Normal view
Windows 11 KB5089549 & KB5087420 cumulative updates released
Microsoft May 2026 Patch Tuesday fixes 120 flaws, no zero-days
-
CyberScoop
- Microsoft addresses 137 vulnerabilities in Mayโs Patch Tuesday, including 13 rated critical
Microsoft addresses 137 vulnerabilities in Mayโs Patch Tuesday, including 13 rated critical
Microsoft addressed another triple-digit batch of vulnerabilities cutting across its various enterprise products, components and underlying systems. Yet despite the high number of defects, the vendor reported no actively exploited zero-days in this monthโs Patch Tuesday update.
Thirteen of the 137 vulnerabilities Microsoft disclosed were assigned critical CVSS ratings, including a pair of vulnerabilities affecting Azure โ CVE-2026-33109 and CVE-2026-42823 โ and CVE-2026-42898 in Microsoft Dynamics 365 with 9.9 CVSS scores.ย
The company designated 13 vulnerabilities as more likely to be exploited, and 113 defects as less likely or unlikely to be exploited.
The high volume of vulnerabilities reflects a growing trend researchers have been anticipating as artificial intelligence models are deployed to find previously uncovered defects in code.ย
While not all of these bugs were found by AI, itโs likely they had an AI-related component โ even if it was just AI writing the submission,โ Dustin Childs, head of threat awareness at Trend Microโs Zero Day Initiative, wrote in a blog post Tuesday.
Childs was especially intrigued by CVE-2026-41096, which he described as a โnasty-looking bugโ in Microsoft Windows DNS that allows unauthorized attackers to run code remotely.ย
โNo authentication or user interaction needed, and since the DNS Client runs on virtually every Windows machine, the attack surface is enormous. An attacker with a position to influence DNS responses could achieve unauthenticated remote-code execution across your enterprise,โ he added.ย
Childs also described CVE-2026-41089, a Windows Netlogon defect that allows unauthenticated remote attackers to run code, as the โhighest-impact bug that requires immediate patching,โ adding that a โcompromised domain controller is a compromised domain.โ
Jack Bicer, director of vulnerability research at Action1, called out CVE-2026-42898, the critical vulnerability affecting Microsoft Dynamics 365.ย
โWith no user interaction required, and the potential to impact systems beyond the vulnerable componentโs original security scope, this vulnerability poses serious enterprise risk: an attacker with only basic access could turn a business application server into a remote execution platform,โ he said in a blog post.
โCompromise of Dynamics 365 infrastructure can expose customer records, operational workflows, financial information, and integrated business systems. Since CRM environments often connect with identity services, databases, and enterprise applications, successful exploitation could lead to broader organizational compromise and operational disruption,โ Bicer added.
The full list of vulnerabilities addressed this month is available in Microsoftโs Security Response Center.
The post Microsoft addresses 137 vulnerabilities in Mayโs Patch Tuesday, including 13 rated critical appeared first on CyberScoop.
Microsoft Patches 137 Vulnerabilities
Fresh security updates resolve critical flaws in Azure, Windows, Dynamics 365, and the SSO Plugin for Jira & Confluence.
The post Microsoft Patches 137 Vulnerabilities appeared first on SecurityWeek.
Patch Tuesday, May 2026 Edition
Artificial intelligence platforms may be just as susceptible to social engineering as human beings, but they are proving remarkably good at finding security vulnerabilities in human-made computer code. That reality is on full display this month with some of the more widely-used software makers โ including Apple, Google, Microsoft, Mozilla and Oracle โ fixing near record volumes of security bugs, and/or quickening the tempo of their patch releases.
As it does on the second Tuesday of every month, Microsoft today released software updates to address at least 118 security vulnerabilities in its various Windows operating systems and other products. Remarkably, this is the first Patch Tuesday in nearly two years that Microsoft is not shipping any fixes to deal with emergency zero-day flaws that are already being exploited. Nor have any of the flaws fixed today been previously disclosed (potentially giving attackers a heads up in how to exploit the weakness).
Sixteen of the vulnerabilities earned Microsoftโs most-dire โcriticalโ label, meaning malware or miscreants could abuse these bugs to seize remote control over a vulnerable Windows device with little or no help from the user. Rapid7 has done much of the heavy lifting in identifying some of the more concerning critical weaknesses this month, including:
- CVE-2026-41089: A critical stack-based buffer overflow in Windows Netlogon that offers an attacker SYSTEM privileges on the domain controller. No privileges or user interaction are required, and attack complexity is low. Patches are available for all versions of Windows Server from 2012 onwards.
- CVE-2026-41096: A critical RCE in the Windows DNS client implementation worthy of attention despite Microsoft assessing exploitation as less likely.
- CVE-2026-41103: A critical elevation of privilege vulnerability that allows an unauthorized attacker to impersonate an existing user by presenting forged credentials, thus bypassing Entra ID. Microsoft expects that exploitation is more likely.
Mayโs Patch Tuesday is a welcome respite from April, which saw Microsoft fix a near-record 167 security flaws. Microsoft was among a few dozen tech giants given access to a โProject Glasswing,โ a much-hyped AI capability developed by Anthropic that appears quite effective at unearthing security vulnerabilities in code.
Apple, another early participant in Project Glasswing, typically fixes an average of 20 vulnerabilities each time it ships a security update for iOS devices, said Chris Goettl, vice president of product management at Ivanti. On May 11, Apple shipped iOS 15, which addressed at least 52 vulnerabilities and backported the changes all the way to iPhone 6s and iOS 15.
Last month, Mozilla released Firefox 150, which resolved a whopping 271 vulnerabilities that were reportedly discovered during the Glasswing evaluation.
โSince Firefox 150.0.0 released, they have been on a more aggressive weekly cadence for security updates including the release of Firefox 150.0.3 on May Patch Tuesday resolving between three to five CVEs in each release,โ Goettl said.
The software giant Oracle likewise recently increased its patch pace in response to their work with Glasswing. In its most recent quarterly patch update, Oracle addressed at least 450 flaws, including more than 300 fixes for remotely exploitable, unauthenticated flaws. But at the end of April, Oracle announced it was switching to a monthly update cycle for critical security issues.
On May 8, Google started rolling out updates to its Chrome browser that fixed an astonishing 127 security flaws (up from just 30 the previous month). Chrome automagically downloads available security updates, but installing them requires fully restarting the browser.
If you encounter any weirdness applying the updates from Microsoft or any other vendor mentioned here, feel free to sound off in the comments below. Meantime, if you havenโt backed up your data and/or drive lately, doing that before updating is generally sound advice. For a more granular look at the Microsoft updates released today, checkout this inventory by the SANS Internet Storm Center.
VS Code Update Added Copilot As Default Co-Author To Git Commits
Read more of this story at Slashdot.
Microsoft Warns of Sophisticated Phishing Campaign Targeting US Organizations
The malicious emails claim to contain a conduct report and lure victims to a Microsoft phishing website that leverages AitM.
The post Microsoft Warns of Sophisticated Phishing Campaign Targeting US Organizations appeared first on SecurityWeek.
Microsoft confirms April Windows updates cause backup failures
Microsoft Defender wrongly flags DigiCert certs as Trojan:Win32/Cerdigent.A!dha
Microsoft tests modern Windows Run, says it's faster than legacy dialog
Microsoft fixes Remote Desktop warnings displaying incorrectly
Microsoft now lets admins choose pre-installed Store apps to uninstall
Windows 11 KB5083631 update released with 34 changes and fixes
April KB5083769 Windows 11 update causes backup software failures
CISA orders feds to patch Windows flaw exploited as zero-day
Rep. Delia Ramirez takes over as top House cybersecurity Dem
Illinois Rep. Delia Ramirez is taking over as the top Democrat on the House Homeland Security panelโs cybersecurity subcommittee, replacing former Rep. Eric Swalwell after his resignation.
Committee Democrats approved the change Tuesday at a meeting prior to a โshadow hearingโ without the GOP majority, focused on protecting elections from Trump administration interference.
Ramirez first won election to Congress in 2022 and was reelected in 2024. She has served as the vice ranking member of the committee since 2023. She is now the ranking member of the Subcommittee on Cybersecurity and Infrastructure Protection.
She has leveled criticisms during committee hearings about the Trump administrationโs personnel cutbacks at the Cybersecurity and Infrastructure Security Agency, and was critical of how data was secured under the administrationโs Department of Government Efficiency initiative led by Elon Musk.
โUnder a Musk and Trump presidency, itโs clear that the security of Americansโ information is not a priority. I mean, a private civilian with no security clearance bullied his way into the Treasury, set up private servers, and stole sensitive information from an agency. If that isnโt a national security crisis, a cybersecurityย crisis โthen I donโt know what is,โ Ramirez said at an early 2025 hearing. โThe true threat to our homeland security is โfElonโ Musk, Trump, and their blatant misuse of power to steal information and coerce employees to leave agencies.โ
She cosponsored legislation last year meant to strengthen the cybersecurity workforce by promoting measures to help workers from underrepresented and disadvantaged communities to join the field.
But she also had criticisms of U.S. cybersecurity under the Biden administration, including of Microsoftโs role in the SolarWinds breach.
In a statement about her appointment Tuesday, Ramirez took aim at at Trump, Vice President JD Vance, Department of Homeland Security Secretary Markwayne Mullin and White House homeland security adviser Stephen Miller.
โItโs clear that the security of our communitiesโ information, federal networks, and critical infrastructure have not been prioritiesโ under them, she said. โBetween the security failures of DOGE, the abuses of immigrant familiesโ data, and the decimation of CISAโs workforce and resources, Republicans have demonstrated a lack of interest in safeguarding our nationโs cybersecurity and our residentsโ civil rights and privacy. In neglecting necessary oversight, Republicans have deregulated emerging technologies, allowed bad actors to profit from violations of our civil rights, and consented to the weaponization of government systems. It is more critical than ever that we assert our Congressional authority and disrupt the blatant corruption making us all less safe.โ
Swalwell left the position following his resignation from Congress as a representative from California amid allegations of sexual misconduct.
Her ascension completes a full leadership turnover for the subcommittee. Rep. Andy Ogles, R-Tenn., took over the gavel late last year after former chairman Andrew Garbarino, R-N.Y., took over as chairman of the full committee.
The subcommittee is set to hold a hearing Wednesday on CISA and its role as the sector risk management agency for a number of critical infrastructure sectors.
Updated 4/28/26: to include comment from Ramirez.
The post Rep. Delia Ramirez takes over as top House cybersecurity Dem appeared first on CyberScoop.