Microsoft Patch Tuesday May 2026 – 120 Vulnerabilities Fixed, Including 29 Critical RCE Flaws

Microsoft’s May 2026 Patch Tuesday lands with a heavy enterprise focus, fixing 120 vulnerabilities across Windows, Office, Azure, developer tools, and Microsoft 365 apps, including 29 remote code execution (RCE) flaws rated Critical.

Unlike several recent cycles, Microsoft reports no zero‑days exploited in the wild or publicly disclosed ahead of the release, but the breadth of attack surface from DNS and Netlogon to Office and Wi‑Fi drivers means defenders cannot afford to treat this month as low risk.

Vulnerability TypeCount
Elevation of Privilege61
Security Feature Bypass6
Remote Code Execution (RCE)31
Information Disclosure14
Denial of Service (DoS)8
Spoofing13

Multiple Remote Code Execution Vulnerabilities

While there are no exploited zero‑day bugs this month, the most serious issues are clustered around network‑exposed and document‑driven RCE vulnerabilities that could enable full compromise if left unpatched.

High‑value targets include Microsoft Dynamics 365 on‑premises (CVE‑2026‑42898, CVE‑2026‑42833), multiple Microsoft Office and Word RCEs (for example CVE‑2026‑42831, CVE‑2026‑40363, CVE‑2026‑40358, several Word‑specific CVEs), Windows DNS Client (CVE‑2026‑41096), Netlogon (CVE‑2026‑41089), Windows Graphics/Win32k (CVE‑2026‑40403), Windows GDI (CVE‑2026‑35421), Windows Native Wi‑Fi Miniport (CVE‑2026‑32161), and Microsoft SharePoint Server (CVE‑2026‑40365 and related CVEs).

Many of these live in components routinely exposed to untrusted content network traffic, Office documents, or browser‑like rendering paths, making them prime candidates for phishing and lateral‑movement campaigns.

Windows Core Networking, Kernel, and Virtualization Flaws

On the platform side, multiple vulnerabilities hit Windows networking and kernel‑mode components, raising the stakes for domain‑joined and internet‑facing systems.

Windows DNS Client RCE (CVE‑2026‑41096) and Netlogon RCE (CVE‑2026‑41089) stand out: successful exploitation could allow unauthenticated or low‑privileged attackers to execute code in highly sensitive parts of the Windows authentication and name resolution stack, echoing the impact category of historical bugs like SigRed and Zerologon.

Additional RCE and elevation‑of‑privilege vulnerabilities are scattered across TCP/IP, the Volume Manager Extension driver, kernel‑mode drivers, Win32k, GDI, and the Cloud Files and Telephony subsystems, increasing the potential for chainable exploits.

Windows Hyper‑V (CVE‑2026‑40402, rated Critical) also receives a privilege‑escalation fix, which is particularly important for multi‑tenant and private cloud environments where a guest‑to‑host escape could have an outsized blast radius.

Multiple Secure Boot and security‑feature bypass bugs, including in TCP/IP and Secure Boot itself, underline that attackers continue to probe Microsoft’s defensive controls rather than only its application logic.

Copilot, VS Code, and Azure Flaws

This Patch Tuesday also highlights how deeply AI and cloud‑connected development have been embedded into the enterprise attack surface.

Microsoft patches spoofing and security‑feature bypass issues in M365 Copilot for Desktop and Android, GitHub Copilot with Visual Studio, and Azure Machine Learning notebooks, raising concerns about prompt‑driven social engineering, data exfiltration, or malicious content injection via trusted AI interfaces.

While these flaws are rated Important rather than Critical, compromise of AI assistants that sit close to source code, documents, and chat histories could magnify the impact of otherwise “medium‑risk” bugs.

Developer tooling is another recurring theme. Visual Studio Code receives a cluster of fixes covering elevation of privilege, information disclosure, RCE, and security feature bypass (CVE‑2026‑41613 through CVE‑2026‑41610 and CVE‑2026‑41109), while .NET and ASP.NET Core patches address elevation of privilege, tampering, and denial‑of‑service conditions.

Azure Monitor Agent, Logic Apps, Connected Machine Agent, Windows Admin Center (including Azure Portal integration), and Dynamics 365 Business Central all feature in this month’s bulletin, confirming that Azure‑centric and hybrid‑cloud operators need to treat May’s updates as high priority.

Given the scale of changes, security teams should start by prioritizing internet‑facing and high‑value services: patch Microsoft Dynamics 365 on‑prem, SharePoint, and Office/Word RCEs, followed by Windows DNS Client, Netlogon, Windows GDI/Win32k graphics components, and the Native Wi‑Fi Miniport driver.

Organizations with significant virtualized workloads should schedule maintenance windows for Hyper‑V updates, and those relying on Copilot, Teams, and Azure‑based automation should not overlook AI‑ and workflow‑related fixes, even when severity is marked as Important.

Vulnerability Details

CVE IDImpactTitle
CVE-2026-42899Denial of ServiceASP.NET Core Denial of Service Vulnerability
CVE-2026-42898Remote Code ExecutionMicrosoft Dynamics 365 On-Premises Remote Code Execution Vulnerability
CVE-2026-42896Elevation of PrivilegeWindows DWM Core Library Elevation of Privilege Vulnerability
CVE-2026-42893TamperingMicrosoft Outlook for iOS Tampering Vulnerability
CVE-2026-42833Remote Code ExecutionMicrosoft Dynamics 365 On-Premises Remote Code Execution Vulnerability
CVE-2026-42832SpoofingMicrosoft Office Spoofing Vulnerability
CVE-2026-42831Remote Code ExecutionMicrosoft Office Remote Code Execution Vulnerability
CVE-2026-42830Elevation of PrivilegeAzure Monitor Agent Metrics Extension Elevation of Privilege Vulnerability
CVE-2026-42825Elevation of PrivilegeWindows Telephony Service Elevation of Privilege Vulnerability
CVE-2026-42823Elevation of PrivilegeAzure Logic Apps Elevation of Privilege Vulnerability
CVE-2026-41614SpoofingM365 Copilot for Desktop Spoofing Vulnerability
CVE-2026-41613Elevation of PrivilegeVisual Studio Code Elevation of Privilege Vulnerability
CVE-2026-41612Information DisclosureVisual Studio Code Information Disclosure Vulnerability
CVE-2026-41611Remote Code ExecutionVisual Studio Code Remote Code Execution Vulnerability
CVE-2026-41610Security Feature BypassVisual Studio Code Security Feature Bypass Vulnerability
CVE-2026-41109Security Feature BypassGitHub Copilot and Visual Studio Code Security Feature Bypass Vulnerability
CVE-2026-41103Elevation of PrivilegeMicrosoft SSO Plugin for Jira & Confluence Elevation of Privilege Vulnerability
CVE-2026-41102SpoofingMicrosoft PowerPoint for Android Spoofing Vulnerability
CVE-2026-41101SpoofingMicrosoft Word for Android Spoofing Vulnerability
CVE-2026-41100SpoofingMicrosoft 365 Copilot for Android Spoofing Vulnerability
CVE-2026-41097Security Feature BypassSecure Boot Security Feature Bypass Vulnerability
CVE-2026-41096Remote Code ExecutionWindows DNS Client Remote Code Execution Vulnerability
CVE-2026-41095Elevation of PrivilegeData Deduplication Elevation of Privilege Vulnerability
CVE-2026-41094Remote Code ExecutionMicrosoft Data Formulator Remote Code Execution Vulnerability
CVE-2026-41089Remote Code ExecutionWindows Netlogon Remote Code Execution Vulnerability
CVE-2026-41088Elevation of PrivilegeWindows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
CVE-2026-41086Elevation of PrivilegeWindows Admin Center in Azure Portal Elevation of Privilege Vulnerability
CVE-2026-40421Information DisclosureMicrosoft Word Information Disclosure Vulnerability
CVE-2026-40420Elevation of PrivilegeMicrosoft Office Click-To-Run Elevation of Privilege Vulnerability
CVE-2026-40419Elevation of PrivilegeMicrosoft Office Click-To-Run Elevation of Privilege Vulnerability
CVE-2026-40418Elevation of PrivilegeMicrosoft Office Click-To-Run Elevation of Privilege Vulnerability
CVE-2026-40417Elevation of PrivilegeMicrosoft Dynamics 365 Business Central Elevation of Privilege Vulnerability
CVE-2026-40415Remote Code ExecutionWindows TCP/IP Remote Code Execution Vulnerability
CVE-2026-40414Denial of ServiceWindows TCP/IP Denial of Service Vulnerability
CVE-2026-40413Denial of ServiceWindows TCP/IP Denial of Service Vulnerability
CVE-2026-40410Elevation of PrivilegeWindows SMB Client Elevation of Privilege Vulnerability
CVE-2026-40408Elevation of PrivilegeWindows WAN ARP Driver Elevation of Privilege Vulnerability
CVE-2026-40407Elevation of PrivilegeWindows Common Log File System Driver Elevation of Privilege Vulnerability
CVE-2026-40406Information DisclosureWindows TCP/IP Information Disclosure Vulnerability
CVE-2026-40405Denial of ServiceWindows TCP/IP Denial of Service Vulnerability
CVE-2026-40403Remote Code ExecutionWindows Graphics Component Remote Code Execution Vulnerability
CVE-2026-40402Elevation of PrivilegeWindows Hyper-V Elevation of Privilege Vulnerability
CVE-2026-40401Denial of ServiceWindows TCP/IP Denial of Service Vulnerability
CVE-2026-40399Elevation of PrivilegeWindows TCP/IP Elevation of Privilege Vulnerability
CVE-2026-40398Elevation of PrivilegeWindows Remote Desktop Services Elevation of Privilege Vulnerability
CVE-2026-40397Elevation of PrivilegeWindows Common Log File System Driver Elevation of Privilege Vulnerability
CVE-2026-40382Elevation of PrivilegeWindows Telephony Service Elevation of Privilege Vulnerability
CVE-2026-40381Elevation of PrivilegeAzure Connected Machine Agent Elevation of Privilege Vulnerability
CVE-2026-40380Remote Code ExecutionWindows Volume Manager Extension Driver Remote Code Execution Vulnerability
CVE-2026-40377Elevation of PrivilegeMicrosoft Cryptographic Services Elevation of Privilege Vulnerability
CVE-2026-40374Information DisclosureMicrosoft Power Automate Desktop Information Disclosure Vulnerability
CVE-2026-40370Remote Code ExecutionSQL Server Remote Code Execution Vulnerability
CVE-2026-40369Elevation of PrivilegeWindows Kernel Elevation of Privilege Vulnerability
CVE-2026-40368Remote Code ExecutionMicrosoft SharePoint Server Remote Code Execution Vulnerability
CVE-2026-40367Remote Code ExecutionMicrosoft Word Remote Code Execution Vulnerability
CVE-2026-40366Remote Code ExecutionMicrosoft Word Remote Code Execution Vulnerability
CVE-2026-40365Remote Code ExecutionMicrosoft SharePoint Server Remote Code Execution Vulnerability
CVE-2026-40364Remote Code ExecutionMicrosoft Word Remote Code Execution Vulnerability
CVE-2026-40363Remote Code ExecutionMicrosoft Office Remote Code Execution Vulnerability
CVE-2026-40362Remote Code ExecutionMicrosoft Excel Remote Code Execution Vulnerability
CVE-2026-40361Remote Code ExecutionMicrosoft Word Remote Code Execution Vulnerability
CVE-2026-40360Information DisclosureMicrosoft Excel Information Disclosure Vulnerability
CVE-2026-40359Remote Code ExecutionMicrosoft Excel Remote Code Execution Vulnerability
CVE-2026-40358Remote Code ExecutionMicrosoft Office Remote Code Execution Vulnerability
CVE-2026-40357Remote Code ExecutionMicrosoft SharePoint Server Remote Code Execution Vulnerability
CVE-2026-35440Information DisclosureMicrosoft Word Information Disclosure Vulnerability
CVE-2026-35439Remote Code ExecutionMicrosoft SharePoint Server Remote Code Execution Vulnerability
CVE-2026-35438Elevation of PrivilegeWindows Admin Center Elevation of Privilege Vulnerability
CVE-2026-35436Elevation of PrivilegeMicrosoft Office Click-To-Run Elevation of Privilege Vulnerability
CVE-2026-35433Elevation of Privilege.NET Elevation of Privilege Vulnerability
CVE-2026-35424Denial of ServiceInternet Key Exchange (IKE) Protocol Denial of Service Vulnerability
CVE-2026-35423Information DisclosureWindows 11 Telnet Client Information Disclosure Vulnerability
CVE-2026-35422Security Feature BypassWindows TCP/IP Driver Security Feature Bypass Vulnerability
CVE-2026-35421Remote Code ExecutionWindows GDI Remote Code Execution Vulnerability
CVE-2026-35420Elevation of PrivilegeWindows Kernel Elevation of Privilege Vulnerability
CVE-2026-35419Information DisclosureWindows DWM Core Library Information Disclosure Vulnerability
CVE-2026-35418Elevation of PrivilegeWindows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability
CVE-2026-35417Elevation of PrivilegeWindows Win32k Elevation of Privilege Vulnerability
CVE-2026-35416Elevation of PrivilegeWindows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
CVE-2026-35415Elevation of PrivilegeWindows Storage Spaces Controller Elevation of Privilege Vulnerability
CVE-2026-34351Elevation of PrivilegeWindows TCP/IP Elevation of Privilege Vulnerability
CVE-2026-34350Denial of ServiceWindows Storport Miniport Driver Denial of Service Vulnerability
CVE-2026-34347Elevation of PrivilegeWindows Win32k Elevation of Privilege Vulnerability
CVE-2026-34345Elevation of PrivilegeWindows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
CVE-2026-34344Elevation of PrivilegeWindows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
CVE-2026-34343Elevation of PrivilegeWindows Application Identity (AppID) Subsystem Elevation of Privilege Vulnerability
CVE-2026-34342Elevation of PrivilegeWindows Print Spooler Elevation of Privilege Vulnerability
CVE-2026-34341Elevation of PrivilegeWindows Link-Layer Discovery Protocol (LLDP) Elevation of Privilege Vulnerability
CVE-2026-34340Elevation of PrivilegeWindows Projected File System Elevation of Privilege Vulnerability
CVE-2026-34339Denial of ServiceWindows Lightweight Directory Access Protocol (LDAP) Denial of Service Vulnerability
CVE-2026-34338Elevation of PrivilegeWindows Telephony Service Elevation of Privilege Vulnerability
CVE-2026-34337Elevation of PrivilegeWindows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability
CVE-2026-34336Information DisclosureWindows DWM Core Library Information Disclosure Vulnerability
CVE-2026-34334Elevation of PrivilegeWindows TCP/IP Elevation of Privilege Vulnerability
CVE-2026-34333Elevation of PrivilegeWindows Win32k Elevation of Privilege Vulnerability
CVE-2026-34332Remote Code ExecutionWindows Kernel-Mode Driver Remote Code Execution Vulnerability
CVE-2026-34331Elevation of PrivilegeWin32k Elevation of Privilege Vulnerability
CVE-2026-34330Elevation of PrivilegeWin32k Elevation of Privilege Vulnerability
CVE-2026-34329Remote Code ExecutionMicrosoft Message Queuing (MSMQ) Remote Code Execution Vulnerability
CVE-2026-33841Elevation of PrivilegeWindows Kernel Elevation of Privilege Vulnerability
CVE-2026-33840Elevation of PrivilegeWin32k Elevation of Privilege Vulnerability
CVE-2026-33839Elevation of PrivilegeWin32k Elevation of Privilege Vulnerability
CVE-2026-33838Elevation of PrivilegeWindows Message Queuing (MSMQ) Elevation of Privilege Vulnerability
CVE-2026-33837Elevation of PrivilegeWindows TCP/IP Local Elevation of Privilege Vulnerability
CVE-2026-33835Elevation of PrivilegeWindows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability
CVE-2026-33834Elevation of PrivilegeWindows Event Logging Service Elevation of Privilege Vulnerability
CVE-2026-33833SpoofingAzure Machine Learning Notebook Spoofing Vulnerability
CVE-2026-33117Security Feature BypassAzure SDK for Java Security Feature Bypass Vulnerability
CVE-2026-33112Remote Code ExecutionMicrosoft SharePoint Server Remote Code Execution Vulnerability
CVE-2026-33110Remote Code ExecutionMicrosoft SharePoint Server Remote Code Execution Vulnerability
CVE-2026-32209Security Feature BypassWindows Filtering Platform (WFP) Security Feature Bypass Vulnerability
CVE-2026-32204Elevation of PrivilegeAzure Monitor Agent Elevation of Privilege Vulnerability
CVE-2026-32185SpoofingMicrosoft Teams Spoofing Vulnerability
CVE-2026-32177Elevation of Privilege.NET Elevation of Privilege Vulnerability
CVE-2026-32175Tampering.NET Core Tampering Vulnerability
CVE-2026-32170Elevation of PrivilegeWindows Rich Text Edit Elevation of Privilege Vulnerability
CVE-2026-32161Remote Code ExecutionWindows Native WiFi Miniport Driver Remote Code Execution Vulnerability
CVE-2026-21530Elevation of PrivilegeWindows Rich Text Edit Elevation of Privilege Vulnerability
CVE-2025-54518Elevation of PrivilegeAMD: CVE-2025-54518 CPU OP Cache Corruption

Other Patch Tuesday Updates

Follow us on Google NewsLinkedIn, and X to Get More Instant Updates.

The post Microsoft Patch Tuesday May 2026 – 120 Vulnerabilities Fixed, Including 29 Critical RCE Flaws appeared first on Cyber Security News.


Discover more from RSS Feeds Cloud

Subscribe to get the latest posts sent to your email.

Leave a Reply

Your email address will not be published. Required fields are marked *

Discover more from RSS Feeds Cloud

Subscribe now to keep reading and get access to the full archive.

Continue reading