January 2026 CVE Landscape: 23 Critical Vulnerabilities Mark 5% Increase, APT28 Exploits Microsoft Office Zero-Day

January 2026 saw a modest 5% increase in high-impact vulnerabilities, with Recorded Future's Insikt Group® identifying 23 vulnerabilities requiring immediate remediation, up from 22 in December 2025. Noteworthy trends last month included Russian state-sponsored exploitation of a Microsoft Office zero-day and critical authentication bypass flaws affecting enterprise infrastructure.

What security teams need to know:

Bottom line: The slight increase masks significant threats. APT28's zero-day exploitation and multiple critical authentication bypass flaws demonstrate that threat actors continue targeting enterprise communication and management platforms for initial access and persistence.

Quick Reference Table

All 23 vulnerabilities below were actively exploited in January 2026.

#
Vulnerability
Risk
Score
Affected Vendor/Product
Vulnerability Type/Component
Public PoC
1
CVE-2026-20029
99
Cisco Identity Services Engine Software
CWE-611 (Improper Restriction of XML External Entity Reference)
No
2
CVE-2026-20805
99
Microsoft Windows
CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor)
Yes
3
CVE-2026-20931
99
Microsoft Windows
CWE-73 (External Control of File Name or Path)
No
4
CVE-2026-23550
99
Modular DS Plugin
CWE-266 (Incorrect Privilege Assignment)
Yes
5
CVE-2026-24061
99
GNU InetUtils
CWE-88 (Argument Injection)
Yes
6
CVE-2026-20045
99
Cisco Unified Communications Manager
CWE-94 (Code Injection)
Yes
7
CVE-2026-23760
99
SmarterTools SmarterMail
CWE-288 (Authentication Bypass Using an Alternate Path or Channel)
Yes
8
CVE-2026-24423
99
SmarterTools SmarterMail
CWE-306 (Missing Authentication for Critical Function)
Yes
9
CVE-2026-21509
99
Microsoft Office
CWE-807 (Reliance on Untrusted Inputs in a Security Decision)
Yes
10
CVE-2026-24858
99
Fortinet Multiple Products
CWE-288 (Authentication Bypass Using an Alternate Path or Channel)
Yes
11
CVE-2025-40551
99
SolarWinds Web Help Desk
CWE-502 (Deserialization of Untrusted Data)
No
12
CVE-2026-1281
99
Ivanti Endpoint Manager Mobile (EPMM)
CWE-94 (Code Injection)
Yes
13
CVE-2026-1340
99
Ivanti Endpoint Manager Mobile (EPMM)
CWE-94 (Code Injection)
Yes
14
CVE-2018-14634
99
Linux Kernel
CWE-190 (Integer Overflow or Wraparound)
Yes
15
CVE-2025-52691
99
SmarterTools SmarterMail
CWE-434 (Unrestricted Upload of File with Dangerous Type)
Yes
16
CVE-2024-37079
99
Broadcom VMware vCenter Server
CWE-787 (Out-of-bounds Write)
No
17
CVE-2025-68645
99
Synacor Zimbra Collaboration Suite (ZCS)
CWE-98 (PHP Remote File Inclusion)
Yes
18
CVE-2025-34026
99
Versa Concerto
CWE-288 (Authentication Bypass Using an Alternate Path or Channel)
No
19
CVE-2025-31125
99
Vite Vitejs
CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor), CWE-284 (Improper Access Control)
Yes
20
CVE-2025-54313
99
Prettier eslint-config-prettier
CWE-506 (Embedded Malicious Code)
No
21
CVE-2025-8110
89
Gogs
CWE-22 (Path Traversal)
Yes
22
CVE-2009-0556
89
Microsoft Office
CWE-94 (Code Injection)
No
23
CVE-2025-37164
89
Hewlett Packard Enterprise OneView
CWE-94 (Code Injection)
Yes

Table 1: List of vulnerabilities that were actively exploited in January based on Recorded Future data (Source: Recorded Future)

Affected Vendors

Most Common Weakness Types

Threat Actor Activity

APT28's Operation Neusploit marked January's most sophisticated campaign:

Priority Alert: Active Exploitation

These vulnerabilities demand immediate attention due to confirmed exploitation in the wild.

CVE-2026-21509 | Microsoft Office

Risk Score: 99 (Very Critical) | Active exploitation by APT28

Why this matters: Zero-day exploitation by Russian state-sponsored actors bypasses Office security features, enabling delivery of email collection implants and backdoors. The vulnerability stems from reliance on untrusted inputs in security decisions, allowing unauthorized attackers to bypass OLE mitigations.

Affected versions: Microsoft 365 and Microsoft Office (versions not specified in advisory)

Immediate actions:

Figure 1: Vulnerability Intelligence Card® for CVE-2026-21509 in Recorded Future (Source: Recorded Future)

CVE-2026-23760 | SmarterTools SmarterMail

Risk Score: 99 (Very Critical) | CISA KEV: Added January 26, 2026

Why this matters: Unauthenticated attackers can reset system administrator passwords without any credentials or prior access, enabling complete administrative takeover and potential RCE through volume mount command injection.

Affected versions: SmarterTools SmarterMail prior to build 9511

Immediate actions:

CVE-2026-1281 & CVE-2026-1340 | Ivanti Endpoint Manager Mobile

Risk Score: 99 (Very Critical) | CISA KEV: CVE-2026-1281 added January 29, 2026

Why this matters: Pre-authentication RCE vulnerabilities in EPMM enable unauthenticated attackers to execute arbitrary code by exploiting Apache RewriteMap helper scripts that pass attacker-controlled strings to Bash.

Affected versions: Ivanti EPMM 12.5.0.0 and earlier, 12.5.1.0 and earlier, 12.6.0.0 and earlier, 12.6.1.0 and earlier, and 12.7.0.0 and earlier

Immediate actions:

Exposure: EPMM instances accessible over corporate networks or VPN connections

Figure 2: Risk Rules History from Vulnerability Intelligence Card® for CVE-2026-1340 in Recorded Future (Source: Recorded Future)

Technical Deep Dive: Exploitation Analysis

APT28's Operation Neusploit (CVE-2026-21509)

The multi-stage attack chain: CVE-2026-21509 enables bypass of Office OLE mitigations through weaponized RTF files:

Why this matters: APT28 demonstrates sophisticated exploitation combining zero-day vulnerabilities with anti-analysis techniques, targeting government and business users for email collection and persistent access.

Modular DS WordPress Plugin Exploitation (CVE-2026-23550 & CVE-2026-23800)

The authentication bypass chain: CVE-2026-23550 enables administrator-level access without authentication:

Known IoCs associated with CVE-2026-23550:

Known IoCs associated with CVE-2026-23800:

Why this matters: WordPress plugin vulnerabilities enable threat actors to compromise multiple sites from a single centralized management platform, amplifying attack impact.

SmarterMail Authentication Bypass (CVE-2026-23760)

The password reset flaw: CVE-2026-23760 exposes privileged password reset to anonymous callers:

Why this matters: Complete administrative takeover without credentials enables threat actors to deploy web shells, modify configurations, and establish persistent access to mail server infrastructure.

Detection & Remediation Resources

Nuclei Templates from Insikt Group®

Recorded Future customers can access Nuclei templates for:

Recorded Future Product Integrations

January 2026 Summary

State-sponsored zero-days return. APT28's exploitation of CVE-2026-21509 demonstrates continued Russian interest in email collection and persistent access through Office vulnerabilities.

Authentication bypass dominates enterprise risk. Multiple critical flaws in SmarterMail, Modular DS, and Cisco products enable complete administrative takeover without credentials.

Legacy vulnerabilities persist. CVE-2009-0556 (Microsoft Office) highlights how threat actors continue targeting unretired systems where patching has lagged for over a decade.

Take Action

Ready to see how Recorded Future can help your team detect state-sponsored exploitation, prioritize authentication bypass fixes, and reduce enterprise attack surface? Explore our demo center for live examples, or dive deeper with Insikt Group research for technical threat intelligence.

About Insikt Group®:

Recorded Future's Insikt Group® is a team of elite analysts, linguists, and security researchers providing actionable intelligence to protect organizations worldwide. Our research combines human expertise with AI-powered analytics to deliver timely, relevant threat intelligence on emerging vulnerabilities and threat actor campaigns.