Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Cyber Offensive Fundamentals 320x200 V0.1
Fortinet 970x120px
Microsoft Patches Zero-Day NTFS Vulnerabilities in Windows 11 and Server

Microsoft Patches Zero-Day NTFS Vulnerabilities in Windows 11 and Server

16 January 2026 13:12

Microsoft released a security update in January that addresses two serious zero-day vulnerabilities in the NTFS file system.

The vulnerabilities affected more than thirty versions of desktop and server operating systems , including Windows 11 and Windows Server. Before the patches were released, attackers could have exploited these flaws to gain complete control of a computer.

Both vulnerabilities received a CVSS score of 7.8 out of 10 and are classified as heap-based buffer overflows . The first flaw (CVE-2026-20840) related to the insecure handling of virtual hard disks (VHDs). To exploit it, an attacker would have had to gain preemptive access to the system, for example, through pre-installed malware. They could then prepare a specially crafted VHD file and, when the system processed it, write arbitrary data to protected memory areas.

The second vulnerability (CVE-2026-20922) arose due to a lack of validation checks in the NTFS driver code for service tables on the disk partition. This also allowed privilege escalation.

In both cases, successful exploitation allowed the attacker to gain SYSTEM-level privileges, the highest privileges available in the operating system. With these privileges, the attacker could secretly install malware, steal data, and, in a corporate environment, use the compromised computer as a springboard for further infiltration of the local network.

Both vulnerabilities were discovered by Sergey Tarasov, head of the vulnerability analysis team at Positive Technologies.

Such vulnerabilities pose a particular danger because they often become the first link in a chain of targeted attacks on organizations.

Users are advised to install the latest security updates . Those who, for whatever reason, are unable to do so should exercise caution when working with virtual hard drives and avoid opening VHD files from untrusted sources.

Follow us on Google News to receive daily updates on cybersecurity. Contact us if you would like to report news, insights or content for publication.

Cropped RHC 3d Transp2 1766828557 300x300
The editorial staff of Red Hot Cyber is composed of IT and cybersecurity professionals, supported by a network of qualified sources who also operate confidentially. The team works daily to analyze, verify, and publish news, insights, and reports on cybersecurity, technology, and digital threats, with a particular focus on the accuracy of information and the protection of sources. The information published is derived from direct research, field experience, and exclusive contributions from national and international operational contexts.