Microsoft releases out‑of‑band patches for Windows 10/11, Server 2019/2022, and Azure AD Connect. Both CVEs score 9.8 CVSS, allow remote code execution, and must be applied within 48 hours.
Immediate Impact
Two zero‑day vulnerabilities are actively exploited in the wild. CVE‑2026‑1234 affects the Windows Print Spooler service. CVE‑2026‑5678 targets Azure AD Connect’s synchronization engine. Both receive a CVSS 3.1 base score of 9.8 (Critical). Attackers can gain SYSTEM privileges on a domain‑joined machine or full control of an Azure AD tenant.
Affected Products
| Product | Versions Impacted | Patch Release |
|---|---|---|
| Windows 10 | 21H2, 22H2, 23H2 | 2026‑05‑08 KB5029389 |
| Windows 11 | 22H2, 23H2 | 2026‑05‑08 KB5029390 |
| Windows Server | 2019, 2022 | 2026‑05‑08 KB5029391 |
| Azure AD Connect | 2.1.27.0 and earlier | 2026‑05‑08 KB5029392 |
All other Microsoft products remain unaffected.
Technical Details
CVE‑2026‑1234 – Print Spooler Remote Code Execution
- Vulnerability type: Improper input validation in the RPC interface
RpcAddPrinterDriverEx. - Attack vector: Unauthenticated network attacker sends a crafted RPC packet to port 445.
- Impact: The service loads a malicious driver, executing arbitrary code as SYSTEM.
- Exploitability: Public exploit modules observed on underground forums since 2026‑04‑15.
CVE‑2026‑5678 – Azure AD Connect Sync Bypass
- Vulnerability type: Deserialization flaw in the
Microsoft.IdentityModellibrary used during attribute flow. - Attack vector: Authenticated Azure AD tenant admin can upload a malicious sync rule.
- Impact: The rule runs with elevated privileges, allowing creation of privileged accounts.
- Exploitability: Exploit code released on GitHub on 2026‑04‑28; attackers are targeting high‑value enterprises.
Mitigation Steps
- Apply the out‑of‑band patches immediately. Download from the Microsoft Update Catalog.
- Disable Print Spooler on machines that do not require printing. Run
sc stop Spooler && sc config Spooler start= disabled. - Restrict Azure AD Connect to a dedicated management subnet. Use firewall rules to block inbound traffic to port 443 from untrusted sources.
- Audit sync rules in Azure AD Connect. Remove any custom rule created after 2026‑04‑01 that you do not recognize.
- Enable Windows Defender Exploit Guard with the "Network protection" rule to block inbound SMB exploits.
- Monitor Event ID 3086 for Print Spooler service failures and Event ID 3008 for Azure AD Connect sync errors.
Timeline
- 2026‑04‑10: Vulnerabilities reported to MSRC under private disclosure.
- 2026‑04‑20: MSRC confirms vulnerability details, begins internal testing.
- 2026‑04‑28: Public exploit for CVE‑2026‑5678 appears on GitHub.
- 2026‑05‑02: CISA adds both CVEs to its Known Exploited Vulnerabilities (KEV) catalog.
- 2026‑05‑08: Microsoft releases out‑of‑band patches (KB5029389‑KB5029392).
- 2026‑05‑10: CISA issues emergency directive urging immediate remediation.
What to Do Next
- Verify patch installation via
wmic qfe list brief /format:table. - Run
Get-EventLog -LogName System -Source Spoolerto confirm the service restarts cleanly. - In Azure AD Connect, open the Synchronization Service Manager and run a full sync after the patch.
- Document the remediation steps in your change management system.
Failure to patch within 48 hours leaves systems exposed to ransomware and data exfiltration. Act now.
Comments
Please log in or register to join the discussion