Microsoft's May 2026 security update addresses 137 vulnerabilities, with 31 classified as critical. None of these critical vulnerabilities are currently being exploited in active attacks. Sixteen of the critical vulnerabilities involve remote code execution (RCE) issues in Microsoft products, including Microsoft Office, Microsoft Word, and Azure. Specific vulnerabilities include:
- CVE-2026-32161: A use-after-free vulnerability in the Windows Native WiFi Miniport Driver.
- CVE-2026-40358: A use-after-free vulnerability in Microsoft Office.
- CVE-2026-41089: A stack-based buffer overflow in Windows Netlogon.
Additional important vulnerabilities flagged include:
- CVE-2026-33835: Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability.
- CVE-2026-33837: Windows TCP/IP Local Elevation of Privilege Vulnerability.
- CVE-2026-35416: Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability.
Talos is releasing a new Snort ruleset to detect attempts to exploit these vulnerabilities, and users are advised to update their Cisco Security Firewalls and acquire the latest rule pack via Snort.org.