{"id":4959,"date":"2026-01-13T13:48:15","date_gmt":"2026-01-13T18:48:15","guid":{"rendered":"https:\/\/cert.pa\/?p=4959"},"modified":"2026-01-13T13:48:17","modified_gmt":"2026-01-13T18:48:17","slug":"csirt-panama-aviso-2026-ene-13-actualizaciones-de-seguridad-de-microsoft-para-enero-2026","status":"publish","type":"post","link":"https:\/\/cert.pa\/?p=4959","title":{"rendered":"CSIRT Panam\u00e1 Aviso 2026-Ene-13 Actualizaciones de seguridad de Microsoft para Enero 2026."},"content":{"rendered":"\n<p>CSIRT Panam\u00e1 Aviso 2026-Ene-13 Actualizaciones de seguridad de Microsoft para Enero 2026.<br>Gravedad: Alta<br>Fecha de publicaci\u00f3n: enero 13, 2026<br>\u00daltima revisi\u00f3n: enero 13, 2026<br>https:\/\/msrc.microsoft.com\/update-guide\/releaseNote\/2026-Jan<\/p>\n\n\n\n<p>Sistemas Afectados:<br>Windows Deployment Services<br>SQL Server<br>Windows Hello<br>Desktop Window Manager<br>Printer Association Object<br>Windows Kernel Memory<br>Windows Ancillary Function Driver for WinSock<br>Windows Win32K &#8211; ICOMP<br>Windows LDAP &#8211; Lightweight Directory Access Protocol<br>Graphics Kernel<br>Capability Access Management Service (camsvc)<br>Windows Installer<br>Windows Error Reporting<br>Windows Kernel<br>Windows Virtualization-Based Security (VBS) Enclave<br>Windows Common Log File System Driver<br>Windows Remote Procedure Call<br>Microsoft Graphics Component<br>Windows File Explorer<br>Windows Remote Assistance<br>Windows Hyper-V<br>Tablet Windows User Interface (TWINUI) Subsystem<br>Windows Internet Connection Sharing (ICS)<br>Windows TPM<br>Windows Remote Procedure Call Interface Definition Language (IDL)<br>Windows Kerberos<br>Windows Shell<br>Windows Media<br>Windows Client-Side Caching (CSC) Service<br>Windows NTFS<br>Windows DWM<br>Windows Routing and Remote Access Service (RRAS)<br>Windows Clipboard Server<br>Windows SMB Server<br>Windows WalletService<br>Windows Local Security Authority Subsystem Service (LSASS)<br>Windows Server Update Service<br>Windows Cloud Files Mini Filter Driver<br>Windows Management Services<br>Windows Kernel-Mode Drivers<br>Connected Devices Platform Service (Cdpsvc)<br>Windows Local Session Manager (LSM)<br>Windows NTLM<br>Windows HTTP.sys<br>Windows Telephony Service<br>Windows NDIS<br>Host Process for Windows Tasks<br>Microsoft Office<br>Microsoft Office Word<br>Microsoft Office Excel<br>Microsoft Office SharePoint<br>Dynamic Root of Trust for Measurement (DRTM)<br>Windows Admin Center<br>Inbox COM Objects<br>Azure Connected Machine Agent<br>Azure Core shared client library for Python<br>Windows Secure Boot<\/p>\n\n\n\n<p>I. Descripci\u00f3n<br>Microsoft ha liberado sus actualizaciones de seguridad correspondientes al mes de enero de 2026.<br>Este conjunto de actualizaciones remedia 114 fallas y 3 d\u00eda cero.<\/p>\n\n\n\n<p>II. Detalle<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><tbody><tr><th>Tag<\/th><th>CVE ID<\/th><th>CVE Title<\/th><th>Severity<\/th><\/tr><tr><td>Agere Windows Modem Driver<\/td><td><a href=\"https::\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-31096\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-31096<\/a><\/td><td>MITRE: CVE-2023-31096 Windows Agere Soft Modem Driver Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Azure Connected Machine Agent<\/td><td><a href=\"https::\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-21224\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-21224<\/a><\/td><td>Azure Connected Machine Agent Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Azure Core shared client library for Python<\/td><td><a href=\"https::\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-21226\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-21226<\/a><\/td><td>Azure Core shared client library for Python Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Capability Access Management Service (camsvc)<\/td><td><a href=\"https::\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-20835\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-20835<\/a><\/td><td>Capability Access Management Service (camsvc) Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Capability Access Management Service (camsvc)<\/td><td><a href=\"https::\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-20851\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-20851<\/a><\/td><td>Capability Access Management Service (camsvc) Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Capability Access Management Service (camsvc)<\/td><td><a href=\"https::\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-20830\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-20830<\/a><\/td><td>Capability Access Management Service (camsvc) Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Capability Access Management Service (camsvc)<\/td><td><a href=\"https::\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-21221\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-21221<\/a><\/td><td>Capability Access Management Service (camsvc) Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Capability Access Management Service (camsvc)<\/td><td><a href=\"https::\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-20815\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-20815<\/a><\/td><td>Capability Access Management Service (camsvc) Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Connected Devices Platform Service (Cdpsvc)<\/td><td><a href=\"https::\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-20864\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-20864<\/a><\/td><td>Windows Connected Devices Platform Service Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Desktop Window Manager<\/td><td><a href=\"https::\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-20805\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-20805<\/a><\/td><td>Desktop Window Manager Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Desktop Window Manager<\/td><td><a href=\"https::\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-20871\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-20871<\/a><\/td><td>Desktop Windows Manager Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Dynamic Root of Trust for Measurement (DRTM)<\/td><td><a href=\"https::\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-20962\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-20962<\/a><\/td><td>Dynamic Root of Trust for Measurement (DRTM) Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Graphics Kernel<\/td><td><a href=\"https::\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-20836\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-20836<\/a><\/td><td>DirectX Graphics Kernel Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Graphics Kernel<\/td><td><a href=\"https::\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-20814\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-20814<\/a><\/td><td>DirectX Graphics Kernel Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Host Process for Windows Tasks<\/td><td><a href=\"https::\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-20941\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-20941<\/a><\/td><td>Host Process for Windows Tasks Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Inbox COM Objects<\/td><td><a href=\"https::\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-21219\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-21219<\/a><\/td><td>Inbox COM Objects (Global Memory) Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Mariner<\/td><td><a href=\"https::\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-21444\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-21444<\/a><\/td><td>libtpms returns wrong initialization vector when certain symmetric ciphers are used<\/td><td>Moderate<\/td><\/tr><tr><td>Mariner<\/td><td><a href=\"https::\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-68758\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-68758<\/a><\/td><td>backlight: led-bl: Add devlink to supplier LEDs<\/td><td>Moderate<\/td><\/tr><tr><td>Mariner<\/td><td><a href=\"https::\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-68757\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-68757<\/a><\/td><td>drm\/vgem-fence: Fix potential deadlock on release<\/td><td>Moderate<\/td><\/tr><tr><td>Mariner<\/td><td><a href=\"https::\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-68764\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-68764<\/a><\/td><td>NFS: Automounted filesystems should inherit ro,noexec,nodev,sync flags<\/td><td>Moderate<\/td><\/tr><tr><td>Mariner<\/td><td><a href=\"https::\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-68756\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-68756<\/a><\/td><td>block: Use RCU in blk_mq_[un]quiesce_tagset() instead of set-&gt;tag_list_lock<\/td><td>Important<\/td><\/tr><tr><td>Mariner<\/td><td><a href=\"https::\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-68763\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-68763<\/a><\/td><td>crypto: starfive &#8211; Correctly handle return of sg_nents_for_len<\/td><td>Moderate<\/td><\/tr><tr><td>Mariner<\/td><td><a href=\"https::\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-68755\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-68755<\/a><\/td><td>staging: most: remove broken i2c driver<\/td><td>Moderate<\/td><\/tr><tr><td>Mariner<\/td><td><a href=\"https::\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-68759\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-68759<\/a><\/td><td>wifi: rtl818x: Fix potential memory leaks in rtl8180_init_rx_ring()<\/td><td>Important<\/td><\/tr><tr><td>Mariner<\/td><td><a href=\"https::\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-68766\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-68766<\/a><\/td><td>irqchip\/mchp-eic: Fix error code in mchp_eic_domain_alloc()<\/td><td>Important<\/td><\/tr><tr><td>Mariner<\/td><td><a href=\"https::\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-68753\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-68753<\/a><\/td><td>ALSA: firewire-motu: add bounds check in put_user loop for DSP events<\/td><td>Important<\/td><\/tr><tr><td>Mariner<\/td><td><a href=\"https::\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-68765\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-68765<\/a><\/td><td>mt76: mt7615: Fix memory leak in mt7615_mcu_wtbl_sta_add()<\/td><td>Moderate<\/td><\/tr><tr><td>Microsoft Edge (Chromium-based)<\/td><td><a href=\"https::\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-0628\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-0628<\/a><\/td><td>Chromium: CVE-2026-0628 Insufficient policy enforcement in WebView tag<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Graphics Component<\/td><td><a href=\"https::\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-20822\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-20822<\/a><\/td><td>Windows Graphics Component Elevation of Privilege Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Microsoft Office<\/td><td><a href=\"https::\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-20952\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-20952<\/a><\/td><td>Microsoft Office Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Microsoft Office<\/td><td><a href=\"https::\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-20953\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-20953<\/a><\/td><td>Microsoft Office Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Microsoft Office<\/td><td><a href=\"https::\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-20943\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-20943<\/a><\/td><td>Microsoft Office Click-To-Run Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office Excel<\/td><td><a href=\"https::\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-20949\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-20949<\/a><\/td><td>Microsoft Excel Security Feature Bypass Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office Excel<\/td><td><a href=\"https::\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-20950\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-20950<\/a><\/td><td>Microsoft Excel Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office Excel<\/td><td><a href=\"https::\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-20956\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-20956<\/a><\/td><td>Microsoft Excel Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office Excel<\/td><td><a href=\"https::\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-20957\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-20957<\/a><\/td><td>Microsoft Excel Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Microsoft Office Excel<\/td><td><a href=\"https::\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-20946\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-20946<\/a><\/td><td>Microsoft Excel Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office Excel<\/td><td><a href=\"https::\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-20955\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-20955<\/a><\/td><td>Microsoft Excel Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Microsoft Office SharePoint<\/td><td><a href=\"https::\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-20958\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-20958<\/a><\/td><td>Microsoft SharePoint Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office SharePoint<\/td><td><a href=\"https::\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-20959\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-20959<\/a><\/td><td>Microsoft SharePoint Server Spoofing Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office SharePoint<\/td><td><a href=\"https::\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-20947\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-20947<\/a><\/td><td>Microsoft SharePoint Server Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office SharePoint<\/td><td><a href=\"https::\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-20951\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-20951<\/a><\/td><td>Microsoft SharePoint Server Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office SharePoint<\/td><td><a href=\"https::\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-20963\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-20963<\/a><\/td><td>Microsoft SharePoint Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office Word<\/td><td><a href=\"https::\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-20948\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-20948<\/a><\/td><td>Microsoft Word Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office Word<\/td><td><a href=\"https::\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-20944\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-20944<\/a><\/td><td>Microsoft Word Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Printer Association Object<\/td><td><a href=\"https::\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-20808\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-20808<\/a><\/td><td>Windows File Explorer Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>SQL Server<\/td><td><a href=\"https::\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-20803\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-20803<\/a><\/td><td>Microsoft SQL Server Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Tablet Windows User Interface (TWINUI) Subsystem<\/td><td><a href=\"https::\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-20827\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-20827<\/a><\/td><td>Tablet Windows User Interface (TWINUI) Subsystem Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Tablet Windows User Interface (TWINUI) Subsystem<\/td><td><a href=\"https::\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-20826\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-20826<\/a><\/td><td>Tablet Windows User Interface (TWINUI) Subsystem Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Admin Center<\/td><td><a href=\"https::\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-20965\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-20965<\/a><\/td><td>Windows Admin Center Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Ancillary Function Driver for WinSock<\/td><td><a href=\"https::\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-20831\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-20831<\/a><\/td><td>Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Ancillary Function Driver for WinSock<\/td><td><a href=\"https::\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-20860\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-20860<\/a><\/td><td>Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Ancillary Function Driver for WinSock<\/td><td><a href=\"https::\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-20810\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-20810<\/a><\/td><td>Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Client-Side Caching (CSC) Service<\/td><td><a href=\"https::\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-20839\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-20839<\/a><\/td><td>Windows Client-Side Caching (CSC) Service Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Clipboard Server<\/td><td><a href=\"https::\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-20844\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-20844<\/a><\/td><td>Windows Clipboard Server Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Cloud Files Mini Filter Driver<\/td><td><a href=\"https::\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-20940\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-20940<\/a><\/td><td>Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Cloud Files Mini Filter Driver<\/td><td><a href=\"https::\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-20857\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-20857<\/a><\/td><td>Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Common Log File System Driver<\/td><td><a href=\"https::\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-20820\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-20820<\/a><\/td><td>Windows Common Log File System Driver Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Deployment Services<\/td><td><a href=\"https::\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-0386\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-0386<\/a><\/td><td>Windows Deployment Services Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows DWM<\/td><td><a href=\"https::\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-20842\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-20842<\/a><\/td><td>Microsoft DWM Core Library Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Error Reporting<\/td><td><a href=\"https::\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-20817\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-20817<\/a><\/td><td>Windows Error Reporting Service Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows File Explorer<\/td><td><a href=\"https::\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-20939\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-20939<\/a><\/td><td>Windows File Explorer Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows File Explorer<\/td><td><a href=\"https::\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-20932\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-20932<\/a><\/td><td>Windows File Explorer Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows File Explorer<\/td><td><a href=\"https::\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-20937\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-20937<\/a><\/td><td>Windows File Explorer Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows File Explorer<\/td><td><a href=\"https::\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-20823\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-20823<\/a><\/td><td>Windows File Explorer Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Hello<\/td><td><a href=\"https::\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-20852\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-20852<\/a><\/td><td>Windows Hello Tampering Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Hello<\/td><td><a href=\"https::\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-20804\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-20804<\/a><\/td><td>Windows Hello Tampering Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows HTTP.sys<\/td><td><a href=\"https::\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-20929\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-20929<\/a><\/td><td>Windows HTTP.sys Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Hyper-V<\/td><td><a href=\"https::\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-20825\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-20825<\/a><\/td><td>Windows Hyper-V Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Installer<\/td><td><a href=\"https::\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-20816\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-20816<\/a><\/td><td>Windows Installer Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Internet Connection Sharing (ICS)<\/td><td><a href=\"https::\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-20828\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-20828<\/a><\/td><td>Windows rndismp6.sys Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Kerberos<\/td><td><a href=\"https::\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-20849\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-20849<\/a><\/td><td>Windows Kerberos Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Kerberos<\/td><td><a href=\"https::\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-20833\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-20833<\/a><\/td><td>Windows Kerberos Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Kernel<\/td><td><a href=\"https::\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-20838\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-20838<\/a><\/td><td>Windows Kernel Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Kernel<\/td><td><a href=\"https::\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-20818\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-20818<\/a><\/td><td>Windows Kernel Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Kernel Memory<\/td><td><a href=\"https::\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-20809\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-20809<\/a><\/td><td>Windows Kernel Memory Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Kernel-Mode Drivers<\/td><td><a href=\"https::\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-20859\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-20859<\/a><\/td><td>Windows Kernel-Mode Driver Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows LDAP &#8211; Lightweight Directory Access Protocol<\/td><td><a href=\"https::\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-20812\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-20812<\/a><\/td><td>LDAP Tampering Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Local Security Authority Subsystem Service (LSASS)<\/td><td><a href=\"https::\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-20854\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-20854<\/a><\/td><td>Windows Local Security Authority Subsystem Service (LSASS) Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Windows Local Security Authority Subsystem Service (LSASS)<\/td><td><a href=\"https::\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-20875\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-20875<\/a><\/td><td>Windows Local Security Authority Subsystem Service (LSASS) Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Local Session Manager (LSM)<\/td><td><a href=\"https::\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-20869\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-20869<\/a><\/td><td>Windows Local Session Manager (LSM) Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Management Services<\/td><td><a href=\"https::\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-20924\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-20924<\/a><\/td><td>Windows Management Services Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Management Services<\/td><td><a href=\"https::\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-20874\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-20874<\/a><\/td><td>Windows Management Services Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Management Services<\/td><td><a href=\"https::\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-20862\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-20862<\/a><\/td><td>Windows Management Services Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Management Services<\/td><td><a href=\"https::\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-20866\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-20866<\/a><\/td><td>Windows Management Services Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Management Services<\/td><td><a href=\"https::\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-20867\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-20867<\/a><\/td><td>Windows Management Services Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Management Services<\/td><td><a href=\"https::\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-20861\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-20861<\/a><\/td><td>Windows Management Services Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Management Services<\/td><td><a href=\"https::\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-20865\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-20865<\/a><\/td><td>Windows Management Services Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Management Services<\/td><td><a href=\"https::\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-20858\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-20858<\/a><\/td><td>Windows Management Services Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Management Services<\/td><td><a href=\"https::\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-20918\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-20918<\/a><\/td><td>Windows Management Services Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Management Services<\/td><td><a href=\"https::\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-20877\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-20877<\/a><\/td><td>Windows Management Services Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Management Services<\/td><td><a href=\"https::\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-20923\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-20923<\/a><\/td><td>Windows Management Services Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Management Services<\/td><td><a href=\"https::\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-20873\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-20873<\/a><\/td><td>Windows Management Services Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Media<\/td><td><a href=\"https::\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-20837\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-20837<\/a><\/td><td>Windows Media Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Motorola Soft Modem Driver<\/td><td><a href=\"https::\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2024-55414\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-55414<\/a><\/td><td>Windows Motorola Soft Modem Driver Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows NDIS<\/td><td><a href=\"https::\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-20936\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-20936<\/a><\/td><td>Windows NDIS Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows NTFS<\/td><td><a href=\"https::\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-20922\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-20922<\/a><\/td><td>Windows NTFS Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows NTFS<\/td><td><a href=\"https::\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-20840\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-20840<\/a><\/td><td>Windows NTFS Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows NTLM<\/td><td><a href=\"https::\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-20925\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-20925<\/a><\/td><td>NTLM Hash Disclosure Spoofing Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows NTLM<\/td><td><a href=\"https::\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-20872\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-20872<\/a><\/td><td>NTLM Hash Disclosure Spoofing Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Remote Assistance<\/td><td><a href=\"https::\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-20824\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-20824<\/a><\/td><td>Windows Remote Assistance Security Feature Bypass Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Remote Procedure Call<\/td><td><a href=\"https::\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-20821\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-20821<\/a><\/td><td>Remote Procedure Call Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Remote Procedure Call Interface Definition Language (IDL)<\/td><td><a href=\"https::\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-20832\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-20832<\/a><\/td><td>Windows Remote Procedure Call Interface Definition Language (IDL) Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Routing and Remote Access Service (RRAS)<\/td><td><a href=\"https::\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-20868\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-20868<\/a><\/td><td>Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Routing and Remote Access Service (RRAS)<\/td><td><a href=\"https::\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-20843\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-20843<\/a><\/td><td>Windows Routing and Remote Access Service (RRAS) Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Secure Boot<\/td><td><a href=\"https::\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-21265\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-21265<\/a><\/td><td>Secure Boot Certificate Expiration Security Feature Bypass Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Server Update Service<\/td><td><a href=\"https::\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-20856\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-20856<\/a><\/td><td>Windows Server Update Service (WSUS) Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Shell<\/td><td><a href=\"https::\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-20834\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-20834<\/a><\/td><td>Windows Spoofing Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Shell<\/td><td><a href=\"https::\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-20847\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-20847<\/a><\/td><td>Microsoft Windows File Explorer Spoofing Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows SMB Server<\/td><td><a href=\"https::\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-20926\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-20926<\/a><\/td><td>Windows SMB Server Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows SMB Server<\/td><td><a href=\"https::\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-20921\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-20921<\/a><\/td><td>Windows SMB Server Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows SMB Server<\/td><td><a href=\"https::\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-20919\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-20919<\/a><\/td><td>Windows SMB Server Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows SMB Server<\/td><td><a href=\"https::\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-20927\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-20927<\/a><\/td><td>Windows SMB Server Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows SMB Server<\/td><td><a href=\"https::\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-20848\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-20848<\/a><\/td><td>Windows SMB Server Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows SMB Server<\/td><td><a href=\"https::\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-20934\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-20934<\/a><\/td><td>Windows SMB Server Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Telephony Service<\/td><td><a href=\"https::\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-20931\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-20931<\/a><\/td><td>Windows Telephony Service Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows TPM<\/td><td><a href=\"https::\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-20829\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-20829<\/a><\/td><td>TPM Trustlet Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Virtualization-Based Security (VBS) Enclave<\/td><td><a href=\"https::\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-20938\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-20938<\/a><\/td><td>Windows Virtualization-Based Security (VBS) Enclave Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Virtualization-Based Security (VBS) Enclave<\/td><td><a href=\"https::\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-20935\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-20935<\/a><\/td><td>Windows Virtualization-Based Security (VBS) Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Virtualization-Based Security (VBS) Enclave<\/td><td><a href=\"https::\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-20819\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-20819<\/a><\/td><td>Windows Virtualization-Based Security (VBS) Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Virtualization-Based Security (VBS) Enclave<\/td><td><a href=\"https::\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-20876\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-20876<\/a><\/td><td>Windows Virtualization-Based Security (VBS) Enclave Elevation of Privilege Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Windows WalletService<\/td><td><a href=\"https::\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-20853\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-20853<\/a><\/td><td>Windows WalletService Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Win32K &#8211; ICOMP<\/td><td><a href=\"https::\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-20811\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-20811<\/a><\/td><td>Win32k Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Win32K &#8211; ICOMP<\/td><td><a href=\"https::\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-20870\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-20870<\/a><\/td><td>Windows Win32 Kernel Subsystem Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Win32K &#8211; ICOMP<\/td><td><a href=\"https::\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-20920\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-20920<\/a><\/td><td>Win32k Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Win32K &#8211; ICOMP<\/td><td><a href=\"https::\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-20863\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-20863<\/a><\/td><td>Win32k Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p>III. Referencia a soluciones, herramientas e informaci\u00f3n<br>Actualizar utilizando Microsoft Windows Update o herramientas de administraci\u00f3n de actualizaciones centralizadas.<\/p>\n\n\n\n<p>IV. Informaci\u00f3n de contacto<br>CSIRT PANAMA<br>Computer Security Incident Response Team Autoridad Nacional para la Innovacion Gubernamental<br>E-Mail: incidentes@cert.pa<br>E-Mail: info@cert.pa<br>Phone: +507 520-CERT (2378)<br>Web: https:\/\/cert.pa<br>Key ID: 16F2B124<\/p>\n","protected":false},"excerpt":{"rendered":"<p>CSIRT Panam\u00e1 Aviso 2026-Ene-13 Actualizaciones de seguridad de Microsoft para Enero 2026.Gravedad: AltaFecha de publicaci\u00f3n: enero 13, 2026\u00daltima revisi\u00f3n: enero 13, 2026https:\/\/msrc.microsoft.com\/update-guide\/releaseNote\/2026-Jan Sistemas Afectados:Windows Deployment ServicesSQL ServerWindows HelloDesktop Window ManagerPrinter Association ObjectWindows Kernel MemoryWindows Ancillary&#8230;<\/p>\n","protected":false},"author":5,"featured_media":1843,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[4],"tags":[76,8,72,68,45,94],"class_list":["post-4959","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-avisos-de-seguridad","tag-actualizaciones","tag-avisos","tag-avisos-de-seguridad","tag-vulnerabilidades","tag-windows","tag-windows-update"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/4959","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=4959"}],"version-history":[{"count":1,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/4959\/revisions"}],"predecessor-version":[{"id":4960,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/4959\/revisions\/4960"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/media\/1843"}],"wp:attachment":[{"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=4959"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=4959"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=4959"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}