Important Notice: Security vulnerabilities of Microsoft (updated at 15 January 2026)
關於 Microsoft 的安全漏洞通告 (更新於 2026年1月15日)

資訊安全警示 Information Security Alert
To: All Users
As informed by the Cybersecurity Incident Alert and Response Centre (CARIC), Microsoft have recently released its January security update notice, there are 115 vulnerability updates this time.
The updates this time mainly cover the following components: Windows Ancillary Function Driver for WinSock, Windows Client-Side Caching (CSC) Service, Windows NTFS, Windows NTLM, Windows Remote Assistance, Windows Remote Procedure Call, Windows Server Update Service, Windows Cloud Files Mini Filter Driver, Windows Management Services, etc. products vulnerabilities.
Details of the vulnerabilities:
- Desktop Window Manager Information Disclosure Vulnerability
For more details, please refer to: https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2026-20805
- Microsoft Excel Remote Code Execution Vulnerability
For more details, please refer to: https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2026-20955
https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2026-20957
- Microsoft Office Remote Code Execution Vulnerability
For more details, please refer to: https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2026-20953
https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2026-20952
- Windows Graphics Component Elevation of Privilege Vulnerability
For more details, please refer to: https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2026-20822
- Windows Local Security Authority Subsystem Service (LSASS) Remote Code Execution Vulnerability
For more details, please refer to: https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2026-20854
- Windows Virtualization-Based Security (VBS) Enclave Elevation of Privilege Vulnerability
For more details, please refer to: https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2026-20876
- Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
For more details, please refer to: https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2026-20860
- Windows Common Log File System Driver Elevation of Privilege Vulnerability
For more details, please refer to: https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2026-20820
For more details about Microsoft January Updates, please refer to: https://msrc.microsoft.com/update-guide/releaseNote/2026-jan
If the relevant affected products are used, please install the security updates released by Microsoft as soon as possible.
Reference
- How to download and install software in a secure manner?
- Basic Knowledge of Online Safety and Security
- Other Information Security Tips
Should you have any enquiries, please feel free to contact ICTO Help Desk.
ICTO Help Desk
Location : Room 2085, 2/F, Central Teaching Building (E5), eMap
Telephone : 8822 8600
email : icto.helpdesk@um.edu.mo
Information and Communication Technology Office
各位用戶:
資訊及通訊科技部接獲網絡安全事故預警及應急中心的通知,Microsoft 近日發布了 1月安全更新通告,此次包含了 115個漏洞更新。
此次釋出的更新主要涵蓋了以下組件: Windows Ancillary Function Driver for WinSock, Windows Client-Side Caching (CSC) Service, Windows NTFS, Windows NTLM, Windows Remote Assistance, Windows Remote Procedure Call, Windows Server Update Service, Windows Cloud Files Mini Filter Driver, Windows Management Services 等產品的漏洞。
漏洞詳情:
- Windows 桌面視窗管理器資訊洩露漏洞
有關詳情可參考:https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2026-20805
- Microsoft Excel 遠端代碼執行漏洞
有關詳情可參考:https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2026-20955
https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2026-20957
- Microsoft Office 遠端代碼執行漏洞
有關詳情可參考:https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2026-20953
https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2026-20952
- Windows 圖形元件許可權提升漏洞
有關詳情可參考:https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2026-20822
- Windows 本地安全機構子系統服務 (LSASS) 遠端代碼執行漏洞
有關詳情可參考:https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2026-20854
- Windows Virtualization-Based Security (VBS) Enclave 許可權提升漏洞
有關詳情可參考:https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2026-20876
- Windows WinSock 協助工具驅動程式許可權提升漏洞
有關詳情可參考:https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2026-20860
- Windows 通用日誌檔案系統驅動程式許可權提升漏洞
有關詳情可參考:https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2026-20820
Microsoft 1月更新有關詳情可參考:https://msrc.microsoft.com/update-guide/releaseNote/2026-jan
倘有使用相關受影響產品,須盡快安裝由微軟公司釋出的安全更新。
參考資料
如有任何疑問,請聯絡資訊及通訊科技部服務中心。
服 務 中 心
位置 : 中央教學樓東5座(E5)二樓2085室 (電子地圖)
電話 : 8822 8600
電郵 : icto.helpdesk@um.edu.mo
資訊及通訊科技部