AI Strategy, Cybersecurity, Compliance Automation & Microsoft 365 Managed IT for Security-First Financial Institutions | ABT Blog

May 2026 Patch Tuesday: Netlogon + DNS RCEs Banks Must Patch Now

Written by Justin Kirsch | Sat, May 23, 2026

Microsoft's May 2026 Patch Tuesday is large, quiet, and dangerous. Quiet because none of the 137 vulnerabilities Microsoft addressed in the May 13 release cycle were exploited in the wild before patches landed, and none had been publicly disclosed in advance of the update. Dangerous because the most serious two flaws sit in the parts of Windows that every financial institution is exposed to whether they realize it or not: the Netlogon service on domain controllers, and the DNS client on every Windows endpoint and server in the fleet.

Both vulnerabilities carry a CVSS base score of 9.8 out of 10. Both allow an unauthenticated attacker on the network to execute code on a vulnerable Windows system without any user interaction. Microsoft assesses real-world exploitation of both as "less likely" today, but Rapid7's published analysis observes that this exploitability rating is given without justification, and that the Netlogon flaw offers an attacker more immediate control of a domain controller than the much-discussed ZeroLogon vulnerability of 2020 did.

This article walks through what Microsoft published on May 13, why the Netlogon and DNS Client critical remote code execution flaws specifically matter to banks, credit unions, and mortgage companies running Microsoft 365 and Active Directory, what financial institutions should verify in the Microsoft Intune admin center this week, and how ABT's Guardian operating model handles the rollout so that the IT director's calendar reflects a 30-minute compliance review, not a 30-hour scramble. Every number, every CVE identifier, and every configuration path in this article traces to a Microsoft canonical source, NVD, or a respected security analyst publication. The footnotes for each section live in the cited primary sources, not in this article body.

137
vulnerabilities patched in Microsoft's May 2026 Patch Tuesday release, including 17 rated Critical. Fourteen of the seventeen Critical flaws are remote code execution, and two of them sit at the heart of Active Directory and DNS resolution on every Windows fleet.
Sources: Microsoft MSRC May 2026 release note; Rapid7 May 2026 Patch Tuesday analysis (May 13, 2026); SecurityBrief AU (May 13, 2026); SANS Internet Storm Center (May 13, 2026).

TL;DR for Banks, Credit Unions, and Mortgage Companies

  • Patch domain controllers first. CVE-2026-41089 is a critical pre-authentication remote code execution flaw in Windows Netlogon affecting every supported Windows Server version from 2012 onward.
  • Patch all Windows endpoints second. CVE-2026-41096 is a critical remote code execution flaw in the Windows DNS Client that can be triggered by a malicious DNS response, with no user interaction.
  • Verify deployment in Microsoft Intune within seven days. The Windows Update for Business compliance dashboard inside the Microsoft Intune admin center is the canonical surface for confirming May 2026 cumulative update coverage across your fleet.
  • Sixteen of this month's flaws came from Microsoft's new MDASH AI system. This is Microsoft's first public showcase of large-scale AI-discovered Windows vulnerabilities, and it changes how often this kind of bulk discovery is likely to happen.
  • Customers under ABT's Guardian operating model receive this patching cycle as a managed service. Microsoft Intune ring policies, Microsoft Defender XDR coverage, and Microsoft Sentinel detection rules are configured, monitored, and verified for you.

What Microsoft Shipped on May 13, 2026

The May 2026 Patch Tuesday bulletin from the Microsoft Security Response Center addresses 137 Microsoft vulnerabilities, the largest single-month Microsoft release in 2026 so far. Seventeen of those vulnerabilities are rated Critical: fourteen are remote code execution, two are elevation of privilege, and one is information disclosure. Microsoft confirms no zero-day exploitation and no advance public disclosure for any item in the rollup.

Beyond the headline counts, four characteristics of this release set it apart from a typical Patch Tuesday cycle for financial institutions:

CVE Component Severity Attack Surface Authentication Required
CVE-2026-41089 Windows Netlogon Critical, CVSS 9.8, stack-based buffer overflow, remote code execution Network reachability to a domain controller. Patches available for Windows Server 2012 onward. None. No user interaction.
CVE-2026-41096 Windows DNS Client Critical, CVSS 9.8, remote code execution via crafted DNS response Every Windows endpoint that resolves DNS, which is every Windows endpoint. None. No user interaction.
CVE-2026-42826 Azure DevOps Critical, CVSS 10.0, server-side flaw Patched server-side by Microsoft. Customers verify their Azure DevOps tenant is on the current release. Server-side. Customer action limited to tenant version verification.
CVE-2026-33823 Microsoft Teams Critical, CVSS 9.6, Teams client RCE Microsoft handles the service-side patching for the Teams cloud service. Customer-side action is Teams desktop client auto-update verification. Server-side and client-update.

The Netlogon and DNS Client flaws are the two items in this rollup that demand explicit customer-side action across the financial-institution fleet. The Azure DevOps and Teams flaws Microsoft patches on the service side; the Microsoft Entra ID elevation-of-privilege fix, the Hyper-V escalation, the Office and Word document-handling flaws, and the rest of the rollup get propagated through normal Windows Update for Business ring policies as part of the same monthly cumulative update.

The release also includes the broader set of fixes that arrived through Microsoft's recently launched Defense at AI Speed program, which we cover in detail below. For context, sixteen of the May Patch Tuesday fixes came directly out of that program, including both the Netlogon and DNS Client critical flaws.

The Netlogon RCE That Earned a ZeroLogon Comparison

CVE-2026-41089 is the headline flaw of the May 2026 Patch Tuesday for any financial institution that runs Windows-based Active Directory, which is virtually every bank, credit union, and mortgage company that has not yet committed to a fully cloud-native identity stack. The National Vulnerability Database entry, published on May 12 and last modified May 13, describes the vulnerability as a stack-based buffer overflow in the Windows Netlogon service that allows an unauthorized attacker to execute code over a network. The CVSS 3.1 vector is AV:N / AC:L / PR:N / UI:N / S:U / C:H / I:H / A:H, which translates to a network-reachable attack vector, low complexity, no privileges required, no user interaction, and full impact on confidentiality, integrity, and availability of the target.

Successful exploitation gives the attacker code execution in the security context of the Netlogon service. That service runs as SYSTEM on every Windows domain controller. SYSTEM on a domain controller means full control of the Active Directory forest, the ability to forge any user or Kerberos ticket, the ability to extract any password hash from the directory, and the ability to push group policy changes that propagate to every domain-joined machine in the environment. For a financial institution, that is the worst possible attacker outcome short of physical custody of the building.

The ZeroLogon Comparison Is Real

Rapid7's principal software engineer Adam Barnett, in the firm's published May 2026 Patch Tuesday analysis, writes: "Anyone who remembers the much-discussed CVE-2020-1472 (aka ZeroLogon) back in 2020 will note that CVE-2026-41089 offers an attacker more immediate control of a domain controller. For most pentesters, that's the point at which the customer report more or less writes itself. No privileges or user interaction are required, and attack complexity is low, which suggests that creation of a reliable exploit might not be especially difficult for anyone with knowledge of the specific mechanism."

ZeroLogon was the 2020 critical Netlogon flaw that triggered emergency patching across U.S. federal agencies, was added to the CISA Known Exploited Vulnerabilities catalog within weeks of disclosure, and produced numerous public incidents at financial institutions that had not patched their domain controllers in the first week after release. The Microsoft MSRC entry for CVE-2026-41089 currently lists exploitation as "less likely," but Rapid7's analysis observes that Microsoft does not publish technical justification for that rating, and that the underlying mechanism is in the same family of pre-authentication Netlogon weaknesses that ZeroLogon exploited.

Patches for CVE-2026-41089 are available for every supported Windows Server version: 2012, 2012 R2, 2016, 2019, 2022, 2022 23H2, and 2025, in both full and Server Core installations. The patch arrives as part of the May 2026 cumulative update for each Windows Server release, which means the standard Microsoft Intune Windows Update for Business ring policy that financial institutions already use for patching production servers is the deployment vehicle. There is no separate hotfix to track and no out-of-band procedure to follow.

What does require explicit attention is the fact that a financial institution's domain controllers should be patched in the same maintenance window, not in a staggered rollout. A half-patched Active Directory forest, where some domain controllers carry the May fix and others do not, is not a defensible state when the underlying vulnerability is pre-authentication and remotely reachable. An attacker who pivots into the internal network and locates an unpatched domain controller through standard reconnaissance gains the keys to the kingdom regardless of how many of the other domain controllers received the update.

The DNS Client RCE That Reaches Every Windows Endpoint

CVE-2026-41096 is the second critical flaw that demands explicit customer attention. The Windows DNS Client is the component that runs on every Windows machine, server or workstation, that resolves domain names against a DNS server. Every login, every Outlook session establishing a connection to Microsoft Exchange Online, every Teams desktop client coming online, every web browser tab, every internal application talking to a SQL Server, and every line-of-business application contacting a SaaS vendor depends on the Windows DNS Client.

The vulnerability is a critical remote code execution flaw with CVSS 9.8, the same severity as the Netlogon RCE. It is triggered by a malicious DNS response. An attacker who can deliver a crafted DNS response packet to a vulnerable Windows machine can achieve remote code execution on that machine without any authentication and without any user interaction. The attacker does not need to compromise an account, persuade a user to click anything, or wait for a user to be logged in. They simply need a path for the malicious DNS response to reach the target.

An attacker looking for a master key for Windows assets will pay attention to CVE-2026-41096, a critical RCE in the Windows DNS client implementation. A modern computer talks to DNS the way a child in the back of a car asks, "are we there yet?"

Adam Barnett, Principal Software Engineer, Rapid7, in published May 2026 Patch Tuesday analysis (May 13, 2026).

The most realistic exploitation path for a financial institution is not a public internet attacker, because routine workstation DNS queries do not traverse the open internet directly. It is one of three internal paths. The first path is a compromised internal DNS server: an attacker who has already taken control of an internal Windows DNS Server can return crafted responses to any client that queries it. The second path is a man-in-the-middle attack on a network segment where DNS queries pass through, including guest Wi-Fi networks and untrusted networks an executive might use while traveling. The third path is upstream DNS poisoning that propagates through a compromised forwarder or resolver.

Each of those paths is mitigated by the existence of a Microsoft-managed Defender for Endpoint deployment combined with Microsoft-managed Conditional Access policies that block non-managed network paths. But none of those mitigations are a substitute for the actual patch, which closes the underlying flaw in the DNS Client itself. The May 2026 cumulative update is the only durable fix.

Why Microsoft's New MDASH AI System Found These

The May 2026 Patch Tuesday is the first public showcase of MDASH, Microsoft's new multi-model agentic scanning harness. Microsoft introduced MDASH in two Microsoft Security Blog posts on May 12, 2026: "Defense at AI speed: Microsoft's new multi-model agentic security system finds 16 new vulnerabilities," and a companion post on MDASH's performance against industry benchmarks.

According to Microsoft's published description, MDASH is an AI system that coordinates multiple specialized AI models, each trained on a different aspect of vulnerability discovery, to systematically explore the Windows networking and authentication stack for memory-safety and logic flaws. The system found sixteen new vulnerabilities in the May rollup, including the four most serious critical remote code execution flaws in the release. Those four critical flaws sit in components that have been audited by humans repeatedly over the last twenty-five years: the TCP/IP stack, the IKEv2 service, the Netlogon service, and the DNS Client.

Microsoft

What MDASH Changes for Financial Institutions

From Microsoft's May 12 blog post: MDASH systematically explores the Windows networking and authentication stack to find memory-safety and logic flaws that traditional fuzzing and manual review have missed. In a single month, MDASH contributed sixteen vulnerabilities to the May 2026 Patch Tuesday, four of them critical remote code execution flaws. The implication for financial institutions is straightforward: monthly Patch Tuesday rollups can now include large batches of newly discovered critical flaws in foundational Windows components, not just incremental fixes to recently introduced features. Patching cadence assumptions made before May 2026 will need to be updated.

Source: Microsoft Security Blog, "Defense at AI speed" (May 12, 2026).

For financial institutions, the operational implication is that the Patch Tuesday cycle is no longer a routine monthly maintenance window. It is a moving target where the depth and breadth of any given month's release can include large batches of newly surfaced critical vulnerabilities in components that have been considered stable for two decades. That changes how IT directors should think about ring policies, deployment timing, and post-deployment validation.

The reassuring half of the MDASH story is that Microsoft's AI-discovered flaws went through the standard responsible-disclosure process: MDASH found the vulnerabilities, Microsoft engineering teams developed and tested the patches, and Microsoft released the fixes through the standard May Patch Tuesday channel. No public proof-of-concept code was released, no zero-day window opened, and the customer-side action remains the standard: apply the May 2026 cumulative update through Microsoft Intune's Windows Update for Business policies, verify deployment via the Intune compliance dashboard, and confirm coverage across the fleet.

What Banks, Credit Unions, and Mortgage Companies Should Verify This Week

The customer-side action for the May 2026 Patch Tuesday is concentrated in two places: Microsoft Intune's Windows Update for Business policies, and Microsoft Defender XDR's vulnerability management surface. Both surfaces are part of Microsoft 365 E3 or E5 entitlements for organizations that license the security stack, and both are managed by ABT for customers under the Guardian operating model.

The seven-day verification checklist below maps the May 2026 cumulative update to the Microsoft Intune admin center surfaces where an FI's IT director or security operations lead can confirm that the rollout actually happened across the fleet. Each step has a specific Microsoft canonical surface that confirms the action, not a vague "best effort" status.

  1. Confirm Update Rings are set to receive the May 2026 cumulative update.

    In the Microsoft Intune admin center, navigate to Devices, Manage updates, Windows updates, Update rings for Windows 10 and later. Confirm the active ring policies include Quality update deferral set to no more than 7 days. If quality update deferral is set to 14 or 30 days, the May 2026 critical patches are explicitly being delayed by the configuration; review and adjust.

    Microsoft Learn reference: learn.microsoft.com/en-us/intune/intune-service/protect/windows-update-for-business-configure.

  2. Open the Windows Update for Business compliance report.

    In the Microsoft Intune admin center, navigate to Reports, Windows updates, Windows update report. The report shows per-device installation status (Up to date, In progress, Failed, Not synced) for each cumulative update. Filter by Update name to find "2026-05" entries.

    Microsoft Learn reference: learn.microsoft.com/en-us/intune/intune-service/protect/windows-update-reports.

  3. Identify devices in Failed or Not synced state.

    For each device that is not Up to date on the May 2026 cumulative update, capture the device name, last-checkin timestamp, and installation status. These devices need direct remediation: either a manual rerun of Windows Update on the device, a reboot to complete a pending install, or, if the device is consistently failing, a deeper investigation of the device's Windows Update agent state.

  4. Verify domain controllers received the patch.

    Domain controllers are not always enrolled in Microsoft Intune in the same ring as user devices. For domain controllers managed by Windows Server Update Services or another patching tool, confirm the May 2026 cumulative update for the relevant Windows Server release deployed cleanly to every domain controller in every Active Directory site.

  5. Cross-check Microsoft Defender XDR's vulnerability management.

    In the Microsoft Defender portal, navigate to Vulnerability management, Weaknesses. Filter for CVE-2026-41089 and CVE-2026-41096. The recommended remediation status should show "Resolved" or "Patched" for every device that received the May 2026 cumulative update. Any device still showing "Exposed" needs investigation.

  6. Document the verification in the IT control evidence file.

    For financial-institution audit purposes, capture a screenshot of the Microsoft Intune Windows Update for Business compliance report and the Microsoft Defender vulnerability management view showing CVE-2026-41089 and CVE-2026-41096 remediation status. These artifacts are useful for FFIEC IT examination evidence files and for cyber insurance carrier evidence packets.

  7. Schedule the next Patch Tuesday review for June 10, 2026.

    The June 2026 Patch Tuesday falls on June 10. Block the IT director's calendar for the morning of June 11 for the same Microsoft Intune compliance review cycle. Patch Tuesday is a recurring control, not a one-time event.

That seven-step checklist takes a managed IT team somewhere between two and four hours per month when the underlying fleet is healthy. It takes substantially longer when patch compliance has been allowed to drift and the Windows update agent on a portion of the fleet has stopped checking in. The most common pattern at financial institutions that have not done this kind of structured verification before is that 70 to 90 percent of devices are Up to date within seven days, with the remainder spread across genuine patch failures, devices that have not connected to the network recently, and devices where the Windows Update agent state is corrupted and needs a manual reset.

For more on how Microsoft Intune's Windows Update for Business policies interact with the broader Microsoft 365 license stack, see our analysis of Microsoft 365 E5 security features banks pay for but don't use and our breakdown of Microsoft 365 E3 vs. E5 vs. Business Premium for financial institutions.

Not sure where your fleet stands on the May 2026 cumulative update? A 30-minute review of your Microsoft Intune Windows Update for Business compliance report tells you exactly how many devices in your fleet received the May Netlogon and DNS Client patches, how many are still exposed, and which devices need direct remediation. Talk to an ABT financial services security specialist to schedule the review.

How ABT's Guardian Operating Model Runs the May Cycle for You

Financial institutions under ABT's Guardian operating model do not perform the seven-step verification checklist above manually each month. The Guardian operating model takes the Microsoft Intune Windows Update for Business ring policy management, the compliance verification, the Microsoft Defender XDR vulnerability management cross-check, and the exception remediation off the IT director's calendar entirely. ABT's managed security operations team runs the cycle, confirms coverage, and reports the result.

The Guardian operating model covers the May 2026 Patch Tuesday in five specific ways. First, the Microsoft Intune ring policies for Guardian customers are pre-configured to receive Critical and Important security updates with a quality update deferral of seven days or less. The May 2026 cumulative update therefore reaches the fleet on Microsoft's intended schedule, not a delayed schedule that defers critical patches for two or four weeks. Second, the Microsoft Defender XDR vulnerability management view is monitored continuously by ABT's security operations team, with alerts on any device that fails to remediate CVE-2026-41089 or CVE-2026-41096 within the policy window. Third, ABT's managed Microsoft Sentinel deployment includes detection rules for the specific behaviors that would indicate exploitation of the Netlogon or DNS Client flaws on a device that has not yet been patched.

Fourth, the Microsoft Entra ID Conditional Access policies for Guardian customers block access to corporate resources from devices that do not meet the Microsoft Intune compliance baseline, which includes the May 2026 cumulative update once the policy window has closed. This means an unpatched device cannot reach Microsoft 365 services even if it is connected to the network. Fifth, ABT delivers the May 2026 evidence packet to the FI's compliance binder as part of the monthly Guardian operations report, with the specific Microsoft Intune compliance percentages and Microsoft Defender remediation status captured for examination evidence.

For a closer look at the Microsoft security stack that powers this monthly cycle, see Microsoft Defender for Office 365 for financial institutions and M365 device code phishing for how Conditional Access and Defender combine to mitigate identity-based attack paths.

Two Paths Through the May 2026 Patch Tuesday

Without Guardian

The IT director or security operations lead reviews the May 2026 MSRC bulletin on the morning of May 14. They confirm Microsoft Intune ring policies. They run the compliance report. They identify 8 percent of the fleet still showing Failed or Not synced. They open tickets to remediate each device. They coordinate with the helpdesk on user device issues. They cross-check Microsoft Defender XDR. They document evidence for the IT control file. Total monthly effort: 12 to 20 hours across the IT team, often more during cycles like this one with two CVSS 9.8 critical flaws to track.

With Guardian

ABT's managed security operations team executes the verification automatically. The FI's IT director receives the May 2026 Guardian operations report on May 21 showing 98 percent fleet compliance, the 2 percent of devices with remediation work in flight, and the Microsoft Defender XDR confirmation that CVE-2026-41089 and CVE-2026-41096 have been resolved across the patched devices. Total monthly effort for the FI: a 15-minute review of the Guardian operations report. The compliance evidence is filed automatically for FFIEC examination, NCUA examination, OCC examination, or insurance carrier review.

Frequently Asked Questions

The questions below come up most often from credit union CIOs, community bank IT directors, and mortgage company CTOs during the Patch Tuesday review week. The answers reflect Microsoft canonical guidance and ABT's standard operating practice for the Guardian operating model.

Should we patch the May 2026 cumulative update immediately, or wait for the standard 14-day deferral window?

The recommended posture for financial institutions is to apply the May 2026 cumulative update within seven days of release, not within fourteen or thirty. The presence of two CVSS 9.8 critical remote code execution flaws, one of which is on domain controllers, makes the standard "wait and watch" approach more expensive than the small risk of a patch-induced operational issue. Microsoft assesses real-world exploitation of both Netlogon and DNS Client flaws as "less likely," but Rapid7 notes that this rating is unaccompanied by technical justification, and that the underlying mechanisms are not difficult to weaponize. A seven-day deployment window in Microsoft Intune's Windows Update for Business policies is the right starting point.

If our domain controllers are not Microsoft Intune managed, how do we patch CVE-2026-41089?

Domain controllers are typically managed by Windows Server Update Services, Microsoft Configuration Manager, or a third-party patching tool, not by Microsoft Intune's user-device ring policies. The May 2026 cumulative update for the relevant Windows Server release contains the Netlogon patch. Approve the May 2026 cumulative update in your server patching tool, deploy it to every domain controller in the same maintenance window, and verify the resulting Windows Server build number against Microsoft's published patch metadata. The MSRC entry for CVE-2026-41089 lists the specific Windows Server build numbers that contain the fix.

Can we block the Netlogon vulnerability at the network layer instead of patching?

Network segmentation that restricts Netlogon traffic to authorized client and domain-member machines is a useful defense in depth, but it is not a substitute for the patch. Netlogon traffic is required for normal Active Directory operation, including user logins, group policy refresh, and domain trust validation. The realistic attack path for CVE-2026-41089 is an attacker who has already pivoted onto an internal network segment, which is the threat model that most financial institutions face after a successful phishing event. The patch closes the underlying flaw and is the only durable remediation. Network controls reduce the blast radius of an unpatched window; they do not eliminate the underlying risk.

How does Microsoft Defender XDR confirm the May 2026 patches landed on a device?

Microsoft Defender XDR's vulnerability management surface, accessible in the Microsoft Defender portal under Vulnerability management, Weaknesses, lists each CVE that affects devices enrolled in Defender for Endpoint and shows remediation status per device. After the May 2026 cumulative update is installed on a device, Microsoft Defender for Endpoint's local agent reports the new Windows build number, and the vulnerability management surface updates the device's status for CVE-2026-41089, CVE-2026-41096, and the other May 2026 items from Exposed to Resolved. The status change typically appears within several hours of the patch installation, depending on how often the Defender agent syncs to the cloud.

Are devices in a Microsoft Entra ID hybrid join configuration handled differently than cloud-only joined devices?

The May 2026 cumulative update applies the same way to Microsoft Entra hybrid joined devices and Microsoft Entra joined devices, because both device types run the same Windows operating system and consume Microsoft Intune's Windows Update for Business policies the same way. The difference is on the domain controller side: hybrid environments have on-premises Active Directory domain controllers that must receive the Netlogon patch, in addition to the Microsoft Entra ID service that Microsoft patches on the cloud side. Cloud-only Microsoft Entra environments without on-premises Active Directory do not have an on-premises Netlogon attack surface, so CVE-2026-41089 is less relevant to that subset of FIs.

If we are an ABT Guardian customer, what do we actually need to do for the May 2026 Patch Tuesday?

For financial institutions under ABT's Guardian operating model, the May 2026 Patch Tuesday cycle requires no direct customer action. ABT's managed security operations team configures Microsoft Intune's Windows Update for Business ring policies, monitors deployment across the fleet, verifies remediation in Microsoft Defender XDR's vulnerability management surface, and delivers the monthly Guardian operations report with the May compliance evidence. The FI's IT director receives the report on or before May 21, 2026, and uses it as the audit evidence for the May patching cycle. Customers who want a deeper walkthrough of the May 2026 evidence packet can request one by reaching out to their ABT account manager.

Verify your Microsoft Intune May 2026 patch compliance this week

The Netlogon RCE on domain controllers and the DNS Client RCE on every Windows endpoint deserve more attention than a routine Patch Tuesday review. ABT's free 30-minute security insights assessment shows you exactly how the May 2026 cumulative update has propagated across your Microsoft Intune fleet, identifies the devices still showing Exposed in Microsoft Defender XDR's vulnerability management, and gives you a clear remediation plan you can hand to your IT team Monday morning.

Justin Kirsch

President & CEO, ABT

Justin runs ABT, the largest Tier-1 Microsoft Cloud Solution Provider dedicated to financial institutions. He has spent twenty-five years helping banks, credit unions, and mortgage companies turn the monthly Microsoft Patch Tuesday cycle from a fire drill into a predictable, audit-ready operations rhythm. He writes regularly about how the Microsoft 365 security stack maps to FFIEC, NCUA, OCC, and FDIC examination expectations.