Microsoft has released security updates addressing 114 vulnerabilities in its products. This includes one actively exploited zero-day (CVE-2023-31096), two publicly disclosed zero-days (CVE-2026-20805 and CVE-2026-21265), and eight critical flaws, six of which allow remote code execution and two that allow privilege escalation.
These updates apply to, but are not limited to:
Windows OS: 11.
Windows Server: 2022, 2025.
MS SQL Server: 2017, 2019, 2022, 2025.
Microsoft Office: 2021, 2024.
Security Risks
The identified vulnerabilities could allow attackers to run malicious programs, gain unauthorized access, view sensitive information, and compromise the security and integrity of affected systems.
For the full list of security patches released by Microsoft, please refer to the Microsoft Security Update Guide and apply the necessary updates.
Recommended Actions
The National Cyber Security Authority (NCSA) recommends users and administrators:
1. Apply the latest security patches as soon as possible to prevent unauthorized control over unpatched systems.
2. Upgrade immediately to the latest supported version of installed Microsoft software to continue receiving technical support and security patches.
The following Microsoft software products reached their end-of-life and need to be upgraded soon:
Windows Server 2003, 2003 RE, 2008, 2008 RE, 2008 SP2, 2012, and 2012 R2
Exchange Server 2003, 2007, 2010, 2013, 2016, 2019, and Windows Vista, XP, 8, and 7, 10.
Microsoft SQL Server 2005, 2008, 2012, 2014, and MS Office 2013, 2016 and 2019.
Additionally, scheduled for end-of-life in 2026; Upgrade recommended before end of support:
3. Before any updating task, ensure you have a current, tested backup of your data.
For further information and support, please contact the National Cyber Security Authority (NCSA) by emailing rwcsirt@ncsa.gov.rw or calling us on 9009.