[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$fhup-kuiEHvCmfPpigTG8YGIed3DCsta1zICdzKl8CjA":3},{"article":4,"iocs":40},{"id":5,"title":6,"slug":7,"summary":8,"ai_summary":9,"brief":10,"full_text":11,"url":12,"image_url":13,"published_at":14,"ingested_at":15,"relevance_score":16,"entities":17,"category_id":32,"category":33,"article_tags":37},"dce9a1be-d72c-4500-ad9d-b14ee9375b3a","Microsoft Patches 137 Vulnerabilities","microsoft-patches-137-vulnerabilities-b1a8bb","Fresh security updates resolve critical flaws in Azure, Windows, Dynamics 365, and the SSO Plugin for Jira & Confluence. The post Microsoft Patches 137 Vulnerabilities appeared first on SecurityWeek.","Microsoft released Patch Tuesday updates addressing 137 vulnerabilities across its product portfolio, with none currently exploited in the wild. Approximately a dozen vulnerabilities have been rated as 'exploitation more likely,' including critical flaws in the Microsoft SSO Plugin for Jira & Confluence (CVE-2026-41103) and two high-severity remote code execution bugs in Microsoft Word (CVE-2026-40364, CVE-2026-40361) that can be triggered via malicious documents in preview pane. Additional critical and high-severity issues were resolved in Windows components, Azure services, Dynamics 365, and Office suite products.","Microsoft patches 137 vulnerabilities including critical flaws in Azure, Windows, and Office products.","Microsoft on Tuesday announced patching 137 vulnerabilities across its products, none of which have been flagged as exploited in the wild. Roughly a dozen of the bugs addressed with the latest Patch Tuesday updates have an exploitability rating of ‘exploitation more likely’, indicating that threat actors could start abusing them in attacks. The most severe of these is CVE-2026-41103, a critical-severity flaw in the Microsoft SSO Plugin for Jira & Confluence that could lead to elevation of privilege. The issue is rooted in the incorrect implementation of the authentication algorithm. High-severity privilege escalation issues in Windows Remote Desktop, Windows Common Log File System Driver, Windows Kernel, Azure AI Foundry, Windows Win32k, Windows Ancillary Function Driver for WinSock, Windows TCP\u002FIP, and Windows Cloud Files Mini Filter Driver are also prone to exploitation, Microsoft says. The company also draws attention to two high-severity remote code execution defects in Microsoft Word (CVE-2026-40364 and CVE-2026-40361, CVSS score of 8.4) that are more likely to be exploited. The first is a type confusion issue, while the second is a use-after-free bug. “These flaws could be exploited by an attacker who sends a malicious document to a target,” Tenable senior staff research engineer Satnam Narang said.Advertisement. Scroll to continue reading. “The other common thread across these vulnerabilities is that a target doesn’t need to even open the document to trigger the exploit. Exploitation is possible just by viewing a malicious document in the Preview Pane. Therefore, patching is the most reliable way to protect against flaws like these,” Narang added. Two other high-severity Word weaknesses were also resolved this month, but they are less likely or unlikely to be exploited, Microsoft says. More than two dozen vulnerabilities were resolved in the Office suite. On Tuesday, Microsoft also rolled out fixes for critical-severity bugs in Dynamics 365 (on-premises), Azure Logic Apps, Windows DNS, Windows Netlogon, Windows Hyper-V, and Azure SDK. The security updates also address high-severity flaws in Copilot, .NET, Azure services, Windows kernel and kernel mode drivers, Win32K, LDAP, SQL Server, Edge, Visual Studio Code, and various Windows components and services. Adobe on Tuesday released patches for 52 vulnerabilities across 10 products, including a couple of critical-severity code execution flaws. Related: SAP Patches Critical S\u002F4HANA, Commerce Vulnerabilities Related: Cisco Patches High-Severity Vulnerabilities in Enterprise Products Related: Oracle Patches 450 Vulnerabilities With April 2026 CPU Related: Progress Patches Multiple Vulnerabilities in MOVEit WAF, LoadMaster Written By Ionut Arghire Ionut Arghire is an international correspondent for SecurityWeek. More from Ionut Arghire SAP Patches Critical S\u002F4HANA, Commerce VulnerabilitiesTanStack, Mistral AI, UiPath Hit in Fresh Supply Chain AttackSkoda Data Breach Hits Online Shop CustomersSailPoint Discloses GitHub Repository HackCheckmarx Jenkins AST Plugin Compromised in Supply Chain AttackResurrected ‘Crimenetwork’ Marketplace Taken Down, Administrator ArrestedOver 500 Organizations Hit in Years-Long Phishing CampaignAI Firm Braintrust Prompts API Key Rotation After Data Breach Latest News Exaforce Raises $125 Million for Agentic SOC PlatformAdobe Patches 52 Vulnerabilities in 10 ProductsWhite Circle Raises $11 Million for AI Control PlatformBWH Hotels Says Hackers Had Access to Reservation Data for 6 MonthsFree OnlyFans Lure Used to Spread Cross-Platform CRPx0 MalwareDeal Reached With Hackers to Delete Data Stolen From the Canvas Educational PlatformWest Pharmaceutical Services Hit by Disruptive Ransomware AttackApple Patches Dozens of Vulnerabilities in macOS, iOS Trending Daily Briefing NewsletterSubscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts. Webinar: ROSI for CPS Security Programs May 13, 2026 In cyber-physical systems (CPS), just one hour of downtime can outweigh an entire annual security budget. Learn how to master the Return on Security Investment (ROSI) to align security goals with the bottom-line priorities. Register Virtual Event: Threat Detection and Incident Response Summit May 20, 2026 Delve into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization. Register People on the MoveMalwarebytes has named Chung Ip as Chief Financial Officer.Semperis has appointed John Podboy as Chief Information Security Officer.Randy Menon has become Chief Product and Marketing Officer at One Identity.More People On The MoveExpert Insights Is the SOC Obsolete, and We Just Haven’t Admitted It Yet? Many AI-first enterprises have already embraced sovereign architectures for general AI initiatives; cybersecurity—and the SOC—should be next. (Danelle Au) The Mythos Moment: Enterprises Must Fight Agents with Agents Only with the right platform and an agentic, AI-driven defense, will enterprises be able to protect themselves in the agentic era. (Etay Maor) Why Cybersecurity Must Rethink Defense in the Age of Autonomous Agents From autonomous code generation to decision-making systems that initiate actions without human intervention, the industry is entering a new phase. (Torsten George) Government Can’t Win the Cyber War Without the Private Sector Securing national resilience now depends on faster, deeper partnerships with the private sector. (Steve Durbin) The Hidden ROI of Visibility: Better Decisions, Better Behavior, Better Security Beyond monitoring and compliance, visibility acts as a powerful deterrent, shaping user behavior, improving collaboration, and enabling more accurate, data-driven security decisions. (Joshua Goldfarb) Flipboard Reddit Whatsapp Whatsapp Email","https:\u002F\u002Fwww.securityweek.com\u002Fmicrosoft-patches-137-vulnerabilities\u002F","https:\u002F\u002Fwww.securityweek.com\u002Fwp-content\u002Fuploads\u002F2025\u002F10\u002FWindows-10.jpeg","2026-05-12T18:07:39+00:00","2026-05-12T20:00:22.581804+00:00",9,[18,21,24,26,28,30],{"name":19,"type":20},"Microsoft","vendor",{"name":22,"type":23},"Windows","product",{"name":25,"type":23},"Azure",{"name":27,"type":23},"Microsoft Office",{"name":29,"type":23},"Dynamics 365",{"name":31,"type":23},"Microsoft Word","80544778-fabb-4dcd-aa35-17492e5dcf4f",{"id":32,"icon":34,"name":35,"slug":36},null,"Vulnerabilities","vulnerabilities",[38],{"category":39},{"id":32,"icon":34,"name":35,"slug":36},[41,45,48],{"type":42,"value":43,"context":44},"cve","CVE-2026-41103","Critical-severity privilege escalation in Microsoft SSO Plugin for Jira & Confluence due to incorrect authentication algorithm implementation",{"type":42,"value":46,"context":47},"CVE-2026-40364","High-severity remote code execution in Microsoft Word (type confusion issue, CVSS 8.4)",{"type":42,"value":49,"context":50},"CVE-2026-40361","High-severity remote code execution in Microsoft Word (use-after-free bug, CVSS 8.4)"]