Site icon Fix I.T. Phill – Your Go-To Tech Guru

May 2026 Microsoft Patch Tuesday: Windows Netlogon and DNS Critical RCE Patch Guide

Windows Server infrastructure protected with May 2026 Netlogon and DNS Client critical patch guidance

Windows Server infrastructure protected with May 2026 Netlogon and DNS Client critical patch guidance

Impact statement: Microsoft’s May 2026 Patch Tuesday includes two critical Windows remote code execution vulnerabilities that server administrators should patch immediately: CVE-2026-41089 in Windows Netlogon and CVE-2026-41096 in Windows DNS Client. Both are listed by NVD with CVSS 9.8 Critical, network attack vector, no privileges required, and no user interaction required.

Microsoft’s Security Update Guide lists both as not publicly disclosed and not known exploited at release time, but that does not make them slow-roll items. Netlogon and DNS sit close to identity, domain services, name resolution, hosting operations, and administrator workstations. Patch domain controllers, DNS servers, IIS hosting machines, RDS hosts, Hyper-V hosts, backup servers, file servers, and support workstations in a controlled but fast window.

Who Should Care

The Two Critical Items

CVEComponentImpactFix priority
CVE-2026-41089Windows NetlogonRemote code execution over the network.Patch domain controllers and domain-joined servers first.
CVE-2026-41096Windows DNS ClientRemote code execution over the network.Patch DNS servers, Windows hosting servers, and admin machines quickly.

Use Microsoft’s update guide for the exact KBs for each Windows version and SKU. In mixed fleets, assume supported Windows Server and Windows client systems need review until your patch inventory proves otherwise.

Patch Path 1: Windows Update

For smaller fleets and standalone servers, use Windows Update or Server Manager, install the May 2026 cumulative update, reboot, and confirm the machine reports the expected build and hotfix state.

# Start an update scan from an elevated prompt.
UsoClient StartScan
UsoClient StartDownload
UsoClient StartInstall

# After the reboot, review recent hotfixes from PowerShell.
Get-HotFix | Sort-Object InstalledOn -Descending | Select-Object -First 10

On Server Core, use sconfig or your normal RMM/PowerShell workflow. The important part is not the button you click; it is that the May 2026 security update installs, the server reboots cleanly, and post-reboot verification is captured.

Patch Path 2: WSUS, Intune, Or RMM

Patch Path 3: Offline Or Catalog Install

For isolated servers, download the correct update from the Microsoft Update Catalog, transfer it through your approved change-control process, and install it locally. Match the KB to the operating system, architecture, and servicing baseline.

# Example offline install pattern. Replace the path with your approved KB file.
wusa.exe C:Patcheswindows-may-2026-security-update.msu /quiet /norestart

Schedule the reboot. Do not leave critical Windows security updates waiting on a reboot and then mark the system complete.

Post-Reboot Verification

# Confirm Windows version/build context.
Get-ComputerInfo | Select-Object OsName, OsVersion, OsBuildNumber

# Confirm recent hotfixes.
Get-HotFix | Sort-Object InstalledOn -Descending | Select-Object -First 10

# Classic command prompt fallback.
systeminfo | findstr /B /C:"OS Name" /C:"OS Version" /C:"Hotfix"

For domain controllers, also confirm replication, authentication, DNS resolution, and event-log health after the reboot. For hosting servers, confirm IIS, application pools, control-panel services, scheduled tasks, backups, and RMM agents.

Role-Specific Notes

What To Review

CDN And WAF Note

A web WAF cannot patch Windows Netlogon or Windows DNS Client. The defensive move is exposure reduction: keep domain services, DNS administration, SMB/RPC, RDP, WinRM, and server management interfaces off the open internet; require VPN or trusted administrator networks; and patch the operating system. The CDN side can still help by hardening exposed web administration panels and flagging customers that appear to publish management services publicly.

Sources

Need help patching Windows hosting servers, domain controllers, RDS, or Hyper-V without knocking customers offline? Open a ticket through Help4Network.com.

Exit mobile version