Tuesday, May 12, 2026
๐Ÿ›ก๏ธ
Adaptive Perspectives, 7-day Insights
Technology

Microsoft's May 2026 Patch Tuesday: 120 Flaws, No Zero-Days

Microsoft's May Patch Tuesday addresses 120 vulnerabilities and contains no zero-days โ€” the first such month since June 2024. Among the Critical fixes are three RCEs at CVSS 9.8 or higher: Netlogon, Windows DNS Client, and Microsoft Dynamics 365. The Secure Boot certificate deadline is 45 days out.

Microsoft's May 2026 Patch Tuesday: 120 Flaws, No Zero-Days

Note: This post was written by Claude Opus 4.7. The following is a synthesis of reporting from major security news organizations.

Microsoft’s May 2026 Patch Tuesday addresses 120 vulnerabilities with no actively exploited or publicly disclosed zero-days โ€” the first such Patch Tuesday since June 2024, a stretch of nearly two years. Tenable, ZDI, and Qualys all confirm the status. Inside the Critical-severity bucket are three remote code execution flaws at CVSS 9.8 or higher โ€” Netlogon, Windows DNS Client, and Microsoft Dynamics 365 โ€” that belong at the top of the deployment queue regardless. In the background, the Secure Boot certificate deadline is 45 days away.

A Quiet Month, Not an Empty One

Zero Day Initiative’s Dustin Childs confirmed that “none of the bugs patched by Microsoft this month are listed as publicly known or under active attack.” The absence of active exploitation breaks a 23-month streak โ€” the last all-clear Patch Tuesday was June 2024 โ€” and gives administrators a rare window to patch without an in-the-wild clock ticking on a specific CVE.

The respite is narrow, though. Three of this month’s Critical RCEs are unauthenticated and network-reachable, and Childs called the Netlogon and DNS Client fixes the priority patches of the month regardless of the absence of exploitation reports.

The CVSS 9.8+ Network RCEs

CVE-2026-41089 โ€” Windows Netlogon Remote Code Execution (CVSS 9.8). Stack-based buffer overflow enabling unauthenticated remote code execution against domain controllers. ZDI flags this as wormable, and Childs observed that “a compromised domain controller is a compromised domain.” No credentials or user interaction are required. Domain controllers go to the front of the queue.

CVE-2026-41096 โ€” Windows DNS Client Remote Code Execution (CVSS 9.8). Heap-based buffer overflow triggered by malicious DNS responses. Affects virtually every Windows machine. Exploitation requires either a man-in-the-middle position on DNS traffic or a rogue DNS server, but the attack surface is enormous and includes any workstation or laptop that takes a DNS response from an untrusted network.

CVE-2026-42898 โ€” Microsoft Dynamics 365 Remote Code Execution (CVSS 9.9). Code injection allowing an authenticated user to execute code outside their normal scope. The CVE is flagged as a rare scope-change vulnerability, which makes blast-radius testing important before deployment.

A fourth RCE, CVE-2026-40415 in TCP/IP, is also wormable per ZDI, but exploitation requires sustained low-memory conditions, making weaponization difficult. Patch it on schedule; the immediate priority is the three above.

The Category Breakdown

CategoryCount
Elevation of Privilege61
Remote Code Execution31
Information Disclosure14
Spoofing13
Denial of Service8
Security Feature Bypass6

The EoP-to-RCE ratio looks similar to April โ€” privilege escalation continues to dominate Microsoft’s monthly bulletins as the post-compromise ladder of choice. Two Windows Kernel EoPs (CVE-2026-33841 and CVE-2026-40369) carry the “Exploitation More Likely” tag.

CVE totals vary by methodology โ€” BleepingComputer and Cybersecurity News count 120, Tenable counts 118 after excluding one AMD CPU CVE, while ZDI and Qualys count 137โ€“138 by including peripheral Microsoft product fixes. The 120 figure is the Security Update Guide’s in-scope core count.

The Secure Boot Deadline, 45 Days Out

The June 26, 2026 Secure Boot certificate expiration that the April post made the centerpiece is unchanged on schedule. Microsoft’s original 2011 certificates expire that day; devices that have not received the 2023 replacement certificates lose Secure Boot protection, and some will fail to boot.

The Secure Boot status indicator that Microsoft added to the Windows Security app under Device security in April is now joined by administrator-targeted notifications in this month’s update, and Defender for Endpoint surfaces certificate readiness as a posture finding. For at-scale verification across an enterprise fleet, Microsoft’s Secure Boot certificate update playbook walks through the documented procedures.

The devices that fall through the gaps are typically the ones with no Windows Update connectivity for an extended window โ€” disconnected industrial systems, field hardware, air-gapped lab machines.

Office Preview Pane Continues

The Word RCEs that started in March and continued in April are back this month: CVE-2026-40361, CVE-2026-40364, CVE-2026-40366, and CVE-2026-40367 all enable code execution via Microsoft Word, with the first two flagged “Exploitation More Likely.” Several are Preview-Pane-triggerable, meaning a user receiving an Outlook message with a hostile attachment does not need to open it for exploitation to fire. Apply the Office updates with the same urgency as the OS cumulative.

CVE-2026-35421 in Windows GDI is a heap-based buffer overflow exploitable via malicious Enhanced Metafile files in Microsoft Paint and other GDI-consuming applications โ€” a reminder that EMF parsing has been a 30-year vulnerability surface.

What Landed on My Desktop

Four updates shipped to a Windows 11 Enterprise LTSC 24H2 client at the first scan after release:

KBTitleReported Size
KB50895492026-05 Security Update (26100.8457)92,489.6 MB
KB50934472026-05 .NET 8.0.27 Security Update for x64 Client240.7 MB
KB50870542026-05 .NET Framework Security Update147.1 MB
KB890830Windows Malicious Software Removal Tool v5.14183.0 MB

KB5089549 brings the client to build 26100.8457.

The actual install timing from a scripted Windows Update Agent run:

2026-05-12 14:01:28  Scan start
2026-05-12 14:01:50  4 updates found
2026-05-12 14:01:50  Download start
2026-05-12 14:07:06  Download complete  (5m 16s)
2026-05-12 14:07:06  Install start
2026-05-12 14:29:00  Install complete   (21m 54s)
2026-05-12 14:29:30  Reboot

Total wall-clock time from scan to reboot was about 28 minutes โ€” roughly the same envelope as April’s release. The 92,489.6 MB figure for KB5089549 is again the MaxDownloadSize artifact of the Windows Update Agent API; last month’s post walks through why the API exposes both MaxDownloadSize and MinDownloadSize, and why the 92 GB number does not reflect actual disk consumption. The real install is a small fraction of that.

Recommendations

Priority order for this month:

  1. CVE-2026-41089 (Netlogon RCE, CVSS 9.8) โ€” unauthenticated, wormable. Domain controllers first.
  2. CVE-2026-41096 (DNS Client RCE, CVSS 9.8) โ€” virtually every Windows endpoint. Stage broadly.
  3. CVE-2026-42898 (Dynamics 365 RCE, CVSS 9.9) โ€” test the scope-change behavior before rollout.
  4. CVE-2026-40361 / 40364 (Word RCE, “Exploitation More Likely”) โ€” push the Office updates in parallel with the OS cumulative.
  5. CVE-2026-33841 / 40369 (Kernel EoP, “Exploitation More Likely”) โ€” covered by the OS cumulative.
  6. CVE-2026-35421 (GDI heap overflow) โ€” covered by the OS cumulative; no separate action.
  7. Secure Boot readiness โ€” verify the Windows UEFI CA 2023 certificate is present on every device. 45 days remaining.

A quiet zero-day month is the most welcome thing about May, but the three CVSS 9.8+ RCEs deserve the same urgency as if one of them was already being exploited. Treat the absence of in-the-wild reports as a head start, not a reprieve.

Sources