Microsoft Patch Tuesday Analysis – May 2026
Executive Summary
On Tuesday, May 12, 2026, Microsoft released its monthly security patch, addressing 137 vulnerabilities across its products.
By severity level:
- Important - 103;
- Critical - 30;
- Moderate - 3;
- Low - 1.
General Trends
The May 2026 Patch Tuesday brought the IT community 137 fixes. Although the overall volume has slightly decreased compared to the record-breaking April (165), the composition of this update makes it one of the most dangerous this year. The main anomaly of the month is the unprecedented number of "Critical" vulnerabilities. Key trends for May include:
- Anomalous spike in critical vulnerabilities: A colossal number of critical-level vulnerabilities were patched this month — 30 (for comparison: there were 8 in April, and 0 in March). This indicates the discovery of an entire layer of fundamental architectural flaws in Microsoft products.
- Absence of Zero-Days: Officially, there are no actively exploited or publicly disclosed vulnerabilities in the May release (at the time of publication). However, the presence of dozens of vulnerabilities with a CVSS score above 9.0 guarantees that threat actors have already begun reverse-engineering the patches to create exploits.
- Threats to core infrastructure (CVSS 9.8 - 10.0): The most critical components of corporate networks are under attack. Remote Code Execution (RCE) vulnerabilities have been patched in Windows Netlogon (CVE-2026-41089) and Windows DNS Client (CVE-2026-41096). Flaws in these components traditionally pave the way for self-propagating worms and instant domain controller takeovers. Additionally, an exceptionally rare vulnerability with a maximum score of CVSS 10.0 was identified in Azure DevOps, threatening a total compromise of software supply chains (Supply Chain Attacks).
- Massive attack on SharePoint and Office: The large-scale code cleanup in collaboration applications continues. SharePoint servers received another massive batch of RCE fixes (over 6 critical and important CVEs). Simultaneously, a giant cluster of RCE vulnerabilities in desktop clients (Microsoft Word, Excel, and Office) was closed (over 15 CVEs), confirming the attackers' relentless focus on phishing campaigns using malicious documents.
- Vulnerabilities in cloud Data services: Significant attention has been given to data security in the cloud. Critical fixes (CVSS 9.9) affected Azure Managed Instance for Apache Cassandra, Azure Logic Apps, and Dynamics 365.
Full List of Vulnerabilities
Below is a table of all the vulnerabilities patched this month.
| CVE | Title | Type | CVSS | Severity | Exploited | Publicly Disclosed |
|---|---|---|---|---|---|---|
| CVE-2026-42826 | Azure DevOps Information Disclosure Vulnerability | Information Disclosure | 10.0 | Critical | No | No |
| CVE-2026-33109 | Azure Managed Instance for Apache Cassandra Remote Code Execution Vulnerability | Remote Code Execution | 9.9 | Critical | No | No |
| CVE-2026-42823 | Azure Logic Apps Elevation of Privilege Vulnerability | Elevation of Privilege | 9.9 | Important | No | No |
| CVE-2026-42898 | Microsoft Dynamics 365 On-Premises Remote Code Execution Vulnerability | Remote Code Execution | 9.9 | Critical | No | No |
| CVE-2026-41089 | Windows Netlogon Remote Code Execution Vulnerability | Remote Code Execution | 9.8 | Critical | No | No |
| CVE-2026-41096 | Windows DNS Client Remote Code Execution Vulnerability | Remote Code Execution | 9.8 | Critical | No | No |
| CVE-2026-33823 | Microsoft Team Events Portal Information Disclosure Vulnerability | Information Disclosure | 9.6 | Critical | No | No |
| CVE-2026-35428 | Azure Cloud Shell Spoofing Vulnerability | Spoofing | 9.6 | Critical | No | No |
| CVE-2026-40379 | Microsoft Enterprise Security Token Service (ESTS) Spoofing Vulnerability | Spoofing | 9.3 | Critical | No | No |
| CVE-2026-40402 | Windows Hyper-V Elevation of Privilege Vulnerability | Elevation of Privilege | 9.3 | Critical | No | No |
| CVE-2026-33117 | Azure SDK for Java Security Feature Bypass Vulnerability | Security Feature Bypass | 9.1 | Important | No | No |
| CVE-2026-41103 | Microsoft SSO Plugin for Jira & Confluence Elevation of Privilege Vulnerability | Elevation of Privilege | 9.1 | Critical | No | No |
| CVE-2026-42833 | Microsoft Dynamics 365 On-Premises Remote Code Execution Vulnerability | Remote Code Execution | 9.1 | Important | No | No |
| CVE-2026-33844 | Azure Managed Instance for Apache Cassandra Remote Code Execution Vulnerability | Remote Code Execution | 9.0 | Critical | No | No |
| CVE-2026-32207 | Azure Machine Learning Notebook Spoofing Vulnerability | Spoofing | 8.8 | Critical | No | No |
| CVE-2026-33110 | Microsoft SharePoint Server Remote Code Execution Vulnerability | Remote Code Execution | 8.8 | Important | No | No |
| CVE-2026-33112 | Microsoft SharePoint Server Remote Code Execution Vulnerability | Remote Code Execution | 8.8 | Important | No | No |
| CVE-2026-34329 | Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability | Remote Code Execution | 8.8 | Important | No | No |
| CVE-2026-35436 | Microsoft Office Click-To-Run Elevation of Privilege Vulnerability | Elevation of Privilege | 8.8 | Important | No | No |
| CVE-2026-35439 | Microsoft SharePoint Server Remote Code Execution Vulnerability | Remote Code Execution | 8.8 | Important | No | No |
| CVE-2026-40357 | Microsoft SharePoint Server Remote Code Execution Vulnerability | Remote Code Execution | 8.8 | Important | No | No |
| CVE-2026-40365 | Microsoft SharePoint Server Remote Code Execution Vulnerability | Remote Code Execution | 8.8 | Critical | No | No |
| CVE-2026-40370 | SQL Server Remote Code Execution Vulnerability | Remote Code Execution | 8.8 | Important | No | No |
| CVE-2026-40403 | Windows Graphics Component Remote Code Execution Vulnerability | Remote Code Execution | 8.8 | Critical | No | No |
| CVE-2026-40420 | Microsoft Office Click-To-Run Elevation of Privilege Vulnerability | Elevation of Privilege | 8.8 | Important | No | No |
| CVE-2026-41086 | Windows Admin Center in Azure Portal Elevation of Privilege Vulnerability | Elevation of Privilege | 8.8 | Important | No | No |
| CVE-2026-41094 | Microsoft Data Formulator Remote Code Execution Vulnerability | Remote Code Execution | 8.8 | Important | No | No |
| CVE-2026-41109 | GitHub Copilot and Visual Studio Code Security Feature Bypass Vulnerability | Security Feature Bypass | 8.8 | Important | No | No |
| CVE-2026-41613 | Visual Studio Code Elevation of Privilege Vulnerability | Elevation of Privilege | 8.8 | Important | No | No |
| CVE-2026-35435 | Azure AI Foundry Elevation of Privilege Vulnerability | Elevation of Privilege | 8.6 | Critical | No | No |
| CVE-2026-40358 | Microsoft Office Remote Code Execution Vulnerability | Remote Code Execution | 8.4 | Critical | No | No |
| CVE-2026-40361 | Microsoft Word Remote Code Execution Vulnerability | Remote Code Execution | 8.4 | Critical | No | No |
| CVE-2026-40363 | Microsoft Office Remote Code Execution Vulnerability | Remote Code Execution | 8.4 | Critical | No | No |
| CVE-2026-40364 | Microsoft Word Remote Code Execution Vulnerability | Remote Code Execution | 8.4 | Critical | No | No |
| CVE-2026-40366 | Microsoft Word Remote Code Execution Vulnerability | Remote Code Execution | 8.4 | Critical | No | No |
| CVE-2026-40367 | Microsoft Word Remote Code Execution Vulnerability | Remote Code Execution | 8.4 | Critical | No | No |
| CVE-2026-35438 | Windows Admin Center Elevation of Privilege Vulnerability | Elevation of Privilege | 8.3 | Important | No | No |
| CVE-2026-33833 | Azure Machine Learning Notebook Spoofing Vulnerability | Spoofing | 8.2 | Important | No | No |
| CVE-2026-34327 | Microsoft Partner Center Spoofing Vulnerability | Spoofing | 8.2 | Critical | No | No |
| CVE-2026-40415 | Windows TCP/IP Remote Code Execution Vulnerability | Remote Code Execution | 8.1 | Important | No | No |
| CVE-2026-41105 | Azure Monitor Action Group Notification System Elevation of Privilege Vulnerability | Elevation of Privilege | 8.1 | Critical | No | No |
| CVE-2026-34332 | Windows Kernel-Mode Driver Remote Code Execution Vulnerability | Remote Code Execution | 8.0 | Important | No | No |
| CVE-2026-40368 | Microsoft SharePoint Server Remote Code Execution Vulnerability | Remote Code Execution | 8.0 | Important | No | No |
| CVE-2026-32204 | Azure Monitor Agent Elevation of Privilege Vulnerability | Elevation of Privilege | 7.8 | Important | No | No |
| CVE-2026-33834 | Windows Event Logging Service Elevation of Privilege Vulnerability | Elevation of Privilege | 7.8 | Important | No | No |
| CVE-2026-33835 | Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability | Elevation of Privilege | 7.8 | Important | No | No |
| CVE-2026-33837 | Windows TCP/IP Local Elevation of Privilege Vulnerability | Elevation of Privilege | 7.8 | Important | No | No |
| CVE-2026-33838 | Windows Message Queuing (MSMQ) Elevation of Privilege Vulnerability | Elevation of Privilege | 7.8 | Important | No | No |
| CVE-2026-33840 | Win32k Elevation of Privilege Vulnerability | Elevation of Privilege | 7.8 | Important | No | No |
| CVE-2026-33841 | Windows Kernel Elevation of Privilege Vulnerability | Elevation of Privilege | 7.8 | Important | No | No |
| CVE-2026-34330 | Win32k Elevation of Privilege Vulnerability | Elevation of Privilege | 7.8 | Important | No | No |
| CVE-2026-34333 | Windows Win32k Elevation of Privilege Vulnerability | Elevation of Privilege | 7.8 | Important | No | No |
| CVE-2026-34334 | Windows TCP/IP Elevation of Privilege Vulnerability | Elevation of Privilege | 7.8 | Important | No | No |
| CVE-2026-34336 | Windows DWM Core Library Information Disclosure Vulnerability | Information Disclosure | 7.8 | Important | No | No |
| CVE-2026-34337 | Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability | Elevation of Privilege | 7.8 | Important | No | No |
| CVE-2026-34338 | Windows Telephony Service Elevation of Privilege Vulnerability | Elevation of Privilege | 7.8 | Important | No | No |
| CVE-2026-34343 | Windows Application Identity (AppID) Subsystem Elevation of Privilege Vulnerability | Elevation of Privilege | 7.8 | Important | No | No |
| CVE-2026-34344 | Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability | Elevation of Privilege | 7.8 | Important | No | No |
| CVE-2026-34351 | Windows TCP/IP Elevation of Privilege Vulnerability | Elevation of Privilege | 7.8 | Important | No | No |
| CVE-2026-35415 | Windows Storage Spaces Controller Elevation of Privilege Vulnerability | Elevation of Privilege | 7.8 | Important | No | No |
| CVE-2026-35417 | Windows Win32k Elevation of Privilege Vulnerability | Elevation of Privilege | 7.8 | Important | No | No |
| CVE-2026-35418 | Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability | Elevation of Privilege | 7.8 | Important | No | No |
| CVE-2026-35420 | Windows Kernel Elevation of Privilege Vulnerability | Elevation of Privilege | 7.8 | Important | No | No |
| CVE-2026-35421 | Windows GDI Remote Code Execution Vulnerability | Remote Code Execution | 7.8 | Critical | No | No |
| CVE-2026-40359 | Microsoft Excel Remote Code Execution Vulnerability | Remote Code Execution | 7.8 | Important | No | No |
| CVE-2026-40360 | Microsoft Excel Information Disclosure Vulnerability | Information Disclosure | 7.8 | Important | No | No |
| CVE-2026-40362 | Microsoft Excel Remote Code Execution Vulnerability | Remote Code Execution | 7.8 | Important | No | No |
| CVE-2026-40369 | Windows Kernel Elevation of Privilege Vulnerability | Elevation of Privilege | 7.8 | Important | No | No |
| CVE-2026-40377 | Microsoft Cryptographic Services Elevation of Privilege Vulnerability | Elevation of Privilege | 7.8 | Important | No | No |
| CVE-2026-40381 | Azure Connected Machine Agent Elevation of Privilege Vulnerability | Elevation of Privilege | 7.8 | Important | No | No |
| CVE-2026-40382 | Windows Telephony Service Elevation of Privilege Vulnerability | Elevation of Privilege | 7.8 | Important | No | No |
| CVE-2026-40397 | Windows Common Log File System Driver Elevation of Privilege Vulnerability | Elevation of Privilege | 7.8 | Important | No | No |
| CVE-2026-40398 | Windows Remote Desktop Services Elevation of Privilege Vulnerability | Elevation of Privilege | 7.8 | Important | No | No |
| CVE-2026-40399 | Windows TCP/IP Elevation of Privilege Vulnerability | Elevation of Privilege | 7.8 | Important | No | No |
| CVE-2026-40407 | Windows Common Log File System Driver Elevation of Privilege Vulnerability | Elevation of Privilege | 7.8 | Important | No | No |
| CVE-2026-40408 | Windows WAN ARP Driver Elevation of Privilege Vulnerability | Elevation of Privilege | 7.8 | Important | No | No |
| CVE-2026-40417 | Microsoft Dynamics 365 Business Central Elevation of Privilege Vulnerability | Elevation of Privilege | 7.8 | Important | No | No |
| CVE-2026-40418 | Microsoft Office Click-To-Run Elevation of Privilege Vulnerability | Elevation of Privilege | 7.8 | Important | No | No |
| CVE-2026-40419 | Microsoft Office Click-To-Run Elevation of Privilege Vulnerability | Elevation of Privilege | 7.8 | Important | No | No |
| CVE-2026-41088 | Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability | Elevation of Privilege | 7.8 | Important | No | No |
| CVE-2026-41095 | Data Deduplication Elevation of Privilege Vulnerability | Elevation of Privilege | 7.8 | Important | No | No |
| CVE-2026-41611 | Visual Studio Code Remote Code Execution Vulnerability | Remote Code Execution | 7.8 | Important | No | No |
| CVE-2026-42831 | Microsoft Office Remote Code Execution Vulnerability | Remote Code Execution | 7.8 | Critical | No | No |
| CVE-2026-42896 | Windows DWM Core Library Elevation of Privilege Vulnerability | Elevation of Privilege | 7.8 | Important | No | No |
| CVE-2026-33821 | Microsoft Dynamics 365 Customer Insights Elevation of Privilege Vulnerability | Elevation of Privilege | 7.7 | Critical | No | No |
| CVE-2026-42832 | Microsoft Office Spoofing Vulnerability | Spoofing | 7.7 | Important | No | No |
| CVE-2026-26129 | M365 Copilot Information Disclosure Vulnerability | Information Disclosure | 7.5 | Critical | No | No |
| CVE-2026-26164 | M365 Copilot Information Disclosure Vulnerability | Information Disclosure | 7.5 | Critical | No | No |
| CVE-2026-32161 | Windows Native WiFi Miniport Driver Remote Code Execution Vulnerability | Remote Code Execution | 7.5 | Critical | No | No |
| CVE-2026-33111 | Copilot Chat (Microsoft Edge) Information Disclosure Vulnerability | Information Disclosure | 7.5 | Critical | No | No |
| CVE-2026-35424 | Internet Key Exchange (IKE) Protocol Denial of Service Vulnerability | Denial of Service | 7.5 | Important | No | No |
| CVE-2026-40405 | Windows TCP/IP Denial of Service Vulnerability | Denial of Service | 7.5 | Important | No | No |
| CVE-2026-40406 | Windows TCP/IP Information Disclosure Vulnerability | Information Disclosure | 7.5 | Important | No | No |
| CVE-2026-42899 | ASP.NET Core Denial of Service Vulnerability | Denial of Service | 7.5 | Important | No | No |
| CVE-2026-40413 | Windows TCP/IP Denial of Service Vulnerability | Denial of Service | 7.4 | Important | No | No |
| CVE-2026-40414 | Windows TCP/IP Denial of Service Vulnerability | Denial of Service | 7.4 | Important | No | No |
| CVE-2026-41107 | Microsoft Edge (Chromium-based) Information Disclosure Vulnerability | Information Disclosure | 7.4 | Moderate | No | No |
| CVE-2026-42893 | Microsoft Outlook for iOS Tampering Vulnerability | Tampering | 7.4 | Important | No | No |
| CVE-2026-32177 | .NET Elevation of Privilege Vulnerability | Elevation of Privilege | 7.3 | Important | No | No |
| CVE-2026-35433 | .NET Elevation of Privilege Vulnerability | Elevation of Privilege | 7.3 | Important | No | No |
| CVE-2026-40401 | Windows TCP/IP Denial of Service Vulnerability | Denial of Service | 7.1 | Important | No | No |
| CVE-2026-41101 | Microsoft Word for Android Spoofing Vulnerability | Spoofing | 7.1 | Important | No | No |
| CVE-2026-41102 | Microsoft PowerPoint for Android Spoofing Vulnerability | Spoofing | 7.1 | Important | No | No |
| CVE-2026-33839 | Win32k Elevation of Privilege Vulnerability | Elevation of Privilege | 7.0 | Important | No | No |
| CVE-2026-34331 | Win32k Elevation of Privilege Vulnerability | Elevation of Privilege | 7.0 | Important | No | No |
| CVE-2026-34340 | Windows Projected File System Elevation of Privilege Vulnerability | Elevation of Privilege | 7.0 | Important | No | No |
| CVE-2026-34341 | Windows Link-Layer Discovery Protocol (LLDP) Elevation of Privilege Vulnerability | Elevation of Privilege | 7.0 | Important | No | No |
| CVE-2026-34342 | Windows Print Spooler Elevation of Privilege Vulnerability | Elevation of Privilege | 7.0 | Important | No | No |
| CVE-2026-34345 | Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability | Elevation of Privilege | 7.0 | Important | No | No |
| CVE-2026-34347 | Windows Win32k Elevation of Privilege Vulnerability | Elevation of Privilege | 7.0 | Important | No | No |
| CVE-2026-35416 | Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability | Elevation of Privilege | 7.0 | Important | No | No |
| CVE-2026-40410 | Windows SMB Client Elevation of Privilege Vulnerability | Elevation of Privilege | 7.0 | Important | No | No |
| CVE-2026-42825 | Windows Telephony Service Elevation of Privilege Vulnerability | Elevation of Privilege | 7.0 | Important | No | No |
| CVE-2026-21530 | Windows Rich Text Edit Elevation of Privilege Vulnerability | Elevation of Privilege | 6.7 | Important | No | No |
| CVE-2026-32170 | Windows Rich Text Edit Elevation of Privilege Vulnerability | Elevation of Privilege | 6.7 | Important | No | No |
| CVE-2026-41097 | Secure Boot Security Feature Bypass Vulnerability | Security Feature Bypass | 6.7 | Important | No | No |
| CVE-2026-34350 | Windows Storport Miniport Driver Denial of Service Vulnerability | Denial of Service | 6.5 | Important | No | No |
| CVE-2026-35422 | Windows TCP/IP Driver Security Feature Bypass Vulnerability | Security Feature Bypass | 6.5 | Important | No | No |
| CVE-2026-40374 | Microsoft Power Automate Desktop Information Disclosure Vulnerability | Information Disclosure | 6.5 | Important | No | No |
| CVE-2026-42830 | Azure Monitor Agent Metrics Extension Elevation of Privilege Vulnerability | Elevation of Privilege | 6.5 | Important | No | No |
| CVE-2026-42891 | Microsoft Edge (Chromium-based) for Android Spoofing Vulnerability | Spoofing | 6.5 | Moderate | No | No |
| CVE-2026-41610 | Visual Studio Code Security Feature Bypass Vulnerability | Security Feature Bypass | 6.3 | Important | No | No |
| CVE-2026-40380 | Windows Volume Manager Extension Driver Remote Code Execution Vulnerability | Remote Code Execution | 6.2 | Important | No | No |
| CVE-2026-41614 | M365 Copilot for Desktop Spoofing Vulnerability | Spoofing | 6.2 | Important | No | No |
| CVE-2026-32185 | Microsoft Teams Spoofing Vulnerability | Spoofing | 5.5 | Important | No | No |
| CVE-2026-34339 | Windows Lightweight Directory Access Protocol (LDAP) Denial of Service Vulnerability | Denial of Service | 5.5 | Important | No | No |
| CVE-2026-35419 | Windows DWM Core Library Information Disclosure Vulnerability | Information Disclosure | 5.5 | Important | No | No |
| CVE-2026-35440 | Microsoft Word Information Disclosure Vulnerability | Information Disclosure | 5.5 | Important | No | No |
| CVE-2026-41612 | Visual Studio Code Information Disclosure Vulnerability | Information Disclosure | 5.5 | Important | No | No |
| CVE-2026-35423 | Windows 11 Telnet Client Information Disclosure Vulnerability | Information Disclosure | 5.4 | Important | No | No |
| CVE-2026-42838 | Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability | Elevation of Privilege | 5.4 | Important | No | No |
| CVE-2026-32209 | Windows Filtering Platform (WFP) Security Feature Bypass Vulnerability | Security Feature Bypass | 4.4 | Important | No | No |
| CVE-2026-41100 | Microsoft 365 Copilot for Android Spoofing Vulnerability | Spoofing | 4.4 | Important | No | No |
| CVE-2026-32175 | .NET Core Tampering Vulnerability | Tampering | 4.3 | Important | No | No |
| CVE-2026-35429 | Microsoft Edge (Chromium-based) for Android Spoofing Vulnerability | Spoofing | 4.3 | Moderate | No | No |
| CVE-2026-40416 | Microsoft Edge (Chromium-based) for Android Spoofing Vulnerability | Spoofing | 4.3 | Low | No | No |
| CVE-2026-40421 | Microsoft Word Information Disclosure Vulnerability | Information Disclosure | 4.3 | Important | No | No |
Retrospective Vulnerability Analysis
CVE-2026-21250 — Windows HTTP.sys Elevation of Privilege Vulnerability (Elevation of Privilege). The vulnerability is caused by an Untrusted Pointer Dereference in the
http.syskernel system driver. An attacker can send a specially crafted HTTP packet containing a binary payload in the headers (e.g., inX-Trigger-Ptr), which, if improperly handled by the driver, allows local privilege escalation to the SYSTEM level. To successfully exploit and bypass protection mechanisms (ASLR), techniques like Heap Spraying and Keep-Alive connection state manipulation can be used. A PoC for this vulnerability has been published on GitHub. The vulnerability was patched in February 2026.CVE-2026-23671 — Windows Bluetooth RFCOMM Protocol Driver Elevation of Privilege Vulnerability (Elevation of Privilege). A vulnerability in the Bluetooth RFCOMM protocol driver caused by incorrect synchronization when accessing shared resources (race condition). This leads to a Use-After-Free error, allowing an authenticated local attacker to execute arbitrary code in kernel mode. Successful exploitation allows for privilege escalation to the SYSTEM level; however, the attack is characterized by high complexity, as it requires precise timing to "win" the race condition. A PoC for this vulnerability has been published on GitHub. Patched in March 2026.
CVE-2026-24294 — Windows SMB Server Elevation of Privilege Vulnerability (Elevation of Privilege). The vulnerability allows a local user to escalate their privileges to the SYSTEM level using the NTLM-reflection mechanism and a new feature for SMB connections over arbitrary TCP ports introduced in Windows Server 2025 and Windows 11 24H2. The attack involves forcing a privileged service (LSASS) to authenticate to an attacker-controlled SMB server via a non-standard port, thereby bypassing classic Local NTLM Reflection protections and relaying the acquired token to the genuine SMB service (port 445). The published PoC demonstrates exploitation using modified PetitPotam and Impacket tools. The vulnerability was patched in March 2026.
CVE-2026-26128 — Windows SMB Server Elevation of Privilege Vulnerability (Elevation of Privilege). The vulnerability allows an authenticated local attacker to escalate their privileges to the SYSTEM level via a Kerberos Reflection attack. Exploitation is possible due to a Unicode character normalization bypass during Service Principal Name (SPN) resolution: due to differences in string processing functions within the DNS cache service and on the domain controller, an attacker can register a spoofed DNS record and redirect authentication traffic to their own host. A PoC is available on GitHub, allowing attacks against AD CS and MSSQL services. The vulnerability was patched in March 2026.
CVE-2026-26168 — Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability (Elevation of Privilege). A Race Condition vulnerability in the
afd.syskernel driver, arising from incorrect synchronization of access to connection objects. In theAfdAddConnectedReferencefunction, the spinlock is released before the object's reference counter increment is completed, creating a vulnerability window for a Use-After-Free scenario. A local attacker, even one with low privileges in an AppContainer, can exploit this flaw to escalate their rights to the SYSTEM level. The published PoC in Python demonstrates the attack mechanism via concurrent calls toconnect()andclosesocket(), leading to kernel memory pool corruption and a system crash. The vulnerability was patched in April 2026.CVE-2026-33101 — Windows Print Spooler Elevation of Privilege Vulnerability (Elevation of Privilege). A Use-After-Free (UAF) vulnerability in the
OpenPrinterExWfunction, occurring when processing the_SPLCLIENT_CONTAINER(Level 2) structure. Due to a logical error, if theRouterOpenPrinterfunction fails, the container's memory is freed, yet the system unconditionally writes the handle to the freed memory slot. This allows a local attacker to gain SYSTEM-level rights through heap manipulations of thespoolsv.exeprocess. According to the technical analysis and the available PoC, Windows 11 24H2 systems prior to build 26100.8246 are affected. The vulnerability was patched in April 2026.CVE-2026-32202 — Windows Shell Spoofing Vulnerability (Spoofing). The vulnerability involves a protection mechanism failure (CWE-693) when processing the
_IDCONTROLWstructure within the IDList chain in shortcut files (.LNK). Researchers from Akamai reverse-engineered the logic ofshell32.dlland presented a PoC that allows injecting a UNC path into theModulePathfield of a Control Panel object. When File Explorer (explorer.exe) attempts to render the icon of such a shortcut, an automatic request is made to the remote SMB share, leading to the disclosure of the user's NTLM hash. The vulnerability is closely tied to CVE-2026-21510 and was patched in April 2026.
Conclusion
The May 2026 update is a classic example of a situation where the absence of currently exploited zero-days should not create a false sense of security. The presence of 30 critical vulnerabilities, including flaws in Netlogon, DNS, and Azure DevOps with maximum CVSS ratings, makes this a highly stressful month for administrators.
Update prioritization for May:
- Tier 0 Infrastructure: The absolute priority is installing updates on Domain Controllers (to patch RCE in Netlogon) and DNS servers/clients. Exploitation of these vulnerabilities will lead to the instant collapse of the entire corporate network.
- Cloud Development Platforms: Infrastructure owners of Azure DevOps must urgently ensure patches are applied (CVE-2026-42826, CVSS 10.0), as data exfiltration from development environments can compromise all of the company's source codes and tokens.
- Collaboration Servers: SharePoint Server remains a favorite target for ransomware. The presence of such a high number of RCEs requires immediate updating of web farms exposed to internal and external networks.
- User Endpoints: The Microsoft Office suite update must be deployed to workstations as quickly as possible to prevent attackers from infiltrating via malicious documents sent via email.
Important addition: Pay special attention to the "Retrospective Vulnerability Analysis" section. In May, a massive leak of working PoC exploits occurred on GitHub for vulnerabilities patched in February, March, and April (SMB Server, AFD.sys, Print Spooler, HTTP.sys). This means that if your organization is behind on its update schedule by even a month, you are in the crosshairs of automated hacking tools accessible even to low-skilled attackers. Eliminating technical patch debt is now of critical importance.