Microsoft May Patch Tuesday: Critical Fixes and Urgent Updates

Microsoft’s May Patch Tuesday includes 121 vulnerabilities across Windows, M365, and Azure. Discover why trust layers, privilege escalation, and cloud platforms are reshaping enterprise risk—and how to prioritize patching effectively.

Blog post highlighting cybersecurity risk across Microsoft platforms including Windows, Azure, and Microsoft 365 during Patch Tuesday updates.

Table of contents

Dive deeper in our Resource Library
Find the latest white papers, research reports, webinars on demand and much more - all by industry-leading experts.

May 2026’s Patch Tuesday is not defined by a single wormable vulnerability or one headline grabbing Remote Code Execution flaw. This month highlights something far more important for modern enterprises: the platforms organisations trust most are increasingly becoming part of the attack surface.

Patch Tuesday - Quick Stats

Total CVEs: 121
Critical: ~18
Important: ~103
Remote Code Execution (RCE): ~25
Elevation of Privilege (EoP): ~45+

This release includes 121 vulnerabilities across Windows, Microsoft 365, Teams, SharePoint, Azure services, and core operating system components.  While several cloud vulnerabilities were fully mitigated by Microsoft with no customer action required, the remaining vulnerabilities reveal a clear industry trend, attackers are increasingly targeting trusted enterprise workflows, collaboration platforms, and privilege boundaries rather than relying solely on traditional endpoint exploitation, which we have been saying for a while now.

The Enterprise Trust Layer Is Under Fire

Attackers are increasingly focusing on adjacent systems, collaboration platforms and administrative tools rather than traditional endpoints.  Vulnerabilities in SharePoint, Dynamics 365, Teams, Office, and Windows trust boundaries offer high value returns because compromising one trusted component can yield broad access.

Trusted platforms inherit trust automatically, that is exactly why attackers continue to target them!

AI and Cloud Services Continue to Expand the Attack Surface

AI-powered features and cloud administration tools continue to appear regularly in Patch Tuesday releases.  Although most Azure/M365-related issues this month were pre-mitigated, their regular presence signals that organizations must treat these platforms with the same security rigor as traditional infrastructure.

Services connected to these are now appearing regularly within Patch Tuesday releases:

  • AI workflows
  • cloud administration
  • collaboration tooling
  • automation platforms
  • enterprise data repositories

This is important because organisations are rapidly integrating AI powered workflows and cloud automation into daily operations.  For many enterprises, these systems are quickly becoming operational infrastructure rather than optional tooling.  Even where Microsoft mitigates vulnerabilities server side, we should pay close attention to the trend itself.  The attack surface of the enterprise is expanding beyond the traditional endpoint.

Privilege Escalation Remains the Real Enabler

One of the clearest themes this month is the continued abundance of Elevation of Privilege vulnerabilities across Windows, these include:

  • Win32K & Windows Kernel
  • TCP/IP
  • Cloud Files Mini Filter Driver
  • DWM Core
  • Ancillary Function Driver for WinSock

Several are rated “Exploitation More Likely”.  This reinforces a pattern seen throughout recent Patch Tuesday releases, modern attacks are increasingly built as chains:

Initial access > Privilege escalation > Breadcrumbs > Lateral movement >Operational disruption

MS Office Risks

Multiple Remote Code Execution vulnerabilities in Microsoft Office, Word, and Excel (some leveraging the Preview Pane as an attack vector) remain a consistent concern for organizations with broad Office deployments.   Windows Netlogon and DNS Client RCEs are also notable traditional risks this month.

Windows Trust Boundaries Matter More Than Ever

Several vulnerabilities this month affect deeply trusted Windows components including Win32K, the Windows Kernel, DWM Core, Cloud Files Mini Filter Driver, and Windows Application Identity (AppID).  These components help Windows separate user activity, application permissions and system level operations. Successful exploitation may allow attackers to move from standard user access into highly privileged system contexts while blending into normal operating system behaviour.

 These components are deeply integrated into everyday Windows operations, malicious activity may closely resemble legitimate system activity, making detection and containment significantly more challenging.

How You Become the Hero This Month

The organisations that stand out this May will not necessarily be the ones that patch the fastest, they will be the ones that prioritize the right fixes first.

Focus on your unique Patch Risk Profile:

  • Fast track vulnerabilities marked “Exploitation More Likely” and with a High Score from our download sheet
  • Treat privilege escalation vulnerabilities as urgent, especially when combined with low-friction initial access paths
  • Prioritise Office/SharePoint/Dynamics RCEs (especially those involving Preview Pane)
  • Prioritise resilience alongside prevention.  Recovery speed really matters!

When trusted platforms such as Microsoft enterprise solutions become part of the attack surface, operational resilience becomes a competitive advantage.  Absolute Security enables organisations to rapidly restore compromised endpoints at scale using firmware embedded persistence and automated rehydration capabilities helping to reduce downtime.

Patch smart. Build resilience. Happy patching.

See the May 2026 Patch Tuesday Chart (PDF).