Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Microsoft Fixes 17 Critical Flaws in May Patch Tuesday

May 14, 2026

DAEMON Tools Supply Chain Attack Compromises Official Installers with Malware

May 14, 2026

Ransomware: Over Half of CISOs Would Consider Paying Ransom to Hackers

May 13, 2026
Facebook X (Twitter) Instagram
Thursday, May 14
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»Microsoft Fixes 17 Critical Flaws in May Patch Tuesday
News

Microsoft Fixes 17 Critical Flaws in May Patch Tuesday

Team-CWDBy Team-CWDMay 14, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


Microsoft has published security updates to fix 120 CVEs in the May Patch Tuesday, 16 of which were discovered by a new multi-model agentic security system.

The overall list included 17 critical vulnerabilities, 14 of which were classed as remote code execution (RCE), two were elevation of privilege (EoP) flaws and one was an information disclosure vulnerability.

In total, the majority of the 120 CVEs listed were EoP (61), RCE (31) and information disclosure (14).

Read more on Patch Tuesday: Microsoft Fixes Two Zero-Days in April Patch Tuesday

Adam Barnett, principal software engineer at Rapid7, urged “anyone responsible for securing a domain controller” to prioritize CVE-2026-41089 for remediation.

It’s a critical stack-based buffer overflow in Windows Netlogon with a CVSS v3 base score of 9.8 which could give attackers system privileges on the domain controller, Barnett warned.

“For most pentesters, that’s the point at which the customer report more or less writes itself,” he continued. “No privileges or user interaction are required, and attack complexity is low, which suggests that creation of a reliable exploit might not be especially difficult for anyone with knowledge of the specific mechanism.”

Also top of mind for sysadmins should be CVE-2026-41096 – a critical RCE in the Windows DNS client implementation with a CVSS score of 9.8.

“Because DNS is a core networking service used across enterprise environments, exploitation could impact a large number of systems rapidly,” warned Action1 director of vulnerability research, Jack Bicer. “Successful attacks may lead to widespread endpoint compromise, ransomware deployment, credential harvesting, and operational disruption across corporate networks.” 

Bicer also flagged CVE-2026-42898, a critical RCE bug in Microsoft Dynamics 365 On-Premises. It could allow an authenticated attacker with low privileges to execute malicious code over the network by manipulating process session data within Dynamics CRM.

“With no user interaction required, and the potential to impact systems beyond the vulnerable component’s original security scope, this vulnerability poses serious enterprise risk,” he continued. “An attacker with only basic access could turn a business application server into a remote execution platform.”

The Benefits of AI-Powered Vulnerability Research

Rapid7’s Barnett noted that Microsoft’s Windows Attack Research and Protection (WARP) team is credited with multiple critical vulnerabilities. “We can speculate that they likely know a great deal about the current state of AI-powered vulnerability research as it applies to Microsoft products,” he suggested.

Microsoft explained in a blog post published on 12 May how WARP collaborated with the firm’s Autonomous Code Security (ACS) on a new agentic AI initiative which discovered 16 CVEs listed in this month’s Patch Tuesday.

Taesoo Kim, VP of agentic security at Microsoft, explained that the new “agentic security harness” system, codenamed MDASH, uses over 100 specialized agents across multiple models to find novel vulnerabilities.

“The multi-model agentic scanning harness runs a configurable panel of models. That includes SOTA models as the heavy reasoner, distilled models as a cost-effective debater for high-volume passes, and a second separate SOTA model as an independent counterpoint,” he said.

“Disagreement between models is itself a signal: when an auditor flags something as suspect and the debater can’t refute it, that finding’s posterior credibility goes up.”



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleDAEMON Tools Supply Chain Attack Compromises Official Installers with Malware
Team-CWD
  • Website

Related Posts

News

DAEMON Tools Supply Chain Attack Compromises Official Installers with Malware

May 14, 2026
News

Ransomware: Over Half of CISOs Would Consider Paying Ransom to Hackers

May 13, 2026
News

China-Linked UAT-8302 Targets Governments Using Shared APT Malware Across Regions

May 13, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Target Crypto Firms with ClickFix and Zoom Lures

April 29, 202610 Views

Why SOC Burnout Can Be Avoided: Practical Steps

November 14, 20259 Views

Cyber M&A Roundup: Cyber Giants Strengthen AI Security Offerings

December 1, 20258 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Target Crypto Firms with ClickFix and Zoom Lures

April 29, 202610 Views
Our Picks

Mobile app permissions (still) matter more than you may think

February 27, 2026

Drowning in spam or scam emails lately? Here’s why

January 27, 2026

Is it OK to let your children post selfies online?

February 17, 2026

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.