Canadian Cyber Security Journal
SOCIAL:
Filed under: TechTalk

Microsoft May 2026 Patch Tuesday: 120 Vulnerabilities, 29 Critical RCEs, and a June 26 Secure Boot Deadline

What Happened

Microsoft released its May 2026 Patch Tuesday security update on May 12, addressing 120 vulnerabilities across Windows, Office, Azure, developer tools, and Microsoft 365 applications. Twenty-nine of these flaws are rated Critical, with 14 classified as Remote Code Execution vulnerabilities. No zero-days were exploited in the wild or publicly disclosed at release time.

Among the highest-severity issues, CVE-2026-41089 affects Windows Netlogon with a CVSS score of 9.8 and allows unauthenticated remote code execution. Multiple Office and Word vulnerabilities — including CVE-2026-42831, CVE-2026-40363, and CVE-2026-40358 — enable RCE through malicious file attachments, and several are exploitable via the preview pane without the user opening the file. CVE-2026-41103 targets Microsoft’s SSO Plugin for Jira and Confluence (CVSS 9.1), allowing attackers to forge identities without Entra ID authentication.

May 12 also marks a secondary deadline: it is the final comfortable deployment window before the critical Secure Boot certificate expiration date of June 26, 2026. Organizations that miss the May patch cycle will face compressing timelines and risk boot failures if Secure Boot updates are not applied before that date.

Why This Matters for Canadian Organizations

Canadian enterprises running Microsoft 365, Windows Server, and Office environments — which represents the majority of mid-to-large organizations and federal departments — face a broad attack surface from this update cycle. The Netlogon CVE-2026-41089 is particularly significant for organizations running Windows Server as a domain controller, as unauthenticated network-level exploitation requires no user interaction. Federal government agencies and Crown corporations relying on Active Directory-based authentication are directly in scope.

The Office preview-pane RCEs are operationally dangerous in organizations where email filtering is the primary defence. If a malicious attachment reaches a user’s inbox and they preview it without opening, exploitation completes. This attack vector does not require elevated privileges or social engineering beyond delivering the email.

Canadian security operations teams should also flag the Secure Boot deadline in their forward planning. The June 26 certificate expiration is a hard date: systems not updated in time face potential boot failures when the old certificates are revoked. For organizations managing large Windows fleets, this creates a patch urgency beyond the normal monthly cycle.

What to Do

Deploy the May 2026 Patch Tuesday update across all Windows endpoints, servers, and Office installations this week. Prioritize CVE-2026-41089 (Netlogon) on domain controllers and CVE-2026-41103 on any systems using the Microsoft SSO Plugin for Jira or Confluence. Disable Office preview-pane rendering for untrusted attachments as a temporary control if patching cannot complete immediately. Book the June 26 Secure Boot deadline in your change management calendar now — it is not optional. Full details are available at BleepingComputer and Tenable.

Enjoy this article? Don’t forget to share.