Skip to main content
Five Vendors, Ten Days: Patch Chaos in January 2026Incident
4 min readFor Security Engineers

Five Vendors, Ten Days: Patch Chaos in January 2026

Between January 14 and January 24, 2026, five enterprise software vendors released patches for critical vulnerabilities with CVSS scores ranging from 9.1 to 9.6. If your team manages any combination of Ivanti, Fortinet, SAP, VMware, or n8n in production, you faced a choice: drop everything to patch, or accept the risk that remote code execution and privilege escalation vulnerabilities were now public knowledge.

This wasn't a coordinated disclosure. It was coincidence—the kind that exposes how fragile just-in-time patch management becomes when multiple critical issues land simultaneously.

What Happened

Five vendors shipped emergency patches within ten days:

Ivanti patched CVE-2026-8043 in Xtraction, scoring 9.6 on CVSS. The vulnerability allowed remote code execution.

Fortinet addressed two flaws: CVE-2026-44277 and CVE-2026-26083, both scoring 9.1. These involved improper access controls and missing authorization checks that could lead to privilege escalation.

SAP fixed CVE-2026-34260 and CVE-2026-34263, each scoring 9.6. These vulnerabilities enabled unauthorized access through insecure configurations.

VMware and n8n released patches for their own critical issues during the same window, though specific CVSS scores weren't disclosed in the source reporting.

None of these were zero-days. All were patched before active exploitation was reported. But the compressed timeline meant security teams had to triage five separate vendor advisories, test patches across different environments, and coordinate deployment—all while maintaining normal operations.

Timeline

  • January 14: First vendor advisory published
  • January 14-24: Remaining four vendors release patches
  • January 24: Final patch in the cluster released
  • Days 1-3: Security teams assess which systems are affected
  • Days 4-7: Patch testing in non-production environments
  • Days 8-14: Production deployment begins (for teams with mature processes)
  • Week 3+: Stragglers still deploying patches, or deferring until next maintenance window

For organizations without dedicated patch management workflows, many of these patches likely sat in a queue marked "high priority" while teams debated whether to interrupt production schedules.

Which Controls Failed or Were Missing

This scenario doesn't represent control failures in the traditional sense—no one was breached because they missed these patches in the first week. But it exposes three systemic weaknesses:

1. No pre-approved emergency patching process

When a 9.6 CVSS vulnerability drops, your team shouldn't be debating whether you have authority to patch outside the monthly maintenance window. That decision should be codified in your change management policy.

2. Lack of asset inventory tied to vendor advisories

If your team spent January 15 asking "do we even run Ivanti Xtraction?", your asset management system isn't integrated with your vulnerability management workflow. You should know within 15 minutes which systems are affected by any vendor advisory.

3. No CVSS-based SLA framework

CVSS scores above 9.0 represent remotely exploitable vulnerabilities that grant an attacker significant control. If your patching SLA treats a 9.6 the same as a 7.5, you're not prioritizing based on actual risk.

What the Standards Require

PCI DSS v4.0.1 Requirement 6.3.3 mandates that security vulnerabilities are identified using reputable outside sources and that newly discovered vulnerabilities are assigned a risk ranking. The requirement doesn't specify CVSS, but it's the de facto standard for risk ranking.

NIST 800-53 Rev 5, SI-2 (Flaw Remediation) requires organizations to install security-relevant software updates within organization-defined time periods. The control enhancement SI-2(2) specifies automated mechanisms for determining the state of system components with regard to flaw remediation.

ISO/IEC 27001:2022 Control 8.8 (Management of Technical Vulnerabilities) requires timely information about technical vulnerabilities, evaluation of exposure, and appropriate measures to address the associated risk.

None of these standards say "patch within 24 hours of a 9.6 CVSS." They say you need a defined process that maps severity to response time. If you don't have that mapping documented and tested, you're not compliant—even if you eventually patched everything.

Lessons and Action Items

Define your CVSS-to-SLA mapping now

Create a table:

  • CVSS 9.0-10.0: Emergency patch within 48 hours (production), 24 hours (internet-facing)
  • CVSS 7.0-8.9: Patch within 7 days
  • CVSS 4.0-6.9: Patch within 30 days

Document who can authorize emergency changes for critical vulnerabilities. Get that policy signed by your CISO and your VP of Infrastructure. Test it during your next tabletop exercise.

Build a vendor-to-asset mapping

Your CMDB should answer "which systems run software from Fortinet?" in under 60 seconds. If it can't, start with a spreadsheet that maps:

  • Vendor name
  • Product name and version
  • Hostname/IP
  • Business owner
  • Criticality tier

Update it monthly. Automate it if you can, but a maintained spreadsheet beats an empty CMDB.

Implement automated vulnerability scanning tied to vendor feeds

Tools like Tenable, Qualys, or Rapid7 can ingest vendor advisories and flag affected systems automatically. If you're not using one, you're manually correlating CVE numbers against asset lists—a process that breaks down when five advisories land in ten days.

Test your patch deployment pipeline under load

Run a drill: "Three critical patches dropped today. How long until they're in production?" If the answer is "we'd need to schedule a CAB meeting," your process isn't built for the cadence of modern vulnerability disclosure.

Stop treating all "critical" vulnerabilities the same

A CVSS 9.6 remote code execution flaw in an internet-facing application is not the same priority as a 9.6 privilege escalation that requires local access. Read the CVSS vector string (AV:N/AC:L/PR:N/UI:N). If it's network-accessible with no privileges required, that's your top priority.

The January 2026 patch cluster wasn't an anomaly. It's the new baseline. Your patch management process needs to assume that multiple critical vulnerabilities will land simultaneously, because they will.

Topics:Incident

You Might Also Like