On-demand webinar: Building a secure and employee-centric digital workplace

WATCH NOW

Microsoft Patch Tuesday May 2026 - Summary

94

Patches

120

Vulnerabilities

33

Articles

7

Impacts

CVE Index for May 2026 Patch Tuesday Updates

Vulnerable ComponentImpactCVE ID
Microsoft Dynamics 365 On-PremisesRemote Code ExecutionCVE-2026-42898
Microsoft OfficeRemote Code ExecutionCVE-2026-42831
Microsoft SSO Plugin for Jira & ConfluenceElevation of PrivilegeCVE-2026-41103
Windows DNS ClientRemote Code ExecutionCVE-2026-41096
Windows NetlogonRemote Code ExecutionCVE-2026-41089
Windows Graphics ComponentRemote Code ExecutionCVE-2026-40403
Windows Hyper-VElevation of PrivilegeCVE-2026-40402
Microsoft WordRemote Code ExecutionCVE-2026-40367
Microsoft WordRemote Code ExecutionCVE-2026-40366
Microsoft SharePoint ServerRemote Code ExecutionCVE-2026-40365
Microsoft WordRemote Code ExecutionCVE-2026-40364
Microsoft OfficeRemote Code ExecutionCVE-2026-40363
Microsoft WordRemote Code ExecutionCVE-2026-40361
Microsoft OfficeRemote Code ExecutionCVE-2026-40358
Windows GDIRemote Code ExecutionCVE-2026-35421
Windows Native WiFi Miniport DriverRemote Code ExecutionCVE-2026-32161
No Zero-Day CVE for this Patch Tuesday
CVE IDSeverityImpact
CVE-2026-42896ImportantElevation of Privilege
CVE-2026-41097ImportantSecurity Feature Bypass
CVE-2026-41094ImportantRemote Code Execution
CVE-2026-42833ImportantRemote Code Execution
CVE-2026-41088ImportantElevation of Privilege
CVE-2026-41086ImportantElevation of Privilege
CVE-2026-40415ImportantRemote Code Execution
CVE-2026-40414ImportantDenial of Service
CVE-2026-40413ImportantDenial of Service
CVE-2026-40410ImportantElevation of Privilege
CVE-2026-40408ImportantElevation of Privilege
CVE-2026-40407ImportantElevation of Privilege
CVE-2026-40406ImportantInformation Disclosure
CVE-2026-40405ImportantDenial of Service
CVE-2026-40401ImportantDenial of Service
CVE-2026-40399ImportantElevation of Privilege
CVE-2026-40398ImportantElevation of Privilege
CVE-2026-40397ImportantElevation of Privilege
CVE-2026-40382ImportantElevation of Privilege
CVE-2026-40380ImportantRemote Code Execution
CVE-2026-40377ImportantElevation of Privilege
CVE-2026-40369ImportantElevation of Privilege
CVE-2026-42825ImportantElevation of Privilege
CVE-2026-35438ImportantElevation of Privilege
CVE-2026-35424ImportantDenial of Service
CVE-2026-35423ImportantInformation Disclosure
CVE-2026-35422ImportantSecurity Feature Bypass
CVE-2026-35420ImportantElevation of Privilege
CVE-2026-35419ImportantInformation Disclosure
CVE-2026-35418ImportantElevation of Privilege
CVE-2026-35417ImportantElevation of Privilege
CVE-2026-35416ImportantElevation of Privilege
CVE-2026-35415ImportantElevation of Privilege
CVE-2026-34351ImportantElevation of Privilege
CVE-2026-34350ImportantDenial of Service
CVE-2026-34347ImportantElevation of Privilege
CVE-2026-34345ImportantElevation of Privilege
CVE-2026-34344ImportantElevation of Privilege
CVE-2026-34343ImportantElevation of Privilege
CVE-2026-34342ImportantElevation of Privilege
CVE-2026-34341ImportantElevation of Privilege
CVE-2026-34340ImportantElevation of Privilege
CVE-2026-34339ImportantDenial of Service
CVE-2026-34338ImportantElevation of Privilege
CVE-2026-34337ImportantElevation of Privilege
CVE-2026-34336ImportantInformation Disclosure
CVE-2026-34334ImportantElevation of Privilege
CVE-2026-34333ImportantElevation of Privilege
CVE-2026-34332ImportantRemote Code Execution
CVE-2026-34331ImportantElevation of Privilege
CVE-2026-34330ImportantElevation of Privilege
CVE-2026-34329ImportantRemote Code Execution
CVE-2026-33841ImportantElevation of Privilege
CVE-2026-33840ImportantElevation of Privilege
CVE-2026-33839ImportantElevation of Privilege
CVE-2026-33838ImportantElevation of Privilege
CVE-2026-33837ImportantElevation of Privilege
CVE-2026-33835ImportantElevation of Privilege
CVE-2026-33834ImportantElevation of Privilege
CVE-2026-32209ImportantSecurity Feature Bypass
CVE-2026-32170ImportantElevation of Privilege
CVE-2026-21530ImportantElevation of Privilege
CVE IDSeverityImpact
CVE-2026-41102ImportantSpoofing
CVE-2026-41101ImportantSpoofing
CVE-2026-40421ImportantInformation Disclosure
CVE-2026-40420ImportantElevation of Privilege
CVE-2026-40419ImportantElevation of Privilege
CVE-2026-40418ImportantElevation of Privilege
CVE-2026-42832ImportantSpoofing
CVE-2026-40370ImportantRemote Code Execution
CVE-2026-40368ImportantRemote Code Execution
CVE-2026-40362ImportantRemote Code Execution
CVE-2026-40360ImportantInformation Disclosure
CVE-2026-40359ImportantRemote Code Execution
CVE-2026-40357ImportantRemote Code Execution
CVE-2026-35440ImportantInformation Disclosure
CVE-2026-35439ImportantRemote Code Execution
CVE-2026-35436ImportantElevation of Privilege
CVE-2026-33112ImportantRemote Code Execution
CVE-2026-33110ImportantRemote Code Execution
CVE-2026-32185ImportantSpoofing
CVE IDSeverityImpact
CVE-2026-42899ImportantDenial of Service
CVE-2026-41613ImportantElevation of Privilege
CVE-2026-41612ImportantInformation Disclosure
CVE-2026-41611ImportantRemote Code Execution
CVE-2026-35433ImportantElevation of Privilege
CVE-2026-41610ImportantSecurity Feature Bypass
CVE-2026-32177ImportantElevation of Privilege
CVE-2026-32175ImportantTampering
CVE-2026-41109ImportantSecurity Feature Bypass
CVE IDSeverityImpact
CVE-2026-40381ImportantElevation of Privilege
CVE-2026-42830ImportantElevation of Privilege
CVE-2026-42823ImportantElevation of Privilege
CVE-2026-33833ImportantSpoofing
CVE-2026-33117ImportantSecurity Feature Bypass
CVE-2026-32204ImportantElevation of Privilege
Vulnerable ComponentCVE IDSeverityImpact
Data DeduplicationCVE-2026-41095ImportantElevation of Privilege
Microsoft 365 Copilot for AndroidCVE-2026-41100ImportantSpoofing
Microsoft Outlook for iOSCVE-2026-42893ImportantTampering
Microsoft Power Automate DesktopCVE-2026-40374ImportantInformation Disclosure
OpenTelemetry-Go multi-value `baggage` header extraction causes excessive allocations (remote dos amplification)CVE-2026-29181ImportantSecurity Vulnerability
M365 Copilot for DesktopCVE-2026-41614ImportantSpoofing
Microsoft Dynamics 365 Business CentralCVE-2026-40417ImportantElevation of Privilege

Previous Patch Tuesday Updates and Fixes

Microsoft Windows Patch Tuesday - Overview

What is Patch Tuesday?

Patch Tuesday or Update Tuesday is the common name for the second Tuesday of every month when Microsoft releases security updates for its operating system and other software. Coinciding with the Patch Tuesday, several other vendors such as Oracle, Mozilla, Adobe, and many others roll out updates for the third-party applications.

When is Patch Tuesday?

Patch Tuesday falls on the second Tuesday of each month. The upcoming Patch Tuesday is on Jun 16, 2026.

What is patching and why is it important?

Patches are nothing but pieces of software code that are written to fix a bug in a software application, that might lead to a vulnerability. Such vulnerabilities in any application are loop holes for attackers to get their hands on business critical data and information. So it is highly crucial to keep all the applications in a network updated to its latest versions. Updating applications in mobile phones and laptops also work in the same manner by preventing theft of personal data, through security flaws.

What kind of patch updates are released during Patch Tuesday?

Predominantly security patch updates of varying severity like Critical, Important, Moderate & Low are labeled and released. Effective Windows patch management involves prioritizing these based on severity, automating deployment, and ensuring rollback or compatibility testing. It is always a best practice to prioritize your patching based on the severity level mentioned.

What are CVE IDs?

CVE ID - Common Vulnerabilities and Exposure ID is a format in which each vulnerability is disclosed and cataloged in the National Vulnerability Database (NVD). You can look up for a detailed explanation of each vulnerability in the NVD with the help of CVE ID. In Patch Manager Plus you can make use of these CVE IDs to fetch the appropriate patches to deploy. You can find the CVE IDs here.

How to register for ManageEngine's Free Patch Tuesday webinar?

The upcoming Free Patch Tuesday webinar by ManageEngine is scheduled on -. You can make your registrations here.

Where can I find more details about individual bulletins?

Each CVE ID listed in the CVE Index section has been linked to its security advisory.