Yesterday was Patch Tuesday. For the first time since June 2024, Microsoft shipped a release with zero zero-days. Nothing exploited in the wild. Nothing publicly disclosed before the fix landed. 118 CVEs, 16 critical, 102 important, and not a single one on fire.
SQL Server got off easy this month, too. We're in the patch list, but no critical SQL Server specific CVE drew a headline. A welcome change after March's CVE-2026-21262 sysadmin-escalation party.
Before you breathe out though, read my title again. The bullet missed SQL Server. It did not miss your domain controller.
The numbers
| Metric | May 2026 |
|---|---|
| Total CVEs | 118 |
| Critical | 16 |
| Important | 102 |
| Zero-days exploited | 0 |
| Zero-days publicly disclosed | 0 |
| EoP share | 48.3% |
| RCE share | 24.6% |
Quick refresher on what a zero-day actually is: a vulnerability the vendor hasn't patched yet — but attackers already know about it. Microsoft tracks two flavors separately. 'Exploited in the wild' means attackers are already using it. 'Publicly disclosed' means the technical details are out, so weaponization is hours away. The 'zero' counts the days defenders had to prepare. March's CVE-2026-21262 was publicly disclosed before the patch shipped — that's why we said 'stop reading and go patch.' This month we've got neither flavor. That is very interesting.
Why this matters to you
SQL Server didn't draw a critical CVE, but three flaws in the May release hit the stack around it. In priority order:
1. The domain controllers your SQL Servers live behind
CVE-2026-41089 is a stack-based buffer overflow in Windows Netlogon. CVSS 9.8. A remote, unauthenticated attacker sending a crafted packet to a server running as a domain controller can execute code on the box. Microsoft tagged it 'Exploitation Less Likely' — and ZDI called it 'wormable' in the same breath, noting that a compromised domain controller is a compromised domain.
'wormable'? All I can say is, do you remember SQL Slammer? January 2003. Took down half the internet in ten minutes. Oh man, the war stories...
Your SQL Server doesn't need to be vulnerable to be at risk. Most of us run Windows Authentication. Most of us trust the domain. If the DC is owned, your service accounts, your AG endpoints, your SPNs, your sa-equivalent Windows logins — all of it inherits the problem.
2. The Word document that owns the DBA laptop
Four critical RCEs in Microsoft Word landed this month — CVE-2026-40361, CVE-2026-40364, CVE-2026-40366, CVE-2026-40367. All CVSS 8.4. The first two are flagged 'Exploitation More Likely'. The detail that should make every DBA stop scrolling: Microsoft notes the Preview Pane is an attack vector. You don't have to open the file. You just have to see it listed in Outlook.
Now think about how a DBA's inbox actually looks. Vendor docs. Customer-supplied schemas in .docx. Audit checklists, Technical Reports and Logs, SOWs... Half of it arrives from an email you don't recognize with attachments too many will double-click before verifying. Patch your workstation this week.
3. Everything else that touches the database tier
| CVE | What | CVSS | Why you care |
|---|---|---|---|
| CVE-2026-41096 | Windows DNS Client RCE | 9.8 | Heap overflow via malicious DNS response. Every Windows box runs the client. |
| CVE-2026-40415 | Windows TCP/IP RCE | 9.8 | Use-after-free, unauthenticated, no user interaction. Wormable. |
| CVE-2026-42898 | Dynamics 365 On-Prem RCE | 9.9 | Authenticated, with scope change. NAV/BC shops, this is yours. |
| CVE-2026-41103 | SSO Plugin for Jira & Confluence EoP | 9.1 | Forged identity, bypasses Entra ID auth. 'Exploitation More Likely'. |
SQL Server's patches this month
SQL Server appears in the May 2026 patch list. No critical, no public PoC, no headline. Just the routine cumulative-update plumbing we expect. I like boring. Boring is good. Apply the GDR or CU for your servicing path and move on.
One reminder while you're in there: GDR and CU are separate servicing paths. Once you apply a CU, you can't revert to GDR for that installation. Pick the lane that matches what you have already been applying. Microsoft's Security Update Guide is the canonical source for which KB matches your build.
What 'no zero-day' does not mean
It does not mean safe. It means defenders got a head start for a change. Every Patch Tuesday, attackers reverse-engineer the fixes to figure out what bug was patched and how to exploit it. That work is continually faster — AI tooling now does in hours what used to take a skilled researcher days. A 'no zero-day' month just means the exploit work starts after the patch ships instead of before. The exploits are still coming. You just have a little more time to prepare.
It also doesn't mean you can skip a cycle. A zero-day-free Patch Tuesday can still be a bad Patch Tuesday — wormable DC bugs, preview-pane RCEs, and TCP/IP unauthenticated RCEs all add up to a busy week.
The bottom line
SQL Server caught a break. Your domain didn't. Patch your DCs this week. Patch your laptop this week. Apply the SQL Server GDR or CU for your path while you're at it. We got lucky. Be glad May was quiet.
More to Read
Microsoft Security Update Guide: May 2026 Release Notes
Tenable: May 2026 Patch Tuesday Addresses 118 CVEs
Zero Day Initiative: The May 2026 Security Update Review
Help Net Security: Many fixes, but no zero-days
sqlfingers inc: Patch Tuesday — Your sysadmin Role Was Up for Grabs (March 2026)













