Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Microsoft Patch Tuesday May 2026: Vulnerabilities Fixed
May 12, 2026
Critical Fortinet FortiSandbox Flaw Allows Vulnerability Enables
May 12, 2026
Fortinet Patches Five Vulnerabilities in Forti Across FortiAP
May 12, 2026
Home/CyberSecurity News/Microsoft Patch Tuesday May 2026: Vulnerabilities Fixed
CyberSecurity News

Microsoft Patch Tuesday May 2026: Vulnerabilities Fixed

Microsoft’s May 2026 Patch Tuesday arrives with a significant enterprise focus, addressing 120 vulnerabilities across its product suite. These updates span Windows, Office, Azure, developer...

Sarah simpson
Sarah simpson
May 12, 2026 7 Min Read
3 0

Microsoft’s May 2026 Patch Tuesday arrives with a significant enterprise focus, addressing 120 vulnerabilities across its product suite. These updates span Windows, Office, Azure, developer tools, and Microsoft 365 applications, prominently featuring 29 Critical-rated remote code execution (RCE) flaws.

Table Of Content

  • Multiple Remote Code Execution Vulnerabilities
  • Windows Core Networking, Kernel, and Virtualization Flaws
  • Copilot, VS Code, and Azure Flaws
  • Vulnerability Details
  • Other Patch Tuesday Updates

Unlike several recent cycles, Microsoft reports no zero‑days exploited in the wild or publicly disclosed ahead of the release, but the breadth of attack surface from DNS and Netlogon to Office and Wi‑Fi drivers means defenders cannot afford to treat this month as low risk.

Vulnerability Type Count
Elevation of Privilege 61
Security Feature Bypass 6
Remote Code Execution (RCE) 31
Information Disclosure 14
Denial of Service (DoS) 8
Spoofing 13

Multiple Remote Code Execution Vulnerabilities

While there are no exploited zero‑day bugs this month, the most serious issues are clustered around network‑exposed and document‑driven RCE vulnerabilities that could enable full compromise if left unpatched.

High‑value targets include Microsoft Dynamics 365 on‑premises (CVE‑2026‑42898, CVE‑2026‑42833), multiple Microsoft Office and Word RCEs (for example CVE‑2026‑42831, CVE‑2026‑40363, CVE‑2026‑40358, several Word‑specific CVEs), Windows DNS Client (CVE‑2026‑41096), Netlogon (CVE‑2026‑41089), Windows Graphics/Win32k (CVE‑2026‑40403), Windows GDI (CVE‑2026‑35421), Windows Native Wi‑Fi Miniport (CVE‑2026‑32161), and Microsoft SharePoint Server (CVE‑2026‑40365 and related CVEs).

Many of these live in components routinely exposed to untrusted content network traffic, Office documents, or browser‑like rendering paths, making them prime candidates for phishing and lateral‑movement campaigns.

Windows Core Networking, Kernel, and Virtualization Flaws

On the platform side, multiple vulnerabilities hit Windows networking and kernel‑mode components, raising the stakes for domain‑joined and internet‑facing systems.

Windows DNS Client RCE (CVE‑2026‑41096) and Netlogon RCE (CVE‑2026‑41089) stand out: successful exploitation could allow unauthenticated or low‑privileged attackers to execute code in highly sensitive parts of the Windows authentication and name resolution stack, echoing the impact category of historical bugs like SigRed and Zerologon.

Additional RCE and elevation‑of‑privilege vulnerabilities are scattered across TCP/IP, the Volume Manager Extension driver, kernel‑mode drivers, Win32k, GDI, and the Cloud Files and Telephony subsystems, increasing the potential for chainable exploits.

Windows Hyper‑V (CVE‑2026‑40402, rated Critical) also receives a privilege‑escalation fix, which is particularly important for multi‑tenant and private cloud environments where a guest‑to‑host escape could have an outsized blast radius.

Multiple Secure Boot and security‑feature bypass bugs, including in TCP/IP and Secure Boot itself, underline that attackers continue to probe Microsoft’s defensive controls rather than only its application logic.

Copilot, VS Code, and Azure Flaws

This Patch Tuesday also highlights how deeply AI and cloud‑connected development have been embedded into the enterprise attack surface.

Microsoft patches spoofing and security‑feature bypass issues in M365 Copilot for Desktop and Android, GitHub Copilot with Visual Studio, and Azure Machine Learning notebooks, raising concerns about prompt‑driven social engineering, data exfiltration, or malicious content injection via trusted AI interfaces.

While these flaws are rated Important rather than Critical, compromise of AI assistants that sit close to source code, documents, and chat histories could magnify the impact of otherwise “medium‑risk” bugs.

Developer tooling is another recurring theme. Visual Studio Code receives a cluster of fixes covering elevation of privilege, information disclosure, RCE, and security feature bypass (CVE‑2026‑41613 through CVE‑2026‑41610 and CVE‑2026‑41109), while .NET and ASP.NET Core patches address elevation of privilege, tampering, and denial‑of‑service conditions.

Azure Monitor Agent, Logic Apps, Connected Machine Agent, Windows Admin Center (including Azure Portal integration), and Dynamics 365 Business Central all feature in this month’s bulletin, confirming that Azure‑centric and hybrid‑cloud operators need to treat May’s updates as high priority.

Given the scale of changes, security teams should start by prioritizing internet‑facing and high‑value services: patch Microsoft Dynamics 365 on‑prem, SharePoint, and Office/Word RCEs, followed by Windows DNS Client, Netlogon, Windows GDI/Win32k graphics components, and the Native Wi‑Fi Miniport driver.

Organizations with significant virtualized workloads should schedule maintenance windows for Hyper‑V updates, and those relying on Copilot, Teams, and Azure‑based automation should not overlook AI‑ and workflow‑related fixes, even when severity is marked as Important.

Vulnerability Details

CVE ID Impact Title
CVE-2026-42899 Denial of Service ASP.NET Core Denial of Service Vulnerability
CVE-2026-42898 Remote Code Execution Microsoft Dynamics 365 On-Premises Remote Code Execution Vulnerability
CVE-2026-42896 Elevation of Privilege Windows DWM Core Library Elevation of Privilege Vulnerability
CVE-2026-42893 Tampering Microsoft Outlook for iOS Tampering Vulnerability
CVE-2026-42833 Remote Code Execution Microsoft Dynamics 365 On-Premises Remote Code Execution Vulnerability
CVE-2026-42832 Spoofing Microsoft Office Spoofing Vulnerability
CVE-2026-42831 Remote Code Execution Microsoft Office Remote Code Execution Vulnerability
CVE-2026-42830 Elevation of Privilege Azure Monitor Agent Metrics Extension Elevation of Privilege Vulnerability
CVE-2026-42825 Elevation of Privilege Windows Telephony Service Elevation of Privilege Vulnerability
CVE-2026-42823 Elevation of Privilege Azure Logic Apps Elevation of Privilege Vulnerability
CVE-2026-41614 Spoofing M365 Copilot for Desktop Spoofing Vulnerability
CVE-2026-41613 Elevation of Privilege Visual Studio Code Elevation of Privilege Vulnerability
CVE-2026-41612 Information Disclosure Visual Studio Code Information Disclosure Vulnerability
CVE-2026-41611 Remote Code Execution Visual Studio Code Remote Code Execution Vulnerability
CVE-2026-41610 Security Feature Bypass Visual Studio Code Security Feature Bypass Vulnerability
CVE-2026-41109 Security Feature Bypass GitHub Copilot and Visual Studio Code Security Feature Bypass Vulnerability
CVE-2026-41103 Elevation of Privilege Microsoft SSO Plugin for Jira & Confluence Elevation of Privilege Vulnerability
CVE-2026-41102 Spoofing Microsoft PowerPoint for Android Spoofing Vulnerability
CVE-2026-41101 Spoofing Microsoft Word for Android Spoofing Vulnerability
CVE-2026-41100 Spoofing Microsoft 365 Copilot for Android Spoofing Vulnerability
CVE-2026-41097 Security Feature Bypass Secure Boot Security Feature Bypass Vulnerability
CVE-2026-41096 Remote Code Execution Windows DNS Client Remote Code Execution Vulnerability
CVE-2026-41095 Elevation of Privilege Data Deduplication Elevation of Privilege Vulnerability
CVE-2026-41094 Remote Code Execution Microsoft Data Formulator Remote Code Execution Vulnerability
CVE-2026-41089 Remote Code Execution Windows Netlogon Remote Code Execution Vulnerability
CVE-2026-41088 Elevation of Privilege Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
CVE-2026-41086 Elevation of Privilege Windows Admin Center in Azure Portal Elevation of Privilege Vulnerability
CVE-2026-40421 Information Disclosure Microsoft Word Information Disclosure Vulnerability
CVE-2026-40420 Elevation of Privilege Microsoft Office Click-To-Run Elevation of Privilege Vulnerability
CVE-2026-40419 Elevation of Privilege Microsoft Office Click-To-Run Elevation of Privilege Vulnerability
CVE-2026-40418 Elevation of Privilege Microsoft Office Click-To-Run Elevation of Privilege Vulnerability
CVE-2026-40417 Elevation of Privilege Microsoft Dynamics 365 Business Central Elevation of Privilege Vulnerability
CVE-2026-40415 Remote Code Execution Windows TCP/IP Remote Code Execution Vulnerability
CVE-2026-40414 Denial of Service Windows TCP/IP Denial of Service Vulnerability
CVE-2026-40413 Denial of Service Windows TCP/IP Denial of Service Vulnerability
CVE-2026-40410 Elevation of Privilege Windows SMB Client Elevation of Privilege Vulnerability
CVE-2026-40408 Elevation of Privilege Windows WAN ARP Driver Elevation of Privilege Vulnerability
CVE-2026-40407 Elevation of Privilege Windows Common Log File System Driver Elevation of Privilege Vulnerability
CVE-2026-40406 Information Disclosure Windows TCP/IP Information Disclosure Vulnerability
CVE-2026-40405 Denial of Service Windows TCP/IP Denial of Service Vulnerability
CVE-2026-40403 Remote Code Execution Windows Graphics Component Remote Code Execution Vulnerability
CVE-2026-40402 Elevation of Privilege Windows Hyper-V Elevation of Privilege Vulnerability
CVE-2026-40401 Denial of Service Windows TCP/IP Denial of Service Vulnerability
CVE-2026-40399 Elevation of Privilege Windows TCP/IP Elevation of Privilege Vulnerability
CVE-2026-40398 Elevation of Privilege Windows Remote Desktop Services Elevation of Privilege Vulnerability
CVE-2026-40397 Elevation of Privilege Windows Common Log File System Driver Elevation of Privilege Vulnerability
CVE-2026-40382 Elevation of Privilege Windows Telephony Service Elevation of Privilege Vulnerability
CVE-2026-40381 Elevation of Privilege Azure Connected Machine Agent Elevation of Privilege Vulnerability
CVE-2026-40380 Remote Code Execution Windows Volume Manager Extension Driver Remote Code Execution Vulnerability
CVE-2026-40377 Elevation of Privilege Microsoft Cryptographic Services Elevation of Privilege Vulnerability
CVE-2026-40374 Information Disclosure Microsoft Power Automate Desktop Information Disclosure Vulnerability
CVE-2026-40370 Remote Code Execution SQL Server Remote Code Execution Vulnerability
CVE-2026-40369 Elevation of Privilege Windows Kernel Elevation of Privilege Vulnerability
CVE-2026-40368 Remote Code Execution Microsoft SharePoint Server Remote Code Execution Vulnerability
CVE-2026-40367 Remote Code Execution Microsoft Word Remote Code Execution Vulnerability
CVE-2026-40366 Remote Code Execution Microsoft Word Remote Code Execution Vulnerability
CVE-2026-40365 Remote Code Execution Microsoft SharePoint Server Remote Code Execution Vulnerability
CVE-2026-40364 Remote Code Execution Microsoft Word Remote Code Execution Vulnerability
CVE-2026-40363 Remote Code Execution Microsoft Office Remote Code Execution Vulnerability
CVE-2026-40362 Remote Code Execution Microsoft Excel Remote Code Execution Vulnerability
CVE-2026-40361 Remote Code Execution Microsoft Word Remote Code Execution Vulnerability
CVE-2026-40360 Information Disclosure Microsoft Excel Information Disclosure Vulnerability
CVE-2026-40359 Remote Code Execution Microsoft Excel Remote Code Execution Vulnerability
CVE-2026-40358 Remote Code Execution Microsoft Office Remote Code Execution Vulnerability
CVE-2026-40357 Remote Code Execution Microsoft SharePoint Server Remote Code Execution Vulnerability
CVE-2026-35440 Information Disclosure Microsoft Word Information Disclosure Vulnerability
CVE-2026-35439 Remote Code Execution Microsoft SharePoint Server Remote Code Execution Vulnerability
CVE-2026-35438 Elevation of Privilege Windows Admin Center Elevation of Privilege Vulnerability
CVE-2026-35436 Elevation of Privilege Microsoft Office Click-To-Run Elevation of Privilege Vulnerability
CVE-2026-35433 Elevation of Privilege .NET Elevation of Privilege Vulnerability
CVE-2026-35424 Denial of Service Internet Key Exchange (IKE) Protocol Denial of Service Vulnerability
CVE-2026-35423 Information Disclosure Windows 11 Telnet Client Information Disclosure Vulnerability
CVE-2026-35422 Security Feature Bypass Windows TCP/IP Driver Security Feature Bypass Vulnerability
CVE-2026-35421 Remote Code Execution Windows GDI Remote Code Execution Vulnerability
CVE-2026-35420 Elevation of Privilege Windows Kernel Elevation of Privilege Vulnerability
CVE-2026-35419 Information Disclosure Windows DWM Core Library Information Disclosure Vulnerability
CVE-2026-35418 Elevation of Privilege Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability
CVE-2026-35417 Elevation of Privilege Windows Win32k Elevation of Privilege Vulnerability
CVE-2026-35416 Elevation of Privilege Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
CVE-2026-35415 Elevation of Privilege Windows Storage Spaces Controller Elevation of Privilege Vulnerability
CVE-2026-34351 Elevation of Privilege Windows TCP/IP Elevation of Privilege Vulnerability
CVE-2026-34350 Denial of Service Windows Storport Miniport Driver Denial of Service Vulnerability
CVE-2026-34347 Elevation of Privilege Windows Win32k Elevation of Privilege Vulnerability
CVE-2026-34345 Elevation of Privilege Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
CVE-2026-34344 Elevation of Privilege Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
CVE-2026-34343 Elevation of Privilege Windows Application Identity (AppID) Subsystem Elevation of Privilege Vulnerability
CVE-2026-34342 Elevation of Privilege Windows Print Spooler Elevation of Privilege Vulnerability
CVE-2026-34341 Elevation of Privilege Windows Link-Layer Discovery Protocol (LLDP) Elevation of Privilege Vulnerability
CVE-2026-34340 Elevation of Privilege Windows Projected File System Elevation of Privilege Vulnerability
CVE-2026-34339 Denial of Service Windows Lightweight Directory Access Protocol (LDAP) Denial of Service Vulnerability
CVE-2026-34338 Elevation of Privilege Windows Telephony Service Elevation of Privilege Vulnerability
CVE-2026-34337 Elevation of Privilege Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability
CVE-2026-34336 Information Disclosure Windows DWM Core Library Information Disclosure Vulnerability
CVE-2026-34334 Elevation of Privilege Windows TCP/IP Elevation of Privilege Vulnerability
CVE-2026-34333 Elevation of Privilege Windows Win32k Elevation of Privilege Vulnerability
CVE-2026-34332 Remote Code Execution Windows Kernel-Mode Driver Remote Code Execution Vulnerability
CVE-2026-34331 Elevation of Privilege Win32k Elevation of Privilege Vulnerability
CVE-2026-34330 Elevation of Privilege Win32k Elevation of Privilege Vulnerability
CVE-2026-34329 Remote Code Execution Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability
CVE-2026-33841 Elevation of Privilege Windows Kernel Elevation of Privilege Vulnerability
CVE-2026-33840 Elevation of Privilege Win32k Elevation of Privilege Vulnerability
CVE-2026-33839 Elevation of Privilege Win32k Elevation of Privilege Vulnerability
CVE-2026-33838 Elevation of Privilege Windows Message Queuing (MSMQ) Elevation of Privilege Vulnerability
CVE-2026-33837 Elevation of Privilege Windows TCP/IP Local Elevation of Privilege Vulnerability
CVE-2026-33835 Elevation of Privilege Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability
CVE-2026-33834 Elevation of Privilege Windows Event Logging Service Elevation of Privilege Vulnerability
CVE-2026-33833 Spoofing Azure Machine Learning Notebook Spoofing Vulnerability
CVE-2026-33117 Security Feature Bypass Azure SDK for Java Security Feature Bypass Vulnerability
CVE-2026-33112 Remote Code Execution Microsoft SharePoint Server Remote Code Execution Vulnerability
CVE-2026-33110 Remote Code Execution Microsoft SharePoint Server Remote Code Execution Vulnerability
CVE-2026-32209 Security Feature Bypass Windows Filtering Platform (WFP) Security Feature Bypass Vulnerability
CVE-2026-32204 Elevation of Privilege Azure Monitor Agent Elevation of Privilege Vulnerability
CVE-2026-32185 Spoofing Microsoft Teams Spoofing Vulnerability
CVE-2026-32177 Elevation of Privilege .NET Elevation of Privilege Vulnerability
CVE-2026-32175 Tampering .NET Core Tampering Vulnerability
CVE-2026-32170 Elevation of Privilege Windows Rich Text Edit Elevation of Privilege Vulnerability
CVE-2026-32161 Remote Code Execution Windows Native WiFi Miniport Driver Remote Code Execution Vulnerability
CVE-2026-21530 Elevation of Privilege Windows Rich Text Edit Elevation of Privilege Vulnerability
CVE-2025-54518 Elevation of Privilege AMD: CVE-2025-54518 CPU OP Cache Corruption

Other Patch Tuesday Updates

  • Fortinet Patches Five Vulnerabilities Across FortiAP, FortiOS, and Enterprise Products
  • Ivanti Patches Multiple Vulnerabilities in Secure Access, Xtraction, vTM and Endpoint Manager
  • Zoom Rooms and Workplace Vulnerabilities Allow Attackers to Escalate Privileges
  • SAP Patches Critical SQL injection Vulnerability in SAP S/4HANA

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackCVEExploitPatchphishingSecurityVulnerability

Share Article

Sarah simpson

Sarah simpson

Sarah is a cybersecurity journalist specializing in threat intelligence and malware analysis. With over 8 years of experience covering APT groups, zero-day exploits, and advanced persistent threats, Sarah brings deep technical expertise to breaking cybersecurity news. Previously, she worked as a security researcher at leading threat intelligence firms, where she analyzed malware samples and tracked cybercriminal operations. Sarah holds a Master's degree in Computer Science with a focus on cybersecurity and is a regular contributor to major security conferences.

Previous Post

Critical Fortinet FortiSandbox Flaw Allows Vulnerability Enables

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Open WebUI File Upload Vulnerability Allows 1 Leads Attack
May 12, 2026
SAP Patches Critical SQL Injection Flaw in S/4 Vulnerability S/4HANA
May 12, 2026
Zoom Rooms Vulnerabilities Allow Attackers to Escalate
May 12, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Jennifer sherman
Jennifer sherman
Sarah simpson
Sarah simpson
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us