Microsoft Patch Tuesday Analysis – May 2026

Executive Summary

On Tuesday, May 12, 2026, Microsoft released its monthly security patch, addressing 137 vulnerabilities across its products.

By severity level:

  • Important - 103;
  • Critical - 30;
  • Moderate - 3;
  • Low - 1.

General Trends

The May 2026 Patch Tuesday brought the IT community 137 fixes. Although the overall volume has slightly decreased compared to the record-breaking April (165), the composition of this update makes it one of the most dangerous this year. The main anomaly of the month is the unprecedented number of "Critical" vulnerabilities. Key trends for May include:

  • Anomalous spike in critical vulnerabilities: A colossal number of critical-level vulnerabilities were patched this month — 30 (for comparison: there were 8 in April, and 0 in March). This indicates the discovery of an entire layer of fundamental architectural flaws in Microsoft products.
  • Absence of Zero-Days: Officially, there are no actively exploited or publicly disclosed vulnerabilities in the May release (at the time of publication). However, the presence of dozens of vulnerabilities with a CVSS score above 9.0 guarantees that threat actors have already begun reverse-engineering the patches to create exploits.
  • Threats to core infrastructure (CVSS 9.8 - 10.0): The most critical components of corporate networks are under attack. Remote Code Execution (RCE) vulnerabilities have been patched in Windows Netlogon (CVE-2026-41089) and Windows DNS Client (CVE-2026-41096). Flaws in these components traditionally pave the way for self-propagating worms and instant domain controller takeovers. Additionally, an exceptionally rare vulnerability with a maximum score of CVSS 10.0 was identified in Azure DevOps, threatening a total compromise of software supply chains (Supply Chain Attacks).
  • Massive attack on SharePoint and Office: The large-scale code cleanup in collaboration applications continues. SharePoint servers received another massive batch of RCE fixes (over 6 critical and important CVEs). Simultaneously, a giant cluster of RCE vulnerabilities in desktop clients (Microsoft Word, Excel, and Office) was closed (over 15 CVEs), confirming the attackers' relentless focus on phishing campaigns using malicious documents.
  • Vulnerabilities in cloud Data services: Significant attention has been given to data security in the cloud. Critical fixes (CVSS 9.9) affected Azure Managed Instance for Apache Cassandra, Azure Logic Apps, and Dynamics 365.

Full List of Vulnerabilities

Below is a table of all the vulnerabilities patched this month.

CVETitleTypeCVSSSeverityExploitedPublicly Disclosed
CVE-2026-42826Azure DevOps Information Disclosure VulnerabilityInformation Disclosure10.0CriticalNoNo
CVE-2026-33109Azure Managed Instance for Apache Cassandra Remote Code Execution VulnerabilityRemote Code Execution9.9CriticalNoNo
CVE-2026-42823Azure Logic Apps Elevation of Privilege VulnerabilityElevation of Privilege9.9ImportantNoNo
CVE-2026-42898Microsoft Dynamics 365 On-Premises Remote Code Execution VulnerabilityRemote Code Execution9.9CriticalNoNo
CVE-2026-41089Windows Netlogon Remote Code Execution VulnerabilityRemote Code Execution9.8CriticalNoNo
CVE-2026-41096Windows DNS Client Remote Code Execution VulnerabilityRemote Code Execution9.8CriticalNoNo
CVE-2026-33823Microsoft Team Events Portal Information Disclosure VulnerabilityInformation Disclosure9.6CriticalNoNo
CVE-2026-35428Azure Cloud Shell Spoofing VulnerabilitySpoofing9.6CriticalNoNo
CVE-2026-40379Microsoft Enterprise Security Token Service (ESTS) Spoofing VulnerabilitySpoofing9.3CriticalNoNo
CVE-2026-40402Windows Hyper-V Elevation of Privilege VulnerabilityElevation of Privilege9.3CriticalNoNo
CVE-2026-33117Azure SDK for Java Security Feature Bypass VulnerabilitySecurity Feature Bypass9.1ImportantNoNo
CVE-2026-41103Microsoft SSO Plugin for Jira & Confluence Elevation of Privilege VulnerabilityElevation of Privilege9.1CriticalNoNo
CVE-2026-42833Microsoft Dynamics 365 On-Premises Remote Code Execution VulnerabilityRemote Code Execution9.1ImportantNoNo
CVE-2026-33844Azure Managed Instance for Apache Cassandra Remote Code Execution VulnerabilityRemote Code Execution9.0CriticalNoNo
CVE-2026-32207Azure Machine Learning Notebook Spoofing VulnerabilitySpoofing8.8CriticalNoNo
CVE-2026-33110Microsoft SharePoint Server Remote Code Execution VulnerabilityRemote Code Execution8.8ImportantNoNo
CVE-2026-33112Microsoft SharePoint Server Remote Code Execution VulnerabilityRemote Code Execution8.8ImportantNoNo
CVE-2026-34329Microsoft Message Queuing (MSMQ) Remote Code Execution VulnerabilityRemote Code Execution8.8ImportantNoNo
CVE-2026-35436Microsoft Office Click-To-Run Elevation of Privilege VulnerabilityElevation of Privilege8.8ImportantNoNo
CVE-2026-35439Microsoft SharePoint Server Remote Code Execution VulnerabilityRemote Code Execution8.8ImportantNoNo
CVE-2026-40357Microsoft SharePoint Server Remote Code Execution VulnerabilityRemote Code Execution8.8ImportantNoNo
CVE-2026-40365Microsoft SharePoint Server Remote Code Execution VulnerabilityRemote Code Execution8.8CriticalNoNo
CVE-2026-40370SQL Server Remote Code Execution VulnerabilityRemote Code Execution8.8ImportantNoNo
CVE-2026-40403Windows Graphics Component Remote Code Execution VulnerabilityRemote Code Execution8.8CriticalNoNo
CVE-2026-40420Microsoft Office Click-To-Run Elevation of Privilege VulnerabilityElevation of Privilege8.8ImportantNoNo
CVE-2026-41086Windows Admin Center in Azure Portal Elevation of Privilege VulnerabilityElevation of Privilege8.8ImportantNoNo
CVE-2026-41094Microsoft Data Formulator Remote Code Execution VulnerabilityRemote Code Execution8.8ImportantNoNo
CVE-2026-41109GitHub Copilot and Visual Studio Code Security Feature Bypass VulnerabilitySecurity Feature Bypass8.8ImportantNoNo
CVE-2026-41613Visual Studio Code Elevation of Privilege VulnerabilityElevation of Privilege8.8ImportantNoNo
CVE-2026-35435Azure AI Foundry Elevation of Privilege VulnerabilityElevation of Privilege8.6CriticalNoNo
CVE-2026-40358Microsoft Office Remote Code Execution VulnerabilityRemote Code Execution8.4CriticalNoNo
CVE-2026-40361Microsoft Word Remote Code Execution VulnerabilityRemote Code Execution8.4CriticalNoNo
CVE-2026-40363Microsoft Office Remote Code Execution VulnerabilityRemote Code Execution8.4CriticalNoNo
CVE-2026-40364Microsoft Word Remote Code Execution VulnerabilityRemote Code Execution8.4CriticalNoNo
CVE-2026-40366Microsoft Word Remote Code Execution VulnerabilityRemote Code Execution8.4CriticalNoNo
CVE-2026-40367Microsoft Word Remote Code Execution VulnerabilityRemote Code Execution8.4CriticalNoNo
CVE-2026-35438Windows Admin Center Elevation of Privilege VulnerabilityElevation of Privilege8.3ImportantNoNo
CVE-2026-33833Azure Machine Learning Notebook Spoofing VulnerabilitySpoofing8.2ImportantNoNo
CVE-2026-34327Microsoft Partner Center Spoofing VulnerabilitySpoofing8.2CriticalNoNo
CVE-2026-40415Windows TCP/IP Remote Code Execution VulnerabilityRemote Code Execution8.1ImportantNoNo
CVE-2026-41105Azure Monitor Action Group Notification System Elevation of Privilege VulnerabilityElevation of Privilege8.1CriticalNoNo
CVE-2026-34332Windows Kernel-Mode Driver Remote Code Execution VulnerabilityRemote Code Execution8.0ImportantNoNo
CVE-2026-40368Microsoft SharePoint Server Remote Code Execution VulnerabilityRemote Code Execution8.0ImportantNoNo
CVE-2026-32204Azure Monitor Agent Elevation of Privilege VulnerabilityElevation of Privilege7.8ImportantNoNo
CVE-2026-33834Windows Event Logging Service Elevation of Privilege VulnerabilityElevation of Privilege7.8ImportantNoNo
CVE-2026-33835Windows Cloud Files Mini Filter Driver Elevation of Privilege VulnerabilityElevation of Privilege7.8ImportantNoNo
CVE-2026-33837Windows TCP/IP Local Elevation of Privilege VulnerabilityElevation of Privilege7.8ImportantNoNo
CVE-2026-33838Windows Message Queuing (MSMQ) Elevation of Privilege VulnerabilityElevation of Privilege7.8ImportantNoNo
CVE-2026-33840Win32k Elevation of Privilege VulnerabilityElevation of Privilege7.8ImportantNoNo
CVE-2026-33841Windows Kernel Elevation of Privilege VulnerabilityElevation of Privilege7.8ImportantNoNo
CVE-2026-34330Win32k Elevation of Privilege VulnerabilityElevation of Privilege7.8ImportantNoNo
CVE-2026-34333Windows Win32k Elevation of Privilege VulnerabilityElevation of Privilege7.8ImportantNoNo
CVE-2026-34334Windows TCP/IP Elevation of Privilege VulnerabilityElevation of Privilege7.8ImportantNoNo
CVE-2026-34336Windows DWM Core Library Information Disclosure VulnerabilityInformation Disclosure7.8ImportantNoNo
CVE-2026-34337Windows Cloud Files Mini Filter Driver Elevation of Privilege VulnerabilityElevation of Privilege7.8ImportantNoNo
CVE-2026-34338Windows Telephony Service Elevation of Privilege VulnerabilityElevation of Privilege7.8ImportantNoNo
CVE-2026-34343Windows Application Identity (AppID) Subsystem Elevation of Privilege VulnerabilityElevation of Privilege7.8ImportantNoNo
CVE-2026-34344Windows Ancillary Function Driver for WinSock Elevation of Privilege VulnerabilityElevation of Privilege7.8ImportantNoNo
CVE-2026-34351Windows TCP/IP Elevation of Privilege VulnerabilityElevation of Privilege7.8ImportantNoNo
CVE-2026-35415Windows Storage Spaces Controller Elevation of Privilege VulnerabilityElevation of Privilege7.8ImportantNoNo
CVE-2026-35417Windows Win32k Elevation of Privilege VulnerabilityElevation of Privilege7.8ImportantNoNo
CVE-2026-35418Windows Cloud Files Mini Filter Driver Elevation of Privilege VulnerabilityElevation of Privilege7.8ImportantNoNo
CVE-2026-35420Windows Kernel Elevation of Privilege VulnerabilityElevation of Privilege7.8ImportantNoNo
CVE-2026-35421Windows GDI Remote Code Execution VulnerabilityRemote Code Execution7.8CriticalNoNo
CVE-2026-40359Microsoft Excel Remote Code Execution VulnerabilityRemote Code Execution7.8ImportantNoNo
CVE-2026-40360Microsoft Excel Information Disclosure VulnerabilityInformation Disclosure7.8ImportantNoNo
CVE-2026-40362Microsoft Excel Remote Code Execution VulnerabilityRemote Code Execution7.8ImportantNoNo
CVE-2026-40369Windows Kernel Elevation of Privilege VulnerabilityElevation of Privilege7.8ImportantNoNo
CVE-2026-40377Microsoft Cryptographic Services Elevation of Privilege VulnerabilityElevation of Privilege7.8ImportantNoNo
CVE-2026-40381Azure Connected Machine Agent Elevation of Privilege VulnerabilityElevation of Privilege7.8ImportantNoNo
CVE-2026-40382Windows Telephony Service Elevation of Privilege VulnerabilityElevation of Privilege7.8ImportantNoNo
CVE-2026-40397Windows Common Log File System Driver Elevation of Privilege VulnerabilityElevation of Privilege7.8ImportantNoNo
CVE-2026-40398Windows Remote Desktop Services Elevation of Privilege VulnerabilityElevation of Privilege7.8ImportantNoNo
CVE-2026-40399Windows TCP/IP Elevation of Privilege VulnerabilityElevation of Privilege7.8ImportantNoNo
CVE-2026-40407Windows Common Log File System Driver Elevation of Privilege VulnerabilityElevation of Privilege7.8ImportantNoNo
CVE-2026-40408Windows WAN ARP Driver Elevation of Privilege VulnerabilityElevation of Privilege7.8ImportantNoNo
CVE-2026-40417Microsoft Dynamics 365 Business Central Elevation of Privilege VulnerabilityElevation of Privilege7.8ImportantNoNo
CVE-2026-40418Microsoft Office Click-To-Run Elevation of Privilege VulnerabilityElevation of Privilege7.8ImportantNoNo
CVE-2026-40419Microsoft Office Click-To-Run Elevation of Privilege VulnerabilityElevation of Privilege7.8ImportantNoNo
CVE-2026-41088Windows Ancillary Function Driver for WinSock Elevation of Privilege VulnerabilityElevation of Privilege7.8ImportantNoNo
CVE-2026-41095Data Deduplication Elevation of Privilege VulnerabilityElevation of Privilege7.8ImportantNoNo
CVE-2026-41611Visual Studio Code Remote Code Execution VulnerabilityRemote Code Execution7.8ImportantNoNo
CVE-2026-42831Microsoft Office Remote Code Execution VulnerabilityRemote Code Execution7.8CriticalNoNo
CVE-2026-42896Windows DWM Core Library Elevation of Privilege VulnerabilityElevation of Privilege7.8ImportantNoNo
CVE-2026-33821Microsoft Dynamics 365 Customer Insights Elevation of Privilege VulnerabilityElevation of Privilege7.7CriticalNoNo
CVE-2026-42832Microsoft Office Spoofing VulnerabilitySpoofing7.7ImportantNoNo
CVE-2026-26129M365 Copilot Information Disclosure VulnerabilityInformation Disclosure7.5CriticalNoNo
CVE-2026-26164M365 Copilot Information Disclosure VulnerabilityInformation Disclosure7.5CriticalNoNo
CVE-2026-32161Windows Native WiFi Miniport Driver Remote Code Execution VulnerabilityRemote Code Execution7.5CriticalNoNo
CVE-2026-33111Copilot Chat (Microsoft Edge) Information Disclosure VulnerabilityInformation Disclosure7.5CriticalNoNo
CVE-2026-35424Internet Key Exchange (IKE) Protocol Denial of Service VulnerabilityDenial of Service7.5ImportantNoNo
CVE-2026-40405Windows TCP/IP Denial of Service VulnerabilityDenial of Service7.5ImportantNoNo
CVE-2026-40406Windows TCP/IP Information Disclosure VulnerabilityInformation Disclosure7.5ImportantNoNo
CVE-2026-42899ASP.NET Core Denial of Service VulnerabilityDenial of Service7.5ImportantNoNo
CVE-2026-40413Windows TCP/IP Denial of Service VulnerabilityDenial of Service7.4ImportantNoNo
CVE-2026-40414Windows TCP/IP Denial of Service VulnerabilityDenial of Service7.4ImportantNoNo
CVE-2026-41107Microsoft Edge (Chromium-based) Information Disclosure VulnerabilityInformation Disclosure7.4ModerateNoNo
CVE-2026-42893Microsoft Outlook for iOS Tampering VulnerabilityTampering7.4ImportantNoNo
CVE-2026-32177.NET Elevation of Privilege VulnerabilityElevation of Privilege7.3ImportantNoNo
CVE-2026-35433.NET Elevation of Privilege VulnerabilityElevation of Privilege7.3ImportantNoNo
CVE-2026-40401Windows TCP/IP Denial of Service VulnerabilityDenial of Service7.1ImportantNoNo
CVE-2026-41101Microsoft Word for Android Spoofing VulnerabilitySpoofing7.1ImportantNoNo
CVE-2026-41102Microsoft PowerPoint for Android Spoofing VulnerabilitySpoofing7.1ImportantNoNo
CVE-2026-33839Win32k Elevation of Privilege VulnerabilityElevation of Privilege7.0ImportantNoNo
CVE-2026-34331Win32k Elevation of Privilege VulnerabilityElevation of Privilege7.0ImportantNoNo
CVE-2026-34340Windows Projected File System Elevation of Privilege VulnerabilityElevation of Privilege7.0ImportantNoNo
CVE-2026-34341Windows Link-Layer Discovery Protocol (LLDP) Elevation of Privilege VulnerabilityElevation of Privilege7.0ImportantNoNo
CVE-2026-34342Windows Print Spooler Elevation of Privilege VulnerabilityElevation of Privilege7.0ImportantNoNo
CVE-2026-34345Windows Ancillary Function Driver for WinSock Elevation of Privilege VulnerabilityElevation of Privilege7.0ImportantNoNo
CVE-2026-34347Windows Win32k Elevation of Privilege VulnerabilityElevation of Privilege7.0ImportantNoNo
CVE-2026-35416Windows Ancillary Function Driver for WinSock Elevation of Privilege VulnerabilityElevation of Privilege7.0ImportantNoNo
CVE-2026-40410Windows SMB Client Elevation of Privilege VulnerabilityElevation of Privilege7.0ImportantNoNo
CVE-2026-42825Windows Telephony Service Elevation of Privilege VulnerabilityElevation of Privilege7.0ImportantNoNo
CVE-2026-21530Windows Rich Text Edit Elevation of Privilege VulnerabilityElevation of Privilege6.7ImportantNoNo
CVE-2026-32170Windows Rich Text Edit Elevation of Privilege VulnerabilityElevation of Privilege6.7ImportantNoNo
CVE-2026-41097Secure Boot Security Feature Bypass VulnerabilitySecurity Feature Bypass6.7ImportantNoNo
CVE-2026-34350Windows Storport Miniport Driver Denial of Service VulnerabilityDenial of Service6.5ImportantNoNo
CVE-2026-35422Windows TCP/IP Driver Security Feature Bypass VulnerabilitySecurity Feature Bypass6.5ImportantNoNo
CVE-2026-40374Microsoft Power Automate Desktop Information Disclosure VulnerabilityInformation Disclosure6.5ImportantNoNo
CVE-2026-42830Azure Monitor Agent Metrics Extension Elevation of Privilege VulnerabilityElevation of Privilege6.5ImportantNoNo
CVE-2026-42891Microsoft Edge (Chromium-based) for Android Spoofing VulnerabilitySpoofing6.5ModerateNoNo
CVE-2026-41610Visual Studio Code Security Feature Bypass VulnerabilitySecurity Feature Bypass6.3ImportantNoNo
CVE-2026-40380Windows Volume Manager Extension Driver Remote Code Execution VulnerabilityRemote Code Execution6.2ImportantNoNo
CVE-2026-41614M365 Copilot for Desktop Spoofing VulnerabilitySpoofing6.2ImportantNoNo
CVE-2026-32185Microsoft Teams Spoofing VulnerabilitySpoofing5.5ImportantNoNo
CVE-2026-34339Windows Lightweight Directory Access Protocol (LDAP) Denial of Service VulnerabilityDenial of Service5.5ImportantNoNo
CVE-2026-35419Windows DWM Core Library Information Disclosure VulnerabilityInformation Disclosure5.5ImportantNoNo
CVE-2026-35440Microsoft Word Information Disclosure VulnerabilityInformation Disclosure5.5ImportantNoNo
CVE-2026-41612Visual Studio Code Information Disclosure VulnerabilityInformation Disclosure5.5ImportantNoNo
CVE-2026-35423Windows 11 Telnet Client Information Disclosure VulnerabilityInformation Disclosure5.4ImportantNoNo
CVE-2026-42838Microsoft Edge (Chromium-based) Elevation of Privilege VulnerabilityElevation of Privilege5.4ImportantNoNo
CVE-2026-32209Windows Filtering Platform (WFP) Security Feature Bypass VulnerabilitySecurity Feature Bypass4.4ImportantNoNo
CVE-2026-41100Microsoft 365 Copilot for Android Spoofing VulnerabilitySpoofing4.4ImportantNoNo
CVE-2026-32175.NET Core Tampering VulnerabilityTampering4.3ImportantNoNo
CVE-2026-35429Microsoft Edge (Chromium-based) for Android Spoofing VulnerabilitySpoofing4.3ModerateNoNo
CVE-2026-40416Microsoft Edge (Chromium-based) for Android Spoofing VulnerabilitySpoofing4.3LowNoNo
CVE-2026-40421Microsoft Word Information Disclosure VulnerabilityInformation Disclosure4.3ImportantNoNo

Retrospective Vulnerability Analysis

  • CVE-2026-21250 — Windows HTTP.sys Elevation of Privilege Vulnerability (Elevation of Privilege). The vulnerability is caused by an Untrusted Pointer Dereference in the http.sys kernel system driver. An attacker can send a specially crafted HTTP packet containing a binary payload in the headers (e.g., in X-Trigger-Ptr), which, if improperly handled by the driver, allows local privilege escalation to the SYSTEM level. To successfully exploit and bypass protection mechanisms (ASLR), techniques like Heap Spraying and Keep-Alive connection state manipulation can be used. A PoC for this vulnerability has been published on GitHub. The vulnerability was patched in February 2026.

  • CVE-2026-23671 — Windows Bluetooth RFCOMM Protocol Driver Elevation of Privilege Vulnerability (Elevation of Privilege). A vulnerability in the Bluetooth RFCOMM protocol driver caused by incorrect synchronization when accessing shared resources (race condition). This leads to a Use-After-Free error, allowing an authenticated local attacker to execute arbitrary code in kernel mode. Successful exploitation allows for privilege escalation to the SYSTEM level; however, the attack is characterized by high complexity, as it requires precise timing to "win" the race condition. A PoC for this vulnerability has been published on GitHub. Patched in March 2026.

  • CVE-2026-24294 — Windows SMB Server Elevation of Privilege Vulnerability (Elevation of Privilege). The vulnerability allows a local user to escalate their privileges to the SYSTEM level using the NTLM-reflection mechanism and a new feature for SMB connections over arbitrary TCP ports introduced in Windows Server 2025 and Windows 11 24H2. The attack involves forcing a privileged service (LSASS) to authenticate to an attacker-controlled SMB server via a non-standard port, thereby bypassing classic Local NTLM Reflection protections and relaying the acquired token to the genuine SMB service (port 445). The published PoC demonstrates exploitation using modified PetitPotam and Impacket tools. The vulnerability was patched in March 2026.

  • CVE-2026-26128 — Windows SMB Server Elevation of Privilege Vulnerability (Elevation of Privilege). The vulnerability allows an authenticated local attacker to escalate their privileges to the SYSTEM level via a Kerberos Reflection attack. Exploitation is possible due to a Unicode character normalization bypass during Service Principal Name (SPN) resolution: due to differences in string processing functions within the DNS cache service and on the domain controller, an attacker can register a spoofed DNS record and redirect authentication traffic to their own host. A PoC is available on GitHub, allowing attacks against AD CS and MSSQL services. The vulnerability was patched in March 2026.

  • CVE-2026-26168 — Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability (Elevation of Privilege). A Race Condition vulnerability in the afd.sys kernel driver, arising from incorrect synchronization of access to connection objects. In the AfdAddConnectedReference function, the spinlock is released before the object's reference counter increment is completed, creating a vulnerability window for a Use-After-Free scenario. A local attacker, even one with low privileges in an AppContainer, can exploit this flaw to escalate their rights to the SYSTEM level. The published PoC in Python demonstrates the attack mechanism via concurrent calls to connect() and closesocket(), leading to kernel memory pool corruption and a system crash. The vulnerability was patched in April 2026.

  • CVE-2026-33101 — Windows Print Spooler Elevation of Privilege Vulnerability (Elevation of Privilege). A Use-After-Free (UAF) vulnerability in the OpenPrinterExW function, occurring when processing the _SPLCLIENT_CONTAINER (Level 2) structure. Due to a logical error, if the RouterOpenPrinter function fails, the container's memory is freed, yet the system unconditionally writes the handle to the freed memory slot. This allows a local attacker to gain SYSTEM-level rights through heap manipulations of the spoolsv.exe process. According to the technical analysis and the available PoC, Windows 11 24H2 systems prior to build 26100.8246 are affected. The vulnerability was patched in April 2026.

  • CVE-2026-32202 — Windows Shell Spoofing Vulnerability (Spoofing). The vulnerability involves a protection mechanism failure (CWE-693) when processing the _IDCONTROLW structure within the IDList chain in shortcut files (.LNK). Researchers from Akamai reverse-engineered the logic of shell32.dll and presented a PoC that allows injecting a UNC path into the ModulePath field of a Control Panel object. When File Explorer (explorer.exe) attempts to render the icon of such a shortcut, an automatic request is made to the remote SMB share, leading to the disclosure of the user's NTLM hash. The vulnerability is closely tied to CVE-2026-21510 and was patched in April 2026.

Conclusion

The May 2026 update is a classic example of a situation where the absence of currently exploited zero-days should not create a false sense of security. The presence of 30 critical vulnerabilities, including flaws in Netlogon, DNS, and Azure DevOps with maximum CVSS ratings, makes this a highly stressful month for administrators.

Update prioritization for May:

  1. Tier 0 Infrastructure: The absolute priority is installing updates on Domain Controllers (to patch RCE in Netlogon) and DNS servers/clients. Exploitation of these vulnerabilities will lead to the instant collapse of the entire corporate network.
  2. Cloud Development Platforms: Infrastructure owners of Azure DevOps must urgently ensure patches are applied (CVE-2026-42826, CVSS 10.0), as data exfiltration from development environments can compromise all of the company's source codes and tokens.
  3. Collaboration Servers: SharePoint Server remains a favorite target for ransomware. The presence of such a high number of RCEs requires immediate updating of web farms exposed to internal and external networks.
  4. User Endpoints: The Microsoft Office suite update must be deployed to workstations as quickly as possible to prevent attackers from infiltrating via malicious documents sent via email.

Important addition: Pay special attention to the "Retrospective Vulnerability Analysis" section. In May, a massive leak of working PoC exploits occurred on GitHub for vulnerabilities patched in February, March, and April (SMB Server, AFD.sys, Print Spooler, HTTP.sys). This means that if your organization is behind on its update schedule by even a month, you are in the crosshairs of automated hacking tools accessible even to low-skilled attackers. Eliminating technical patch debt is now of critical importance.

Paranoid Security Microsoft Patch Tuesday Analysis – March 2026 March 10
MS Patch Tuesday Microsoft Patch Tuesday Analysis – March 2026
Paranoid Security Microsoft Patch Tuesday Analysis – February 2026 February 10
MS Patch Tuesday Microsoft Patch Tuesday Analysis – February 2026
Paranoid Security How Attackers Abuse Signed Drivers to Take Over Infrastructure. Using BYOVD to Bypass PPL Protection Mechanisms in Windows. February 5
Vulnerability Research How Attackers Abuse Signed Drivers to Take Over Infrastructure. Using BYOVD to Bypass PPL Protection Mechanisms in Windows.