Blog

Microsoft Patch Tuesday – May 2026

9 min. read
13/05/2026
By Esben Dochy
Patch Tuesday
Microsoft Patch Tuesday

⚡ TL;DR | Go Straight to the May 202Patch Tuesday Audit Report

Patch Tuesday is once again upon us. As always, our team has put together the monthly Patch Tuesday Report to help you manage your update progress. The audit report gives you a quick and clear overview of your Windows machines and their patching status. The May 2026 edition of Patch Tuesday brings us 121 fixes, with 16 rated as critical. We’ve listed the most important changes below.

Microsoft SSO Plugin for Jira & Confluence Elevation of Privilege Vulnerability

CVE-2026-41103 is the standout vulnerability of the month, a Critical Elevation of Privilege bug in Microsoft’s SSO plug-in for Atlassian Jira and Confluence with a CVSS score of 9.1. Unlike most EoP vulnerabilities this month, this one is network-exploitable, requires no privileges, and needs no user interaction, which is why Microsoft has flagged it as “Exploitation More Likely”.

A successful exploit gives an unauthenticated attacker access to a Jira or Confluence environment at an elevated privilege level. Considering how much sensitive product, customer, and engineering data tends to sit in Atlassian tenants, this is exactly the kind of plug-in flaw that ends up on a red team’s target list quickly. If you use Microsoft’s SSO plug-in to broker access into Jira or Confluence, this one should be at the top of your queue.

Microsoft Word Remote Code Execution Vulnerabilities

Microsoft Word receives four Critical Remote Code Execution patches this month: CVE-2026-40361, CVE-2026-40364, CVE-2026-40366, and CVE-2026-40367. All four share the same CVSS 8.4 profile, all four are local-vector Critical RCEs that need no privileges and no user interaction beyond opening a crafted document, and two of them (CVE-2026-40361 and CVE-2026-40364) are rated “Exploitation More Likely”.

The attack pattern is the familiar one. An attacker delivers a malicious Word document by phishing email, file share, or web download, and as soon as the document is opened the attacker gets code execution in the user’s context. Office RCEs remain a top initial-access vector for ransomware operators and APT crews alike, and four of them landing in the same product on the same day is a strong reminder to keep Office on the express patching lane. If your environment is large enough that Office gets its own deployment ring, this month is a good one to shorten that ring.

Win32k Elevation of Privilege Vulnerabilities

The kernel’s graphical subsystem gives us two patches that Microsoft has flagged as “Exploitation More Likely”: CVE-2026-33840 and CVE-2026-35417. Both are local Elevation of Privilege bugs in Win32k with a CVSS score of 7.8, both require only Low privileges, and both allow a successful attacker to obtain SYSTEM on the local machine.

Win32k continues its long-running tradition of being one of the most exploited surfaces in Windows. EoP bugs like these are the classic second stage in a real-world attack chain, paired with an initial-access vector like, say, a malicious Word document. Ship the Word patches and the Win32k patches together and you take out both ends of that chain in one wave.

Run the Patch Tuesday May 2026 Audit

To help manage your update progress, we’ve created the Patch Tuesday Audit that checks if the assets in your network are on the latest patch updates. The report has been color-coded to see which machines are up-to-date and which ones still need to be updated. As always, system administrators are urged to update their environment as soon as possible to ensure all endpoints are secured.

The Lansweeper Patch Tuesday report is automatically added to your Lansweeper Site. Lansweeper Sites is included in all our licenses without any additional cost and allows you to federate all your installations into one single view so all you need to do is look at one report, automatically added every patch Tuesday!

Patch Tuesday May 2026 CVE Codes & Titles

CVETitle
CVE-2025-54518AMD: CVE-2025-54518 CPU OP Cache Corruption
CVE-2026-21530Windows Rich Text Edit Elevation of Privilege Vulnerability
CVE-2026-32161Windows Native WiFi Miniport Driver Remote Code Execution Vulnerability
CVE-2026-32170Windows Rich Text Edit Elevation of Privilege Vulnerability
CVE-2026-32175.NET Core Tampering Vulnerability
CVE-2026-32177.NET Elevation of Privilege Vulnerability
CVE-2026-32185Microsoft Teams Spoofing Vulnerability
CVE-2026-32204Azure Monitor Agent Elevation of Privilege Vulnerability
CVE-2026-32209Windows Filtering Platform (WFP) Security Feature Bypass Vulnerability
CVE-2026-33110Microsoft SharePoint Server Remote Code Execution Vulnerability
CVE-2026-33112Microsoft SharePoint Server Remote Code Execution Vulnerability
CVE-2026-33117Azure SDK for Java Security Feature Bypass Vulnerability
CVE-2026-33833Azure Machine Learning Notebook Spoofing Vulnerability
CVE-2026-33834Windows Event Logging Service Elevation of Privilege Vulnerability
CVE-2026-33835Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability
CVE-2026-33837Windows TCP/IP Local Elevation of Privilege Vulnerability
CVE-2026-33838Windows Message Queuing (MSMQ) Elevation of Privilege Vulnerability
CVE-2026-33839Win32k Elevation of Privilege Vulnerability
CVE-2026-33840Win32k Elevation of Privilege Vulnerability
CVE-2026-33841Windows Kernel Elevation of Privilege Vulnerability
CVE-2026-34329Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability
CVE-2026-34330Win32k Elevation of Privilege Vulnerability
CVE-2026-34331Win32k Elevation of Privilege Vulnerability
CVE-2026-34332Windows Kernel-Mode Driver Remote Code Execution Vulnerability
CVE-2026-34333Windows Win32k Elevation of Privilege Vulnerability
CVE-2026-34334Windows TCP/IP Elevation of Privilege Vulnerability
CVE-2026-34336Windows DWM Core Library Information Disclosure Vulnerability
CVE-2026-34337Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability
CVE-2026-34338Windows Telephony Service Elevation of Privilege Vulnerability
CVE-2026-34339Windows Lightweight Directory Access Protocol (LDAP) Denial of Service Vulnerability
CVE-2026-34340Windows Projected File System Elevation of Privilege Vulnerability
CVE-2026-34341Windows Link-Layer Discovery Protocol (LLDP) Elevation of Privilege Vulnerability
CVE-2026-34342Windows Print Spooler Elevation of Privilege Vulnerability
CVE-2026-34343Windows Application Identity (AppID) Subsystem Elevation of Privilege Vulnerability
CVE-2026-34344Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
CVE-2026-34345Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
CVE-2026-34347Windows Win32k Elevation of Privilege Vulnerability
CVE-2026-34350Windows Storport Miniport Driver Denial of Service Vulnerability
CVE-2026-34351Windows TCP/IP Elevation of Privilege Vulnerability
CVE-2026-35415Windows Storage Spaces Controller Elevation of Privilege Vulnerability
CVE-2026-35416Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
CVE-2026-35417Windows Win32k Elevation of Privilege Vulnerability
CVE-2026-35418Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability
CVE-2026-35419Windows DWM Core Library Information Disclosure Vulnerability
CVE-2026-35420Windows Kernel Elevation of Privilege Vulnerability
CVE-2026-35421Windows GDI Remote Code Execution Vulnerability
CVE-2026-35422Windows TCP/IP Driver Security Feature Bypass Vulnerability
CVE-2026-35423Windows 11 Telnet Client Information Disclosure Vulnerability
CVE-2026-35424Internet Key Exchange (IKE) Protocol Denial of Service Vulnerability
CVE-2026-35433.NET Elevation of Privilege Vulnerability
CVE-2026-35436Microsoft Office Click-To-Run Elevation of Privilege Vulnerability
CVE-2026-35438Windows Admin Center Elevation of Privilege Vulnerability
CVE-2026-35439Microsoft SharePoint Server Remote Code Execution Vulnerability
CVE-2026-35440Microsoft Word Information Disclosure Vulnerability
CVE-2026-40357Microsoft SharePoint Server Remote Code Execution Vulnerability
CVE-2026-40358Microsoft Office Remote Code Execution Vulnerability
CVE-2026-40359Microsoft Excel Remote Code Execution Vulnerability
CVE-2026-40360Microsoft Excel Information Disclosure Vulnerability
CVE-2026-40361Microsoft Word Remote Code Execution Vulnerability
CVE-2026-40362Microsoft Excel Remote Code Execution Vulnerability
CVE-2026-40363Microsoft Office Remote Code Execution Vulnerability
CVE-2026-40364Microsoft Word Remote Code Execution Vulnerability
CVE-2026-40365Microsoft SharePoint Server Remote Code Execution Vulnerability
CVE-2026-40366Microsoft Word Remote Code Execution Vulnerability
CVE-2026-40367Microsoft Word Remote Code Execution Vulnerability
CVE-2026-40368Microsoft SharePoint Server Remote Code Execution Vulnerability
CVE-2026-40369Windows Kernel Elevation of Privilege Vulnerability
CVE-2026-40370SQL Server Remote Code Execution Vulnerability
CVE-2026-40374Microsoft Power Automate Desktop Information Disclosure Vulnerability
CVE-2026-40377Microsoft Cryptographic Services Elevation of Privilege Vulnerability
CVE-2026-40380Windows Volume Manager Extension Driver Remote Code Execution Vulnerability
CVE-2026-40381Azure Connected Machine Agent Elevation of Privilege Vulnerability
CVE-2026-40382Windows Telephony Service Elevation of Privilege Vulnerability
CVE-2026-40397Windows Common Log File System Driver Elevation of Privilege Vulnerability
CVE-2026-40398Windows Remote Desktop Services Elevation of Privilege Vulnerability
CVE-2026-40399Windows TCP/IP Elevation of Privilege Vulnerability
CVE-2026-40401Windows TCP/IP Denial of Service Vulnerability
CVE-2026-40402Windows Hyper-V Elevation of Privilege Vulnerability
CVE-2026-40403Windows Graphics Component Remote Code Execution Vulnerability
CVE-2026-40405Windows TCP/IP Denial of Service Vulnerability
CVE-2026-40406Windows TCP/IP Information Disclosure Vulnerability
CVE-2026-40407Windows Common Log File System Driver Elevation of Privilege Vulnerability
CVE-2026-40408Windows WAN ARP Driver Elevation of Privilege Vulnerability
CVE-2026-40410Windows SMB Client Elevation of Privilege Vulnerability
CVE-2026-40413Windows TCP/IP Denial of Service Vulnerability
CVE-2026-40414Windows TCP/IP Denial of Service Vulnerability
CVE-2026-40415Windows TCP/IP Remote Code Execution Vulnerability
CVE-2026-40417Microsoft Dynamics 365 Business Central Elevation of Privilege Vulnerability
CVE-2026-40418Microsoft Office Click-To-Run Elevation of Privilege Vulnerability
CVE-2026-40419Microsoft Office Click-To-Run Elevation of Privilege Vulnerability
CVE-2026-40420Microsoft Office Click-To-Run Elevation of Privilege Vulnerability
CVE-2026-40421Microsoft Word Information Disclosure Vulnerability
CVE-2026-41086Windows Admin Center in Azure Portal Elevation of Privilege Vulnerability
CVE-2026-41088Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
CVE-2026-41089Windows Netlogon Remote Code Execution Vulnerability
CVE-2026-41094Microsoft Data Formulator Remote Code Execution Vulnerability
CVE-2026-41095Data Deduplication Elevation of Privilege Vulnerability
CVE-2026-41096Windows DNS Client Remote Code Execution Vulnerability
CVE-2026-41097Secure Boot Security Feature Bypass Vulnerability
CVE-2026-41100Microsoft 365 Copilot for Android Spoofing Vulnerability
CVE-2026-41101Microsoft Word for Android Spoofing Vulnerability
CVE-2026-41102Microsoft PowerPoint for Android Spoofing Vulnerability
CVE-2026-41103Microsoft SSO Plugin for Jira & Confluence Elevation of Privilege Vulnerability
CVE-2026-41109GitHub Copilot and Visual Studio Code Security Feature Bypass Vulnerability
CVE-2026-41610Visual Studio Code Security Feature Bypass Vulnerability
CVE-2026-41611Visual Studio Code Remote Code Execution Vulnerability
CVE-2026-41612Visual Studio Code Information Disclosure Vulnerability
CVE-2026-41613Visual Studio Code Elevation of Privilege Vulnerability
CVE-2026-41614M365 Copilot for Desktop Spoofing Vulnerability
CVE-2026-42823Azure Logic Apps Elevation of Privilege Vulnerability
CVE-2026-42825Windows Telephony Service Elevation of Privilege Vulnerability
CVE-2026-42830Azure Monitor Agent Metrics Extension Elevation of Privilege Vulnerability
CVE-2026-42831Microsoft Office Remote Code Execution Vulnerability
CVE-2026-42832Microsoft Office Spoofing Vulnerability
CVE-2026-42833Microsoft Dynamics 365 On-Premises Remote Code Execution Vulnerability
CVE-2026-42893Microsoft Outlook for iOS Tampering Vulnerability
CVE-2026-42896Windows DWM Core Library Elevation of Privilege Vulnerability
CVE-2026-42898Microsoft Dynamics 365 On-Premises Remote Code Execution Vulnerability
CVE-2026-42899ASP.NET Core Denial of Service Vulnerability
CVE-2026-43353i3c: mipi-i3c-hci: Fix race in DMA ring dequeue
CVE-2026-43500rxrpc: Also unshare DATA/RESPONSE packets when paged frags are present

Ready to get started?

Explore the full platform, free for 14 days.
No credit card required.

Need help evaluating?
Get guidance on pricing at scale and enterprise requirements.
Talk to sales
Clear pricing as you grow
Transparent plans that scale with your environment.
View plans & pricing