Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

Microsoft Patches 137 Vulnerabilities

0
Critical
Vulnerabilitywindows
Published: Tue May 12 2026 (05/12/2026, 18:07:39 UTC)
Source: SecurityWeek

Description

Microsoft released security updates addressing 137 vulnerabilities across multiple products including Azure, Windows, Dynamics 365, and the SSO Plugin for Jira & Confluence. Among these, a critical elevation of privilege flaw in the Microsoft SSO Plugin for Jira & Confluence was highlighted, along with several high-severity privilege escalation and remote code execution vulnerabilities in Windows components and Microsoft Word. Some vulnerabilities have an exploitability rating indicating exploitation is more likely, though none have been reported exploited in the wild. The updates also cover critical and high-severity issues in other Microsoft products such as Dynamics 365, Azure Logic Apps, and Windows kernel components. Patching is emphasized as the most reliable protection against these flaws.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 05/12/2026, 18:21:31 UTC

Technical Analysis

Microsoft's May 2026 Patch Tuesday addresses 137 vulnerabilities spanning Azure, Windows, Dynamics 365, and the SSO Plugin for Jira & Confluence. The most critical is CVE-2026-41103, an elevation of privilege vulnerability in the SSO Plugin caused by improper authentication algorithm implementation. Multiple high-severity privilege escalation flaws affect Windows Remote Desktop, kernel components, and Azure services. Two high-severity remote code execution vulnerabilities in Microsoft Word (CVE-2026-40364 and CVE-2026-40361) involve type confusion and use-after-free bugs, exploitable by sending malicious documents, even via Preview Pane without opening. Additional fixes cover critical bugs in Dynamics 365 on-premises, Azure Logic Apps, Windows DNS, Netlogon, Hyper-V, and other Windows and Azure components. Microsoft has not reported any active exploitation of these vulnerabilities but notes some have a higher likelihood of exploitation.

Potential Impact

The vulnerabilities include critical elevation of privilege and remote code execution flaws that could allow attackers to gain unauthorized access or execute arbitrary code. The Microsoft Word vulnerabilities could be exploited by sending malicious documents that trigger code execution upon previewing. High-severity privilege escalation bugs in core Windows components and Azure services could enable attackers to elevate privileges and compromise affected systems. No active exploitation has been reported, but some vulnerabilities have an increased likelihood of being exploited in the near future.

Mitigation Recommendations

Microsoft has released official patches addressing all 137 vulnerabilities. Applying these security updates is the most reliable mitigation to protect affected systems. Since this is a traditional software product update (not a cloud service), organizations must deploy the patches promptly. There is no indication from Microsoft that any vulnerabilities are already mitigated or require no action. Monitoring vendor advisories for further updates is recommended.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Article Source
{"url":"https://www.securityweek.com/microsoft-patches-137-vulnerabilities/","fetched":true,"fetchedAt":"2026-05-12T18:21:22.985Z","wordCount":1011}

Threat ID: 6a036fa2cbff5d86100cb9a4

Added to database: 5/12/2026, 6:21:22 PM

Last enriched: 5/12/2026, 6:21:31 PM

Last updated: 5/13/2026, 1:50:52 AM

Views: 26

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses