Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Three Zero-Days Fixed on Busy Patch Tuesday

January 15, 2026

Russian APT28 Runs Credential-Stealing Campaign Targeting Energy and Policy Organizations

January 15, 2026

DeadLock Ransomware Uses Polygon Smart Contracts For Proxy Rotation

January 14, 2026
Facebook X (Twitter) Instagram
Thursday, January 15
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»Three Zero-Days Fixed on Busy Patch Tuesday
News

Three Zero-Days Fixed on Busy Patch Tuesday

Team-CWDBy Team-CWDJanuary 15, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


It’s set to be a busy month for system administrators after Microsoft released security updates to fix over 100 CVEs yesterday, including one being actively exploited.

CVE-2026-20805 is one of three zero-day bugs fixed on the first Patch Tuesday of 2026 – the other two being publicly disclosed but not yet used in attacks.

It’s listed as an information disclosure vulnerability in the Desktop Window Manager.

“This CVE quietly leaks sensitive memory details, giving attackers the inside knowledge they need to weaken system protections and prepare for deeper compromise,” explained Action1 director of vulnerability research, Jack Bicer.

“An authorized local attacker can trigger the flaw to disclose a section address from a remote ALPC port residing in user-mode memory. Although no data modification or denial-of-service occurs, the exposed memory information can undermine address space layout randomization (ASLR) and other defenses, making additional exploits more reliable.”

Read more on Patch Tuesday: Microsoft Fixes Three Zero-Days in Final Patch Tuesday of 2025

The other two zero-days include CVE-2026-21265: a security feature bypass vulnerability related to secure boot certificate expiration.

This relates to the expiration of Microsoft’s original 2011 Root of Trust certificates this year.

“These certificates sign nearly every Windows bootloader since Windows 8, and they are set to expire in June and October 2026,” explained Ryan Braunstein, security manager at Automox.

“If you bought a motherboard or computer between 2012 and 2025, CVE-2026-21265 applies to you.”

He claimed that, among other things, hackers could chain the CVE with others to prevent systems from updating their forbidden signature database before deploying a rootkit.

“This is not a vulnerability you can patch once and forget,” Braunstein warned.

“It requires an audit of your entire hardware environment and coordination between OS and firmware updates. Some BIOS updates may require manual acceptance of the new UEFI certificates rolled out in 2023.”

A Zero Day From 2023

The third zero-day is CVE-2023-31096: an elevation of privilege (EoP) in the Agere Modem driver that ships with some Windows versions.

“This vulnerability was originally published via MITRE over two years ago, along with a credible public writeup by the original researcher. Today’s Windows patches remove agrsm64.sys and agrsm.sys,” explained Rapid7 lead software engineer, Adam Barnett.

“All three modem drivers were originally developed by the same now-defunct third party and have been included in Windows for decades. These driver removals will pass unnoticed for most people, but you might find active modems still in a few contexts, including some industrial control systems.”

Among the 114 CVEs patched by Microsoft this month, 57 are EoP, while a further 22 are remote code execution and 22 are classed as information disclosure. Just eight are classed as critical, although – as always – context matters and will vary for each organization.

Image credit: CHERRY.JUICE / Shutterstock.com



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleRussian APT28 Runs Credential-Stealing Campaign Targeting Energy and Policy Organizations
Team-CWD
  • Website

Related Posts

News

Russian APT28 Runs Credential-Stealing Campaign Targeting Energy and Policy Organizations

January 15, 2026
News

DeadLock Ransomware Uses Polygon Smart Contracts For Proxy Rotation

January 14, 2026
News

The Hype We Can Ignore (And the Risks We Can’t)

January 14, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202521 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202521 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Our Picks

How it preys on personal data – and how to stay safe

October 23, 2025

Can password managers get hacked? Here’s what to know

November 14, 2025

The WhatsApp screen-sharing scam you didn’t see coming

November 6, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.