiple-products\\\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/microsofts-january-security-update-of-high-risk-vulnerability-notice-for-multiple-products\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/microsofts-january-security-update-of-high-risk-vulnerability-notice-for-multiple-products\\\/#primaryimage\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/Critical.png\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/Critical.png\",\"width\":169,\"height\":107,\"caption\":\"Critical alert icon with shield symbol.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/microsofts-january-security-update-of-high-risk-vulnerability-notice-for-multiple-products\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/nsfocusglobal.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Microsoft\u2019s January Security Update of High-Risk Vulnerability Notice for Multiple Products\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#website\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/\",\"name\":\"NSFOCUS\",\"description\":\"Security Made Smart and Simple\",\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\",\"name\":\"NSFOCUS\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"width\":248,\"height\":36,\"caption\":\"NSFOCUS\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/person\\\/fd9ab61c9c77a81bbd870f725cc0c61d\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"https:\\\/\\\/nsfocusglobal.com\"],\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/author\\\/admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Microsoft\u2019s January Security Update of High-Risk Vulnerability Notice for Multiple Products - NSFOCUS","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"pt_BR","og_type":"article","og_title":"Microsoft\u2019s January Security Update of High-Risk Vulnerability Notice for Multiple Products - NSFOCUS","og_description":"Overview On January 14, NSFOCUS CERT detected that Microsoft released the January Security Update patch, which fixed 112 security issues involving widely","og_url":"https:\/\/nsfocusglobal.com\/microsofts-january-security-update-of-high-risk-vulnerability-notice-for-multiple-products\/","og_site_name":"NSFOCUS","article_published_time":"2026-01-16T01:57:00+00:00","article_modified_time":"2026-04-13T08:51:25+00:00","og_image":[{"url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/04\/Critical.png","type":"","width":"","height":""}],"author":"admin","twitter_card":"summary_large_image","twitter_title":"Microsoft\u2019s January Security Update of High-Risk Vulnerability Notice for Multiple Products - NSFOCUS","twitter_description":"Overview On January 14, NSFOCUS CERT detected that Microsoft released the January Security Update patch, which fixed 112 security issues involving widely","twitter_image":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/04\/Critical.png","twitter_misc":{"Escrito por":"admin","Est. tempo de leitura":"14 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nsfocusglobal.com\/microsofts-january-security-update-of-high-risk-vulnerability-notice-for-multiple-products\/#article","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/microsofts-january-security-update-of-high-risk-vulnerability-notice-for-multiple-products\/"},"author":{"name":"admin","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/person\/fd9ab61c9c77a81bbd870f725cc0c61d"},"headline":"Microsoft\u2019s January Security Update of High-Risk Vulnerability Notice for Multiple Products","datePublished":"2026-01-16T01:57:00+00:00","dateModified":"2026-04-13T08:51:25+00:00","mainEntityOfPage":{"@id":"https:\/\/nsfocusglobal.com\/microsofts-january-security-update-of-high-risk-vulnerability-notice-for-multiple-products\/"},"wordCount":3140,"commentCount":0,"publisher":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization"},"image":{"@id":"https:\/\/nsfocusglobal.com\/microsofts-january-security-update-of-high-risk-vulnerability-notice-for-multiple-products\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/04\/Critical.png","keywords":["Microsoft Azure","Office","Security Update","SQL Server","Windows"],"articleSection":["Blog","Emergency Response"],"inLanguage":"pt-BR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/nsfocusglobal.com\/microsofts-january-security-update-of-high-risk-vulnerability-notice-for-multiple-products\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/nsfocusglobal.com\/microsofts-january-security-update-of-high-risk-vulnerability-notice-for-multiple-products\/","url":"https:\/\/nsfocusglobal.com\/microsofts-january-security-update-of-high-risk-vulnerability-notice-for-multiple-products\/","name":"Microsoft\u2019s January Security Update of High-Risk Vulnerability Notice for Multiple Products - NSFOCUS","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nsfocusglobal.com\/microsofts-january-security-update-of-high-risk-vulnerability-notice-for-multiple-products\/#primaryimage"},"image":{"@id":"https:\/\/nsfocusglobal.com\/microsofts-january-security-update-of-high-risk-vulnerability-notice-for-multiple-products\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/04\/Critical.png","datePublished":"2026-01-16T01:57:00+00:00","dateModified":"2026-04-13T08:51:25+00:00","breadcrumb":{"@id":"https:\/\/nsfocusglobal.com\/microsofts-january-security-update-of-high-risk-vulnerability-notice-for-multiple-products\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nsfocusglobal.com\/microsofts-january-security-update-of-high-risk-vulnerability-notice-for-multiple-products\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/microsofts-january-security-update-of-high-risk-vulnerability-notice-for-multiple-products\/#primaryimage","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/04\/Critical.png","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/04\/Critical.png","width":169,"height":107,"caption":"Critical alert icon with shield symbol."},{"@type":"BreadcrumbList","@id":"https:\/\/nsfocusglobal.com\/microsofts-january-security-update-of-high-risk-vulnerability-notice-for-multiple-products\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/nsfocusglobal.com\/"},{"@type":"ListItem","position":2,"name":"Microsoft\u2019s January Security Update of High-Risk Vulnerability Notice for Multiple Products"}]},{"@type":"WebSite","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#website","url":"https:\/\/nsfocusglobal.com\/pt-br\/","name":"NSFOCUS","description":"Security Made Smart and Simple","publisher":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/nsfocusglobal.com\/pt-br\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization","name":"NSFOCUS","url":"https:\/\/nsfocusglobal.com\/pt-br\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/logo\/image\/","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","width":248,"height":36,"caption":"NSFOCUS"},"image":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/person\/fd9ab61c9c77a81bbd870f725cc0c61d","name":"admin","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","caption":"admin"},"sameAs":["https:\/\/nsfocusglobal.com"],"url":"https:\/\/nsfocusglobal.com\/pt-br\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/34880","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/comments?post=34880"}],"version-history":[{"count":1,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/34880\/revisions"}],"predecessor-version":[{"id":34884,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/34880\/revisions\/34884"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media\/28664"}],"wp:attachment":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media?parent=34880"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/categories?post=34880"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/tags?post=34880"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}