
"Microsoft on Tuesday announced patching 137 vulnerabilities across its products, none of which have been flagged as exploited in the wild. Roughly a dozen of the bugs addressed with the latest Patch Tuesday updates have an exploitability rating of 'exploitation more likely', indicating that threat actors could start abusing them in attacks."
"The most severe of these is CVE-2026-41103, a critical-severity flaw in the Microsoft SSO Plugin for Jira & Confluence that could lead to elevation of privilege. The issue is rooted in the incorrect implementation of the authentication algorithm. High-severity privilege escalation issues in Windows Remote Desktop, Windows Common Log File System Driver, Windows Kernel, Azure AI Foundry, Windows Win32k, Windows Ancillary Function Driver for WinSock, Windows TCP/IP, and Windows Cloud Files Mini Filter Driver are also prone to exploitation, Microsoft says."
"The company also draws attention to two high-severity remote code execution defects in Microsoft Word (CVE-2026-40364 and CVE-2026-40361, CVSS score of 8.4) that are more likely to be exploited. The first is a type confusion issue, while the second is a use-after-free bug. "These flaws could be exploited by an attacker who sends a malicious document to a target," Tenable senior staff research engineer Satnam Narang said."
""The other common thread across these vulnerabilities is that a target doesn't need to even open the document to trigger the exploit. Exploitation is possible just by viewing a malicious document in the Preview Pane. Therefore, patching is the most reliable way to protect against flaws like these," Narang added. Two other high-severity Word weaknesses were also resolved this month, but they are less likely or unlikely to be exploited, Microsoft says."
Microsoft released Patch Tuesday updates addressing 137 vulnerabilities across its products, with none flagged as exploited in the wild. About a dozen bugs received an exploitability rating of “exploitation more likely,” meaning threat actors could begin abusing them. The most severe issue, CVE-2026-41103, is a critical flaw in the Microsoft SSO Plugin for Jira & Confluence that could enable elevation of privilege due to incorrect authentication algorithm implementation. Multiple high-severity privilege escalation issues affect Windows components and Azure AI Foundry. Microsoft also fixed two high-severity remote code execution defects in Microsoft Word, CVE-2026-40364 and CVE-2026-40361, which can be triggered by sending or even previewing a malicious document.
#patch-tuesday #microsoft-word #privilege-escalation #remote-code-execution #windows-vulnerabilities
Read at SecurityWeek
Unable to calculate read time
Collection
[
|
...
]