Skip to main content
COSMICBYTEZLABS
NewsSecurityHOWTOsToolsStudyTraining
ProjectsChecklistsAI RankingsNewsletterStatusTagsAbout
Subscribe

Press Enter to search or Esc to close

News
Security
HOWTOs
Tools
Study
Training
Projects
Checklists
AI Rankings
Newsletter
Status
Tags
About
RSS Feed
Reading List
Subscribe

Stay in the Loop

Get the latest security alerts, tutorials, and tech insights delivered to your inbox.

Subscribe NowFree forever. No spam.
COSMICBYTEZLABS

Your trusted source for IT intelligence, cybersecurity insights, and hands-on technical guides.

980+ Articles
124+ Guides

CONTENT

  • Latest News
  • Security Alerts
  • HOWTOs
  • Projects
  • Exam Prep

RESOURCES

  • Search
  • Browse Tags
  • Newsletter Archive
  • Reading List
  • RSS Feed

COMPANY

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CosmicBytez Labs. All rights reserved.

System Status: Operational
  1. Home
  2. News
  3. Microsoft Patches 138 Vulnerabilities Including DNS and Netlogon RCE Flaws
Microsoft Patches 138 Vulnerabilities Including DNS and Netlogon RCE Flaws
NEWS

Microsoft Patches 138 Vulnerabilities Including DNS and Netlogon RCE Flaws

Microsoft's May 2026 Patch Tuesday addresses 138 security vulnerabilities across its product portfolio, including 30 rated Critical — with notable DNS server and Netlogon remote code execution flaws that should be prioritized by enterprise teams.

Dylan H.

News Desk

May 13, 2026
5 min read

Microsoft's May 2026 Patch Tuesday brings fixes for 138 security vulnerabilities, including 30 rated Critical — with none currently listed as publicly known or under active attack. Among the most significant entries in this release are remote code execution (RCE) vulnerabilities in Windows DNS Server and the Netlogon protocol, both of which represent high-priority targets for enterprise security teams due to their position in core Windows infrastructure.

Patch Tuesday by the Numbers

SeverityCount
Critical30
Important104
Moderate3
Low1
Total138
Zero-Days (Actively Exploited)0
Zero-Days (Publicly Disclosed)0

While the absence of zero-days provides a slight reprieve for security operations teams, the 138-vulnerability scope — and the inclusion of 30 Critical-rated issues — demands urgent attention. Patch Tuesday releases without zero-days still generate exploit development activity within 24-72 hours of release.

Critical Highlights: DNS and Netlogon RCE

Windows DNS Server RCE

A remote code execution vulnerability in the Windows DNS Server component is among the most notable fixes in this release. DNS Server RCE vulnerabilities are particularly dangerous in enterprise environments because:

  • DNS servers are ubiquitous — present in virtually every Windows Active Directory environment
  • DNS Server typically runs with SYSTEM-level privileges on domain controllers
  • DNS infrastructure is network-exposed by design — clients across the enterprise reach out to DNS servers constantly
  • Exploitation can cascade: compromising a domain controller's DNS service can facilitate broader AD compromise

Organizations running Windows DNS in their AD infrastructure should prioritize this fix. DNS server RCE vulnerabilities have historically been exploited both by nation-state actors and ransomware operators targeting Active Directory environments.

Netlogon RCE

The Netlogon protocol is the authentication backbone of Windows domain environments, handling machine-to-domain authentication, pass-through authentication, and replication. An RCE vulnerability in Netlogon carries exceptional risk because:

  • Netlogon operates at the domain controller level
  • The protocol is involved in authentication for every domain-joined machine
  • Historical Netlogon vulnerabilities (e.g., Zerologon — CVE-2020-1472) became weapons of choice for ransomware operators almost immediately after disclosure

Security teams should treat Netlogon RCE patches as emergency-priority items, particularly for organizations with externally-exposed domain infrastructure or those operating in threat-dense verticals (healthcare, manufacturing, financial services).

Full Scope of the May 2026 Release

Vulnerability Categories

CategoryDescriptionPriority
Remote Code Execution (RCE)Execute arbitrary code on the targetCritical
Elevation of Privilege (EoP)Gain higher privileges on a compromised hostHigh
Security Feature BypassCircumvent security controls (Defender, SmartScreen, UAC)High
Information DisclosureExpose sensitive data from memory or filesMedium
Denial of Service (DoS)Disrupt availability of servicesMedium
SpoofingImpersonate legitimate services or identitiesMedium

Affected Product Areas

ProductSeverity
Windows Server 2019/2022/2025Critical/Important
Windows 11 (all supported versions)Critical/Important
Windows 10 (all supported versions)Critical/Important
Windows DNS ServerCritical — prioritize
NetlogonCritical — prioritize
Microsoft Edge (Chromium)Important
Microsoft Office (Word, Excel, Outlook)Important
Azure ServicesImportant
.NET Framework & Visual StudioImportant
Windows Remote Desktop ServicesImportant
Microsoft SharePoint ServerImportant
Hyper-VImportant
Windows Print SpoolerImportant

No Zero-Days — What That Means

May 2026 is one of the first Patch Tuesday releases in recent months without an actively exploited zero-day. For context, the 2026 Patch Tuesday cadence has been zero-day-heavy:

MonthExploited Zero-DaysTotal Fixes
January 20263159
February 2026667
March 2026457
April 20261168
May 20260138

No zero-days in the disclosure does not mean exploitation will not begin shortly. Security research groups routinely develop working proofs-of-concept within 24-72 hours of a Patch Tuesday release by reverse-engineering the patches themselves. The DNS and Netlogon RCE vulnerabilities in particular are likely to receive significant researcher attention given their prominence.

Prioritization Guidance

Given the 138-vulnerability scope, security teams should triage using the following framework:

PriorityCriteriaTarget Remediation
P1 — EmergencyDNS Server RCE, Netlogon RCE, any unauthenticated Critical RCE24 hours
P2 — UrgentCritical RCE with authentication or user interaction72 hours
P3 — HighImportant EoP, security feature bypass7 days
P4 — StandardImportant info disclosure, spoofing, DoS30 days

Applying May 2026 Updates

Windows Update (Workstations)

Navigate to Settings → Windows Update → Check for Updates or use PowerShell:

Install-Module PSWindowsUpdate -Force -Scope CurrentUser
Get-WindowsUpdate -Install -AcceptAll -AutoReboot

WSUS Environments

$wsus = Get-WsusServer
$scope = New-Object Microsoft.UpdateServices.Administration.UpdateScope
$scope.ApprovedStates = [Microsoft.UpdateServices.Administration.ApprovedStates]::NotApproved
$updates = $wsus.GetUpdates($scope)
$updates | Where-Object { $_.CreationDate -gt (Get-Date "2026-05-12") } | ForEach-Object {
    $_.Approve([Microsoft.UpdateServices.Administration.UpdateApprovalAction]::Install,
               $wsus.GetComputerTargetGroups()[0])
}

Verify Patch Installation

# Check for May 2026 hotfixes
Get-HotFix | Where-Object { $_.InstalledOn -gt (Get-Date "2026-05-12") } |
  Sort-Object InstalledOn -Descending | Select-Object HotFixID, InstalledOn, Description
 
# Check if reboot is pending
$rebootKey = "HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsUpdate\Auto Update\RebootRequired"
if (Test-Path $rebootKey) { Write-Host "REBOOT REQUIRED" -ForegroundColor Red }

References

  • The Hacker News — Microsoft Patches 138 Vulnerabilities Including DNS and Netlogon RCE Flaws
  • Microsoft Security Response Center — May 2026 Security Updates
  • CISA — Known Exploited Vulnerabilities Catalog
  • Related: Microsoft May 2026 Patch Tuesday — 120 Flaws, No Zero-Days
#Microsoft#Patch Tuesday#DNS#Netlogon#RCE#Windows#Security Updates#CVE

Related Articles

Microsoft May 2026 Patch Tuesday Fixes 120 Flaws, No Zero-Days

Microsoft's May 2026 Patch Tuesday delivers security updates for 120 vulnerabilities across Windows, Edge, Office, Azure, and more — with no zero-days disclosed this month, marking a notable break from the zero-day-heavy cadence seen in early 2026.

6 min read

Microsoft Releases Windows 11 OOB Hotpatch to Fix Three

Microsoft has pushed an out-of-band hotpatch (KB5084597) to Windows 11 Enterprise devices to address three integer-overflow RCE flaws in RRAS, one rated...

6 min read

Microsoft May 2026 Patch Tuesday: 137 Flaws Fixed, Zero Zero-Days

Microsoft's May 2026 Patch Tuesday addresses 137 vulnerabilities including nine critical flaws — but for the first time in two years, not a single zero-day is among them, giving administrators a rare moment of breathing room.

4 min read
Back to all News