Red Hot Cyber
Cybersecurity, Cybercrime News and Vulnerability Analysis
970x120 Enterprise 1
Microsoft Patches Zero-Day NTFS Vulnerabilities in Windows 11 and Server

Microsoft Patches Zero-Day NTFS Vulnerabilities in Windows 11 and Server

16 January 2026 13:12

Microsoft released a security update in January that addresses two serious zero-day vulnerabilities in the NTFS file system.

The vulnerabilities affected more than thirty versions of desktop and server operating systems , including Windows 11 and Windows Server. Before the patches were released, attackers could have exploited these flaws to gain complete control of a computer.

Both vulnerabilities received a CVSS score of 7.8 out of 10 and are classified as heap-based buffer overflows . The first flaw (CVE-2026-20840) related to the insecure handling of virtual hard disks (VHDs). To exploit it, an attacker would have had to gain preemptive access to the system, for example, through pre-installed malware. They could then prepare a specially crafted VHD file and, when the system processed it, write arbitrary data to protected memory areas.

The second vulnerability (CVE-2026-20922) arose due to a lack of validation checks in the NTFS driver code for service tables on the disk partition. This also allowed privilege escalation.

In both cases, successful exploitation allowed the attacker to gain SYSTEM-level privileges, the highest privileges available in the operating system. With these privileges, the attacker could secretly install malware, steal data, and, in a corporate environment, use the compromised computer as a springboard for further infiltration of the local network.

Both vulnerabilities were discovered by Sergey Tarasov, head of the vulnerability analysis team at Positive Technologies.

Such vulnerabilities pose a particular danger because they often become the first link in a chain of targeted attacks on organizations.

Users are advised to install the latest security updates . Those who, for whatever reason, are unable to do so should exercise caution when working with virtual hard drives and avoid opening VHD files from untrusted sources.

Follow us on Google News to receive daily updates on cybersecurity. Contact us if you would like to report news, insights or content for publication.

Pietro Melillo 300x300
Head of the Dark Lab group. A Computer Engineer specialised in Cyber Security with a deep passion for Hacking and technology, currently CISO of WURTH Italia, he was responsible for Cyber Threat Intelligence & Dark Web analysis services at IBM, carries out research and teaching activities on Cyber Threat Intelligence topics at the University of Sannio, as a Ph.D, author of scientific papers and development of tools to support cybersecurity activities. Leads the CTI Team "RHC DarkLab"
Areas of Expertise: Cyber Threat Intelligence, Ransomware, National Security, Training