

Image: Frank Ziemann / Foundry
Summary created by Incandescent Solutions AI
In abstract:
- PCWorld reviews that Microsoft faces multiple excessive security breaches, including an actively exploited Alternate Server spoofing vulnerability and a BitLocker bypass exploit known as YellowKey.
- The vulnerabilities impression core Microsoft products adore Defender, Edge, and Authenticator apps, with attackers gaining unauthorized system access and bypassing security protections.
- Whereas Microsoft has patched some components and reversed Edge’s plaintext password storage, the Alternate Server flaw stays unpatched, requiring quick organizational mitigation efforts.
Whereas there weren’t any staunch zero-day vulnerabilities to patch in Would possibly perchance per chance perchance’s Patch Tuesday change, the fallout since then has been excessive.
The first attacks on Microsoft Alternate Server befell as early as Patch Tuesday week, abusing a vulnerability that soundless hasn’t been fixed and is soundless exploited by hackers.
Meanwhile, Microsoft has launched security updates for its Malware Protection Engine to repair excessive flaws, backtracked on its salvage resolution to store passwords as plaintext in Edge, and extra. Plus, a security researcher launched some other proof-of-theory exploit, this time focusing on a vulnerability in BitLocker security.
The following scheduled Patch Tuesday is June ninth, 2026.
Microsoft Alternate Server flaws
The spoofing vulnerability CVE-2026-42897 in Alternate Server (2016, 2019, and Subscription Model), which is classified as excessive by Microsoft, is being exploited for attacks within the wild.
Microsoft doesn’t yet own any updates ready to deal with this security flaw. The Alternate Emergency Mitigation (EM) provider can present automatic support, offered it’s active. In a blog put up, Microsoft’s Alternate crew explains how enterprise admins can chop the assault floor—and likewise what aspect results this can even own.
YellowKey outwits BitLocker
A security researcher identified as Nightmare-Eclipse—previously accountable for his RedSun and MiniPlasma proof-of-theory exploits—has continued his dispute with Microsoft by publishing some other proof-of-theory exploit for a BitLocker vulnerability.
This one is known as YellowKey and it permits an attacker who has bodily access to a BitLocker-encrypted PC to receive spherical BitLocker security the employ of a USB flash power. This works if BitLocker is frail on the draw in TPM-simplest mode with out a PIN. Microsoft has assigned a excessive anguish stage to this vulnerability, itemizing it as CVE-2026-45585 (BitLocker Security Aim Bypass), and launched updates for Windows 11 and Server 2025.
Microsoft Edge and Authenticator
We previously reported that Microsoft’s Edge browser loads saved passwords into reminiscence in plaintext in notify that they’re directly readily accessible as wanted. Since the Edge change on Would possibly perchance per chance perchance 15th (version 148.0.3967.70), the browser has been facing passwords extra carefully. As of Would possibly perchance per chance perchance Twenty first, Edge for Android is also at this version.
Microsoft’s Authenticator apps for Android and iOS own also been stumbled on to jabber graceful data, allowing attackers to access all the pieces—recordsdata, services, data—the employ of the permissions of the at this time logged-in person. Microsoft classifies the vulnerability CVE-2026-41615 as excessive and has launched fixed variations of the apps.
Microsoft Defender is inclined
Microsoft’s malware protection for Windows PCs has three vulnerabilities that need patching. Attackers can exploit these flaws to sneak malicious code previous Defender undetected. They appear like doing upright that, as Microsoft reviews that elevation-of-privilege vulnerability CVE-2026-41091 has publicly identified exploit code. Exploiting this security vulnerability grants the attacker system privileges.
The DoS vulnerability CVE-2026-45498 in Microsoft Defender is also being exploited. The RCE vulnerability CVE-2026-45584, nonetheless, isn’t yet being exploited, though it’ll be frail to lift out code.
The vulnerabilities are present in Microsoft’s Malware Protection Engine as a lot as and including version 1.1.26030.3008. Microsoft has already rolled out patched variations as segment of the automatic every single day updates for Defender. In version 1.1.26040.8 and later, all three vulnerabilities own been fixed.
To be on the stable aspect, take a look at whether or no longer you’ve purchased this patched version by opening Windows Settings > Privateness & security → Windows Security → Virus & risk security → Settings (⚙ icon bottom left) → About. The “Engine Model” is what it’s likely you’ll perchance perchance even be searching out for to own a look at.
Tip: Whether you set up your Windows up-to-the-minute, you would like appropriate antivirus protections for these who would adore your PC to dwell stable and private. Verify out our picks for the simplest antivirus tool for Windows as smartly as simplest VPN services to establish sooner than security complications.
This text on the muse seemed on our sister newsletter PC-WELT and was translated and localized from German.
Author: Frank Ziemann, Contributor, PCWorld

Frank Ziemann has been working as a contract author for sister self-discipline PC-WELT since 2005, writing news and take a look at reviews. His considerable matters are IT security (malware, antivirus, security gaps) and Data superhighway technology.



