Microsoft has pushed the first Extended Security Updates (ESU) package for 2026 and confirmed what many administrators feared and some hoped for: a mandatory, high‑priority security rollout that fixes a large number of vulnerabilities and begins the phased replacement of Secure Boot certificates that begin expiring later this year. The update — included in the January cumulative servicing for supported Windows 10 builds — carries urgent changes that range from driver removals to firmware trust‑chain adjustments, and it comes with a new consumer enrollment model for Extended Security Updates that ties free coverage to a Microsoft account or an alternative paid option through the end of the ESU program on 13 October 2026.
Windows 10 reached its formal end of mainstream support in mid‑October of the previous year, and the vendor introduced a consumer ESU program to give users an extra year of critical and important security updates. That program continues through 13 October 2026, and this month’s cumulative update is the first full ESU delivery window of the new calendar year.
This release is notable for three overlapping reasons:
When the certificates used to sign future pre‑boot components expire, two problems emerge:
However, the phased approach is a double‑edged sword:
A few points to keep in mind when interpreting the counts:
Key takeaways from adoption trends:
This month’s update is not an ordinary “install when you have time” release. It contains boot‑level trust changes and an unusually large set of security remediations. Treat it as an operational priority: confirm eligibility, stage updates, coordinate firmware vendors, and validate recovery paths. The ESU window remains open through 13 October 2026, but the timeline for safe certificate migration is fixed — the clock for pre‑boot trust anchors is already ticking.
Source: Forbes Microsoft Confirms First Free Windows Update For 2026
Background / Overview
Windows 10 reached its formal end of mainstream support in mid‑October of the previous year, and the vendor introduced a consumer ESU program to give users an extra year of critical and important security updates. That program continues through 13 October 2026, and this month’s cumulative update is the first full ESU delivery window of the new calendar year.This release is notable for three overlapping reasons:
- It distributes a substantial security patch bundle that addresses over a hundred vulnerabilities across Windows and related components.
- It begins or accelerates the replacement of long‑running Secure Boot certificates used to validate pre‑OS and boot manager components, a change tied to certificate expirations in mid‑ to late‑2026.
- It reinforces how Microsoft is enforcing consumer ESU eligibility: free coverage is available if users enroll with a Microsoft Account and meet the stated sync/sign‑in conditions; otherwise the consumer may pay a one‑time fee to receive ESU coverage through the program end date.
What Microsoft confirmed — ESU enrollment and the January update
Free ESU vs paid enrollment: the practical choices
Microsoft’s consumer ESU model offers two practical enrollment paths for personal devices that meet the prerequisites (Windows 10 version 22H2 and up‑to‑date servicing):- A free option that requires signing in with a Microsoft Account and keeping that account linked to the device; in certain jurisdictions this requires syncing Windows settings to the cloud or periodically signing in.
- A paid alternative (a one‑time purchase) that lets users keep a local account after enrollment; the purchase must initially be completed while signed in with a Microsoft Account.
The January cumulative update and KB identifier
The January servicing includes the ESU‑applicable cumulative update for the Windows 10 servicing branch. The package installs necessary servicing stack updates and contains a number of security fixes. Because this is an ESU rollout for devices that remain on Windows 10, administrators and users should treat this cumulative update as a required step to keep devices eligible and secure under the extended program.Deep dive: Secure Boot certificates — what’s changing and why it matters
Why Secure Boot certificates are not a routine detail
Secure Boot enforces a cryptographic trust chain during system boot. Firmware stores several protected databases and keys — the platform key (PK), key exchange key (KEK), the allowed signature database (db) and the revoked signature database (dbx). Certificates and keys held in those stores act as trust anchors for bootloaders, firmware option ROMs and pre‑OS components. Those certificates are time‑bound: they have expiration dates and must be rotated before they lapse.When the certificates used to sign future pre‑boot components expire, two problems emerge:
- Devices lacking the new trust anchors cannot accept updates to pre‑boot components signed with the replacement certificates. That blocks future security fixes targeted at the earliest boot stages.
- Firmware may refuse to trust newly signed boot components, potentially causing boot or recovery failures for affected configurations (dual‑boot setups, third‑party shims, updated installers).
The phased, confidence‑based rollout
Rather than attempt an immediate worldwide swap of root certificates, Microsoft’s servicing strategy is explicitly phased: devices must demonstrate successful update telemetry and other health signals before receiving the replacement certificates. The idea is to reduce rollout risk — minimizing incidents where firmware incompatibilities or OEM firmware restrictions would create unbootable systems or other untenable outcomes.However, the phased approach is a double‑edged sword:
- For many consumer devices that receive automatic Microsoft‑managed updates and have firmware that supports OS‑initiated variable writes, the transition should be automatic and transparent.
- For older hardware, custom motherboards, or firmware that restricts operating system writes to UEFI variables, the rollout may stall. Those systems must rely on OEM firmware updates (BIOS/UEFI packages) or manual firmware provisioning to install the new certificates.
Operational implications for administrators and power users
- Treat Secure Boot certificate migration as a high‑priority operational task. The first expiration window starts in mid‑2026; missing the update window may prevent future pre‑OS security fixes from being applied.
- Validate firmware readiness for your device fleet: check OEM update channels and include firmware/BIOS updates in your patching cycles.
- Virtual machines, pre‑OS tooling, and dual‑boot setups should be tested. Some Linux distributions and boot manager shims rely on the pre‑existing Microsoft signing model; ensure installed bootloaders are signed under an accepted chain after the migration.
- Avoid ad‑hoc rollback attempts. Certain DBX (revocation) operations are effectively irreversible on affected systems, and recovering from an unsupported state may require reimaging or firmware‑level intervention.
The security landscape: how many vulnerabilities and what types were fixed?
The January cumulative servicing for Windows and related Microsoft components addressed a very large set of flaws — over one hundred distinct vulnerabilities across the product family. The mix was dominated by elevation‑of‑privilege issues, with tens of privilege escalation fixes, several information disclosure and remote code execution vulnerabilities, and a small number of spoofing, tampering and denial‑of‑service items.A few points to keep in mind when interpreting the counts:
- Public reporting of the patch bundle varies by aggregator; different security services count items slightly differently depending on whether they include third‑party components and related products.
- The release included at least one actively exploited vulnerability that was being observed in the wild at the time of release, and the batch contained multiple high‑priority privilege‑escalation fixes that make rapid patching important.
- The update also removed legacy modem drivers that remain in some Windows images — a change that can disable dependent hardware and must be tested in environments that rely on older modem hardware.
- Rapidly deploy the servicing stack updates and cumulative update to devices that must remain on Windows 10 under ESU.
- Test and stage firmware/BIOS updates on representative hardware, especially where Secure Boot is enabled and the vendor’s firmware is older.
- Prioritize systems exposed to user interaction, remote services, or sensitive data for immediate patching because elevation and RCE flaws increase the risk of lateral movement and privilege escalation after initial compromise.
Market context: adoption trends and what they imply for the transition
Adoption metrics for the latest Windows release and the old generation have been a moving target. Aggregate trackers show narrow margins and month‑to‑month shifts; in many regions Windows 10 remains widely used, often on older hardware that does not meet the stricter requirements of the newer OS. Those patterns help explain why extended updates are both necessary and widely consumed.Key takeaways from adoption trends:
- A significant proportion of the installed base remains on Windows 10, meaning ESU coverage is important not only for hobbyist and legacy users but for sizable consumer and small‑business populations.
- Upgrade pressure is asymmetrical: users on modern, brand‑new devices are more likely to have migrated, while older desktops and laptops — including many corporate BYOD and home setups — continue to run the older OS.
- The ESU program, and the conditions attached to the free tier, functionally slow the shock of a hard cutoff by providing one more year of critical security maintenance; however, this is a bridge, not a long‑term support model.
Privacy and ecosystem tradeoffs: the Microsoft Account and OneDrive requirement
The free ESU path requires device enrollment with a Microsoft Account, and in some non‑jurisdictional variants that enrollment route also asks users to sync settings via the cloud backup tool. This introduces two interlocking concerns:- Privacy and data flow: syncing settings to cloud storage introduces telemetry and account linkages that some privacy‑conscious users will resist. Even if only “settings” are synced, the act of linking an account changes device management dynamics.
- Platform lock‑in implications: tying free security coverage to an account encourages users to remain within the vendor’s ecosystem. For consumers, that may be an acceptable trade; for those who deliberately avoid cloud accounts, the paid ESU alternative is the only practical option.
Practical checklist — what to do now
- Confirm eligibility: ensure devices are running the required Windows 10 build (22H2) and have recent servicing stack updates installed.
- Enroll (if you intend to use ESU):
- Sign in with your Microsoft Account and follow the enrollment wizard on the Windows Update pane; or
- If you prefer not to remain signed in, complete the paid one‑time ESU purchase while signed in, then you may switch back to a local account if desired.
- Install the January cumulative update (the ESU package) immediately on production and home systems that will remain on Windows 10. Prioritize endpoints with elevated privileges, exposed services, or internet‑facing roles.
- Verify Secure Boot and firmware readiness:
- Check Secure Boot state in UEFI/firmware settings.
- Inventory firmware versions and available BIOS/UEFI updates from OEMs.
- Test the certificate installation process on representative hardware before mass deployment.
- Backup critical devices and create a rollback plan. Because some driver removals or DBX operations can be disruptive, ensure you have disaster recovery steps.
- For dual‑boot or custom configurations, test boot flows after applying the update and the new certificates. Some third‑party boot utilities may require updated signing or firmware support.
- Monitor telemetry and update health. Watch for failed updates or boot issues after the phased certificate rollouts; reimage or apply OEM firmware fixes where necessary.
Strengths, risks, and final assessment
Strengths
- The ESU program buys a crucial one‑year window for devices that cannot migrate immediately, reducing the immediate attack surface for millions of endpoints.
- The vendor’s phased, telemetry‑driven rollout for replacement certificates reduces the risk of mass failures; it is a cautious approach that prioritizes device stability.
- Consolidating a large set of fixes into the January release ensures many known flaws are addressed at once, simplifying patch policy for administrators.
Risks and open questions
- Firmware fragmentation is the largest operational unknown. Many devices rely on OEM firmware updates to accept new KEK/db changes; if OEMs lag, devices may miss crucial pre‑boot fixes.
- The account and sync requirements for free ESU will be unpopular among privacy‑focused users, potentially leaving some users to defer enrollment and remain exposed.
- Some changes in the cumulative package — notably legacy driver removals and DBX additions — can lead to immediate functional impacts on older hardware. Testing and inventory are non‑negotiable.
- Public reporting of the vulnerability counts varies slightly across security outlets; administrators should rely on the vendor’s official security update guide for the authoritative list of CVEs to prioritize mitigations.
Final assessment
This ESU update cycle is a necessary technical and policy stopgap. It reduces immediate systemic risk by delivering critical fixes and preparing the platform for a certificate rotation that cannot be postponed beyond calendar deadlines. At the same time, the rollout underscores how modern operating system security now depends on an ecosystem of firmware vendors, signature ecosystems, and account‑linked enrollment flows. For organizations and careful consumers, the practical risk management strategy is clear: patch quickly, verify firmware support, and plan to migrate off legacy platforms in the medium term. The ESU program delivers breathing room — not a permanent solution.This month’s update is not an ordinary “install when you have time” release. It contains boot‑level trust changes and an unusually large set of security remediations. Treat it as an operational priority: confirm eligibility, stage updates, coordinate firmware vendors, and validate recovery paths. The ESU window remains open through 13 October 2026, but the timeline for safe certificate migration is fixed — the clock for pre‑boot trust anchors is already ticking.
Source: Forbes Microsoft Confirms First Free Windows Update For 2026
