Skip to main content
Splashtop20 years of trust
Log inFree Trial
+1.408.886.7177Log inFree Trial
A team works on their computers in an office.

May 2026 Patch Tuesday: 137 CVEs to Prioritize

8 min read
Updated
Get Started with Splashtop
Top-rated remote access, remote support, and endpoint management solutions.
Free Trial

Microsoft’s May 2026 Patch Tuesday release includes 137 Microsoft CVEs and 128 republished non-Microsoft vulnerabilities, creating a broad patching workload for IT teams.

While Microsoft has not confirmed active exploitation in the wild this month, several critical vulnerabilities and 13 issues marked “Exploitation More Likely” raise the risk of near-term attacks.

For organizations managing distributed endpoints, cloud-connected services, remote access components, and collaboration platforms, this month’s update calls for fast validation and risk-based patch prioritization.

Microsoft Patch Breakdown for May 2026

This month’s Patch Tuesday release spans cloud infrastructure, collaboration platforms, Windows networking components, developer tooling, and enterprise identity systems. The main theme is the concentration of vulnerabilities in cloud-connected enterprise environments and in critical Windows infrastructure.

Key areas affected include:

Area

Affected Products and Components

Windows infrastructure and networking

Netlogon, DNS, Hyper-V, TCP/IP, Remote Desktop, WinSock, Windows Kernel

Microsoft 365 collaboration workloads

Teams, SharePoint, Office Word, Excel, PowerPoint, Copilot-related services

Azure services

Azure DevOps, Azure Logic Apps, Azure Cloud Shell, Azure SDK, Azure Machine Learning, Azure Entra ID

Identity and authentication

Microsoft SSO Plugin for Jira & Confluence, Windows authentication services

Developer and admin tooling

SQL Server, ASP.NET Core, Visual Studio Code, GitHub Copilot, Windows Admin Center

For IT teams, the risk is not limited to a single product family. That makes prioritization especially important, since organizations need to account for both traditional Windows patching and exposure across cloud-connected services.

The most urgent review should focus on systems that support authentication, networking, remote access, and cloud administration. These components often have broad enterprise reach, making them higher-impact targets if attackers develop reliable exploits after disclosure.

Zero-Day and Exploitation More Likely Vulnerabilities

Microsoft has not confirmed any vulnerabilities that are actively exploited in the wild in this month’s Patch Tuesday release. However, May 2026 still includes several vulnerabilities that require urgent attention, as Microsoft has marked them as “Exploitation More Likely.”

That designation means Microsoft considers these vulnerabilities more likely to be exploited after disclosure. This month, 13 vulnerabilities fall into that category:

CVE

Affected Component

CVE-2026-33835

Windows Cloud Files Mini Filter Driver

CVE-2026-33837

Windows TCP/IP

CVE-2026-33840

Windows Win32K - ICOMP

CVE-2026-35417

Windows Win32K - ICOMP

CVE-2026-33841

Windows Kernel

CVE-2026-40369

Windows Kernel

CVE-2026-35416

Windows Ancillary Function Driver for WinSock

CVE-2026-35435

Azure AI Foundry M365 published agents

CVE-2026-40361

Microsoft Office Word

CVE-2026-40364

Microsoft Office Word

CVE-2026-40397

Windows Common Log File System Driver

CVE-2026-40398

Windows Remote Desktop

CVE-2026-41103

Microsoft SSO Plugin for Jira & Confluence

Even without confirmed exploitation, they should move toward the top of the patching queue because they represent a higher risk of near-term weaponization.

Critical Vulnerabilities in May 2026

Several vulnerabilities in the May 2026 release carry critical or near-critical severity ratings and affect enterprise-facing services across Azure, Windows infrastructure, identity systems, collaboration tools, and virtualization environments.

CVE

Affected Product or Component

CVSS

Why It Matters

CVE-2026-42826

Azure DevOps

10.0

A highest-severity vulnerability affecting developer workflows and cloud-connected development environments.

CVE-2026-33109

Azure Managed Instance for Apache Cassandra

9.9

A critical issue for organizations using managed cloud database infrastructure.

CVE-2026-42823

Azure Logic Apps

9.9

Affects cloud automation and workflow orchestration, which can be deeply connected to business-critical systems.

CVE-2026-41089

Windows Netlogon

9.8

Impacts a core Windows authentication component used in domain environments.

CVE-2026-41096

Microsoft Windows DNS

9.8

Affects a foundational networking service used broadly across Windows environments.

CVE-2026-33823

Microsoft Teams

9.6

Relevant for organizations with broad Teams deployment across users and departments.

CVE-2026-35428

Azure Cloud Shell

9.6

Impacts cloud administration workflows used to manage Azure environments.

CVE-2026-40379

Azure Entra ID

9.3

Affects enterprise identity infrastructure, making it a high-priority review item.

CVE-2026-40402

Windows Hyper-V

9.3

Important for organizations using virtualization across servers, developer systems, or hosted workloads.

These vulnerabilities deserve close attention because they affect systems with broad access, high business impact, or privileged administrative roles. Azure DevOps, Azure Logic Apps, Azure Cloud Shell, and Azure Entra ID should be reviewed quickly by teams managing cloud infrastructure and identity environments. Windows Netlogon, DNS, Hyper-V, TCP/IP, and Remote Desktop vulnerabilities should be prioritized across domain-connected systems, servers, and critical infrastructure.

Organizations should also review related risks across SQL Server, SharePoint, Office, ASP.NET Core, Windows networking services, and developer tooling. Even when a vulnerability is not confirmed as actively exploited, critical severity combined with enterprise exposure can create a narrow window for safe remediation.

How to Prioritize May 2026 Patches

With 137 Microsoft CVEs and a large set of republished non-Microsoft vulnerabilities, IT teams should take a risk-based approach rather than treating every update equally. The priority should be systems with high exposure, critical severity, identity or networking impact, and vulnerabilities Microsoft marked as “Exploitation More Likely.”

1. Patch Within 72 Hours

Organizations should prioritize vulnerabilities affecting critical infrastructure, cloud administration, identity services, and remote access workflows. This includes:

  • Azure DevOps, Azure Logic Apps, Azure Cloud Shell, and Azure SDK vulnerabilities

  • Windows Netlogon, DNS, Hyper-V, TCP/IP, and Remote Desktop vulnerabilities

  • Vulnerabilities marked “Exploitation More Likely”

  • Teams, SharePoint, Office, and collaboration-related vulnerabilities

  • Remote Desktop and Windows networking-related vulnerabilities

  • Internet-facing systems and broadly accessible services

  • Domain controllers, DNS infrastructure, identity systems, and cloud admin environments

These systems should move through validation and deployment as quickly as possible because they can create higher-impact exposure across enterprise environments.

2. Patch Within 1 to 2 Weeks

After the highest-risk systems are addressed, organizations should patch systems with broad endpoint coverage or important operational impact. This includes:

  • SQL Server and ASP.NET Core vulnerabilities

  • Windows Kernel, WinSock, and file system-related components

  • Office Word, Excel, and PowerPoint vulnerabilities

  • Azure management, monitoring, and identity-related services

  • Developer and admin tooling, including GitHub Copilot, Visual Studio Code, and Windows Admin Center

These updates may not all require emergency deployment, but they should not be deferred for a full patch cycle if the affected products are widely used or connected to sensitive workflows.

3. Regular Patch Cycle

Lower-priority updates can follow standard deployment timelines when the affected systems have limited exposure, compensating controls, or narrower exploitation paths. This may include lower-severity Windows service issues, vulnerabilities requiring local access, or systems that are not internet-facing or broadly accessible.

Even lower-priority patches should still be tracked through completion. May’s release affects a wide range of endpoint, cloud, identity, and developer environments, so delayed patching can create blind spots if teams do not maintain visibility across their full software and system inventory.

Notable Third-Party Updates

Microsoft also republished 128 non-Microsoft CVEs this month, adding another layer of patching work beyond the core Microsoft vulnerabilities. These republished issues include Chromium-based Microsoft Edge vulnerabilities, Node.js-related issues, Git for Windows vulnerabilities, and other third-party dependency updates.

For most organizations, the priority should be reviewing exposure across commonly used browsers, developer tools, and open-source components. Browser vulnerabilities are especially important because they can affect a wide user base, while developer dependencies can introduce risk into build systems, admin workflows, and cloud-connected environments.

IT teams should focus on:

  • Browser exposure, especially Microsoft Edge

  • Developer tools and dependencies

  • Git for Windows deployments

  • Node.js-related components

  • Cloud-connected third-party integrations

  • Systems using Chromium-based or open-source components

This month’s release reinforces why third-party patching should be part of the same vulnerability-management workflow as operating-system updates. Even when Microsoft CVEs get the most attention on Patch Tuesday, browsers, developer tools, and software dependencies can create meaningful exposure if they are patched separately, tracked manually, or excluded from routine endpoint management.

How Splashtop AEM Can Help

May’s Patch Tuesday release gives IT teams a lot to triage. Splashtop AEM helps teams move faster from exposure to remediation.

  • Identify Risk Quickly: Get centralized visibility into endpoint vulnerabilities, patch status, hardware, and software inventory, so teams can see which devices need attention first.

  • Prioritize Critical Updates: Use CVE insights and endpoint-level context to focus on high-risk issues, including critical vulnerabilities and those marked “Exploitation More Likely.”

  • Patch Faster: Deploy updates in real time, automate patch policies, monitor success or failure, and reduce the manual work required to keep distributed endpoints secure.

  • Strengthen Existing Workflows: Splashtop AEM helps teams that patch manually, use Microsoft Intune, or rely on an RMM by adding faster remediation, better visibility, and streamlined endpoint management.

When Patch Tuesday affects critical services, speed and visibility matter. Splashtop AEM gives IT teams the tools to respond quickly and keep endpoints protected.

Try Splashtop AEM Free

Patch Tuesday releases like May 2026 give IT teams a narrow window to identify risk, deploy updates, and confirm remediation across every endpoint.

With Splashtop AEM, you can:

  • Detect vulnerable endpoints

  • Prioritize critical CVEs

  • Automate patch deployment

  • Monitor patch success and failure

  • Strengthen security across distributed environments

Start a free trial of Splashtop AEM to gain real-time patching, CVE visibility, automation, and endpoint management tools that help your team respond faster when critical vulnerabilities are disclosed.

Get Started Now!
Try Splashtop AEM for free today
Get Started


Share This
RSS FeedSubscribe

Related Content

An IT agenct working in an office.
Patch Management

ConnectWise ScreenConnect Active Exploitation: What to Know

Learn More
Mac computers in an office.
Patch Management

Patch Management for Mac: What IT Teams Need

A small IT team working in an office.
Patch Management

Endpoint Management Priorities for Lean IT Teams

A person using a computer.
Security

What Does Active Exploitation Mean in Cybersecurity?

View All Blogs