Weekly Cybersecurity Threat Roundup May 2026: 5 Active Exploits Demand Monday Action
Five actively exploited vulnerabilities and 275 million exposed records make May 18, 2026 the most demanding Monday morning for security teams this year. This weekly cybersecurity threat roundup covers Palo Alto Networks PAN-OS unauthenticated root RCE (CVE-2026-0300), Microsoft Exchange Server cross-site scripting added to the CISA Known Exploited Vulnerabilities catalog (CVE-2026-42897), Linux kernel privilege escalation exploitable from Docker and Kubernetes containers (CVE-2026-31431), the ShinyHunters breach of Canvas LMS records for 275 million students and staff, and the May 2026 Patch Tuesday release addressing 118 CVEs including three CVSS 9.8 or higher flaws.
Palo Alto Networks confirmed active exploitation of CVE-2026-0300, a heap buffer overflow in the PAN-OS authentication portal that allows an unauthenticated remote attacker to execute arbitrary code with root privileges on PA-Series and VM-Series firewalls. More than 5,800 VM-Series instances remain internet-exposed according to Shodan data, per BleepingComputer reporting. Microsoft Exchange on-premises deployments face confirmed active exploitation of CVE-2026-42897, a cross-site scripting flaw that CISA added to its KEV catalog on May 15 with a federal remediation deadline of May 29. Linux systems running kernels prior to version 6.18.22 are vulnerable to CVE-2026-31431, a privilege escalation flaw for which CISA required federal remediation by May 15.
Your security team needs to act on all five threat categories today. Internet-exposed Palo Alto firewalls with authentication portals are being compromised in active campaigns right now. Organizations running on-premises Exchange or unpatched Linux infrastructure face confirmed CISA KEV exposures with deadlines already passed or approaching. And 41 percent of North American colleges and universities rely on Canvas, meaning education-sector email addresses from your organization are likely in active criminal hands following the ShinyHunters breach.
How Do This Week's Critical Vulnerabilities Enable Unauthenticated Attacks?
All three actively exploited CVEs in this weekly cybersecurity threat roundup share one critical characteristic: they require no credentials, no prior access, and no user interaction to trigger initial exploitation. Understanding the mechanism behind each flaw defines the priority and urgency of your Monday response.
CVE-2026-0300 on Palo Alto PAN-OS is a heap buffer overflow in the User-ID Authentication Portal and Captive Portal component. An attacker sends a single specially crafted HTTP packet to the exposed portal endpoint, overflows the heap buffer, and gains arbitrary code execution in the context of the web server process, which runs with root privileges on affected devices. The attack works remotely without any authentication token or session cookie. Organizations with authentication portals restricted to internal trusted networks are not exposed to the active exploitation wave; the attack surface is exclusively portals reachable from untrusted or public-facing network interfaces.
CVE-2026-42897 on Microsoft Exchange Server exploits a cross-site scripting flaw in the Outlook Web Access interface. An attacker sends a crafted email to a target mailbox. When the recipient opens it through OWA under specific browser interaction conditions, malicious JavaScript executes in the authenticated session context, giving the attacker access to session tokens, calendar data, and contact lists without ever authenticating to Exchange directly. Exchange Online is not affected; only on-premises Exchange Server 2016, 2019, and Subscription Edition deployments are at risk.
CVE-2026-31431, named Copy Fail by Microsoft Security Research, stems from a logic flaw in the Linux kernel's authentication cryptographic template. A 732-byte Python exploit corrupts the kernel's in-memory page cache, modifying privileged binaries such as /usr/bin/su at execution time without touching disk. File integrity monitoring tools watching on-disk binaries do not detect this attack during exploitation. Docker, LXC, and Kubernetes grant container processes access to the AF_ALG subsystem by default when the algif_aead module loads on the host kernel, making container workloads a primary attack vector.
Palo Alto CVE-2026-0300: 5,800 Exposed Firewalls and 70,000 Customers at Risk
Palo Alto Networks confirmed active exploitation of CVE-2026-0300 in targeted attacks against internet-exposed PA-Series and VM-Series firewalls. The company's firewall products protect an estimated 70,000 organizations globally. A Shodan survey at the time of disclosure identified 5,800 VM-Series instances with authentication portals directly accessible from the internet: 2,466 in Asia and 1,998 in North America, per BleepingComputer reporting.
The vulnerability does not affect Cloud NGFW, Panorama appliances, or firewalls whose authentication portals are restricted to internal trusted networks. Organizations that have followed Palo Alto's hardening guidance and blocked portal access from untrusted interfaces are not exposed. The confirmed attack surface is specifically Captive Portal and User-ID Authentication Portal interfaces accessible from public or untrusted network segments.
Patches became available on May 13, 2026. Any organization running PA-Series or VM-Series firewalls with internet-accessible authentication portals that has not yet applied the May 13 PAN-OS update is an active target. Automated scanning tools can identify and exploit vulnerable instances without prior reconnaissance, meaning exposure risk scales directly with how long the unpatched portal remains internet-accessible.
Security teams auditing network perimeter exposure should also check NGINX server deployments for CVE-2026-42945 NGINX Rift, an 18-year-old heap overflow patched on the same May 13 date that allows unauthenticated root RCE on any nginx installation using rewrite directives with unnamed capture groups.
Apply the May 13 PAN-OS update as the complete fix. Immediately restrict authentication portal access to trusted internal networks through Device > User Identification > Authentication Portal Settings pending the patch window. Disable the portal entirely if the feature is not operationally required.
Subscribe to unlock Indicators of Compromise
Free subscribers unlock full IOC lists, remediation steps, and every daily briefing.
Briefings like this, every morning before 9am.
Threat intel, active CVEs, and campaign alerts, distilled for practitioners. 50,000+ subscribers. No noise.
Exchange Server CVE-2026-42897: CISA KEV Addition Confirms Active Exploitation
Microsoft Exchange Server CVE-2026-42897 is a cross-site scripting and spoofing vulnerability affecting Exchange Server 2016, 2019, and Subscription Edition across all update levels. CISA added CVE-2026-42897 to its Known Exploited Vulnerabilities catalog on May 15, 2026, setting a federal remediation deadline of May 29, 2026 for Federal Civilian Executive Branch agencies, per The Hacker News reporting. Exchange Online and Microsoft 365 cloud mailboxes are not affected.
The CVSS score of 8.1 reflects the requirement for specific user interaction within OWA for exploitation to succeed. Attackers craft malicious emails targeting on-premises Exchange mailboxes. When recipients open the email in OWA under specific browser interaction conditions, arbitrary JavaScript executes within the authenticated session context. Successful exploitation gives attackers access to the victim's session tokens, inbox contents, contacts, and calendar data without authenticating to Exchange. Attackers can chain captured session tokens with additional access attempts against downstream applications that accept Exchange authentication.
Microsoft has not yet released a permanent patch for CVE-2026-42897. Two interim mitigations are available. The Exchange Emergency Mitigation Service (EEMS), enabled by default, has automatically deployed a mitigation rule to on-premises Exchange servers. Verify EEMS status with the Get-ExchangeDiagnosticInfo PowerShell cmdlet. Organizations that have disabled EEMS should apply the mitigation manually using the Exchange on-premises Mitigation Tool (EOMT).
The May 29 CISA deadline applies to federal agencies, but any on-premises Exchange organization that has not deployed EEMS mitigations faces the same active exploitation risk. Hybrid deployments maintaining on-premises Exchange servers for directory synchronization while running cloud mailboxes remain at risk through those on-premises components.
Subscribe to unlock Indicators of Compromise
Free subscribers unlock full IOC lists, remediation steps, and every daily briefing.
Linux CVE-2026-31431 Copy Fail: Docker and Kubernetes Containers Escalate to Root
Linux kernel CVE-2026-31431, named Copy Fail by Microsoft Security Research, affects every Linux distribution shipped since 2017 and carries a CVSS score of 7.8. Container environments running Docker, LXC, or Kubernetes face elevated risk because those platforms grant container processes access to the AF_ALG subsystem by default when the algif_aead module loads on the host kernel, lowering the exploitation barrier from local host access to container breakout.
A public 732-byte Python proof-of-concept exploit exists. Go and Rust reimplementations appeared in public repositories within days of the May 1 disclosure, per Microsoft Security Blog reporting. CISA required Federal Civilian Executive Branch agencies to patch by May 15, 2026, a deadline that passed three days ago. The patched kernel versions are 6.18.22, 6.19.12, and 7.0.
The attack corrupts the kernel's in-memory page cache, modifying privileged binaries such as /usr/bin/su at execution time without writing to disk. File integrity monitoring tools that watch on-disk binaries do not detect the attack during active exploitation. Code injection into /usr/bin/su or similar privileged binaries completes root acquisition.
Organizations running cloud workloads in AWS, GCP, or Azure must verify host Linux kernel versions for all instances. Managed Kubernetes services that expose node kernel access require per-node verification. Fully managed serverless environments where tenants cannot access the host kernel should confirm cloud provider patch status directly.
Run uname -r on each host to verify the installed kernel version. Update through the distribution package manager: apt update and apt upgrade on Ubuntu and Debian, dnf update kernel on RHEL and CentOS, apk upgrade on Alpine Linux. For Kubernetes, drain each node with kubectl drain before the kernel update and return it to the pool once the patched version is confirmed.
Subscribe to unlock Indicators of Compromise
Free subscribers unlock full IOC lists, remediation steps, and every daily briefing.
ShinyHunters Canvas Breach: 275 Million Education Records in Active Criminal Hands
ShinyHunters, the criminal extortion group linked to data breaches at three Ivy League institutions in late 2025, compromised Instructure's Canvas learning management system over the weekend of May 7-8, 2026 and exposed personal data for over 275 million students, teachers, and staff across nearly 9,000 schools worldwide, per GovTech reporting. Roughly 41 percent of North American colleges and universities use Canvas, making this the largest confirmed education-sector breach in history.
Students and staff logging into Canvas on May 7 encountered a pop-up ransom demand giving users until May 12 to contact ShinyHunters or face public data disclosure. Confirmed affected institutions include Wake County Schools, Duke University, and the University of North Carolina at Chapel Hill. Instructure confirmed that personal data for current staff and students was accessed but stated there is no indication that passwords, dates of birth, government identifiers, or financial information were involved.
The May 12 ransom deadline has passed. ShinyHunters has followed through on public data disclosure threats in prior incidents. Security teams at organizations connected to Canvas-using institutions should treat affected email addresses as active in criminal circulation and prepare for elevated phishing targeting against education-sector email addresses over the next 90 days.
The absence of confirmed password exposure does not eliminate risk. Names, institutional email addresses, and enrollment data are sufficient for targeted spear-phishing campaigns and credential stuffing attacks against reused passwords on non-Canvas platforms.
Cross-reference Canvas-affiliated email addresses from your organization against Have I Been Pwned and BreachSense to identify overlapping credential exposures. The 16 billion credential compilation covered this week included education-sector addresses that can overlap with Canvas-exposed accounts.
“ShinyHunters claimed its attack on Instructure affected nearly 9,000 schools worldwide and exposed personal identifying information for over 275 million students, teachers and staff.”
GovTech, May 2026
May 2026 Patch Tuesday: Three CVSS 9.8+ Flaws Among 118 CVEs Require Prioritization
Microsoft's May 2026 Patch Tuesday release, delivered on May 13, addressed 118 CVEs across Windows, Exchange, SQL Server, Office, and Dynamics 365. No vulnerabilities were confirmed exploited in the wild at time of release, per BleepingComputer reporting, making this a standard scheduled update cycle without a zero-day emergency component. Three CVEs carry CVSS scores of 9.8 or higher and require immediate prioritization ahead of the rest of the release.
CVE-2026-41089 is a stack-based buffer overflow in Windows Netlogon with a CVSS score of 9.8. Netlogon is the authentication protocol domain-joined Windows systems use to communicate with domain controllers. A buffer overflow in this component creates a pathway for unauthenticated remote code execution against any Netlogon service reachable from the network, making domain controllers a priority patching target.
CVE-2026-41096 is a heap overflow in the Windows DNS client triggered by a malicious DNS response, also carrying a CVSS score of 9.8. Any Windows endpoint querying a compromised or attacker-controlled DNS server is a candidate for exploitation once a reliable proof-of-concept is available. DNS-based exploitation paths have historically reached weaponization quickly after patch analysis reveals the overflow offset.
CVE-2026-42898 is a remote code execution vulnerability in on-premises Microsoft Dynamics 365 with a CVSS score of 9.9 and no user interaction requirement. Organizations running on-premises Dynamics 365 deployments should treat this as the single highest priority item from the entire May Patch Tuesday release.
Apply the May 2026 Patch Tuesday updates this week across all Windows systems, Exchange servers, and Dynamics 365 on-premises deployments. Use Windows Update, WSUS, or SCCM to confirm patch compliance across managed endpoints. Patch Tuesday releases are cumulative, so the May update delivers all prior monthly fixes as well.
Subscribe to unlock Remediation & Mitigation steps
Free subscribers unlock full IOC lists, remediation steps, and every daily briefing.
Why This Weekly Cybersecurity Threat Roundup Demands Immediate Monday Action
This week's threat landscape is defined by a convergence of credential-free exploitation paths that makes the risk unusually acute. CVE-2026-0300 on Palo Alto PAN-OS, CVE-2026-42945 on NGINX (patched May 13), and CVE-2026-31431 on Linux all allow attackers who can reach the vulnerable service over the network to achieve root or system-level access without credentials. Three unauthenticated critical exploitation paths landing in a single week is statistically uncommon and operationally severe.
Security operations teams should sequence Monday morning actions in this order. First: verify that Palo Alto firewall authentication portals are restricted to internal trusted networks and confirm the May 13 PAN-OS patch is applied across all PA-Series and VM-Series devices. Second: verify Exchange EEMS mitigation status for CVE-2026-42897 by running Get-ExchangeDiagnosticInfo on each on-premises Exchange server. Third: confirm Linux kernel versions across all Linux infrastructure are at 6.18.22 or later with uname -r. Fourth: alert security awareness and phishing response teams that Canvas-affiliated email addresses from your organization are now in active criminal circulation. Fifth: begin May 2026 Patch Tuesday deployment across all Windows infrastructure with Dynamics 365 on-premises servers as the first priority.
Nation-state threat activity adds further urgency this week. Russia-linked APT Secret Blizzard converted the long-running Kazuar backdoor into a modular peer-to-peer botnet this week, enhancing persistence and attribution evasion for future operations targeting government and defense organizations. While Kazuar operations historically focus on government and defense verticals, the infrastructure modernization signals continued high-tempo Russian state threat activity heading into summer 2026.
The ShinyHunters Canvas breach extends the group's established pattern of large-scale identity harvesting at education institutions followed by targeted phishing against the same user population. Organizations with staff or student connections to any Canvas-using institution should prepare for increased social engineering risk against education-sector email addresses across the next quarter.
The bottom line
The weekly cybersecurity threat roundup for May 18, 2026 requires five Monday morning actions from your security team. Patch PAN-OS for CVE-2026-0300, deploy Exchange EEMS mitigations for CVE-2026-42897, update Linux kernels to 6.18.22 or later for CVE-2026-31431, alert phishing defenses for 275 million Canvas-exposed records, and apply May 2026 Patch Tuesday across all Windows infrastructure. Three unauthenticated critical exploitation paths converging in one week requires no threat modeling debate. Open a change ticket for each of the five actions above before end of business today.
Frequently asked questions
What are the most critical vulnerabilities to patch this week?
Three vulnerabilities require immediate action on May 18, 2026. CVE-2026-0300 in Palo Alto PAN-OS allows unauthenticated root-level remote code execution on internet-exposed firewalls and is confirmed under active exploitation. CVE-2026-42897 in on-premises Exchange Server enables arbitrary JavaScript execution via crafted emails and was added to the CISA KEV catalog on May 15. CVE-2026-31431 in the Linux kernel allows privilege escalation to root and is exploitable from inside Docker and Kubernetes containers.
Is Palo Alto CVE-2026-0300 being actively exploited?
Yes. Palo Alto Networks confirmed active exploitation of CVE-2026-0300 in limited attacks targeting internet-exposed PA-Series and VM-Series firewalls. Shodan data at the time of disclosure showed 5,800 VM-Series instances with exposed authentication portals. Patches were released on May 13, 2026. Organizations that have not applied the May 13 update and have internet-accessible Captive Portal or User-ID Authentication Portal interfaces are confirmed active targets.
Does CVE-2026-42897 affect Exchange Online?
No. CVE-2026-42897 affects only on-premises Exchange Server deployments: Exchange Server 2016, Exchange Server 2019, and Exchange Server Subscription Edition across all update levels. Organizations fully migrated to Exchange Online or Microsoft 365 cloud mailboxes face no exposure from this CVE. Hybrid deployments that maintain on-premises Exchange servers for directory synchronization remain at risk through those on-premises components.
How do I check if my Linux servers are vulnerable to the Copy Fail exploit?
Run uname -r on each Linux host and compare the output against the patched versions: 6.18.22, 6.19.12, or 7.0. Systems running kernel versions below these thresholds are vulnerable. For container workloads, the kernel version inside a container reflects the host kernel, so patching the host protects all containers on that host. In Kubernetes environments, run kubectl get nodes -o wide to identify node kernel versions across the cluster and prioritize patch scheduling for unpatched nodes.
Was the Canvas LMS data breach confirmed by Instructure?
Yes. Instructure confirmed on May 7, 2026 that personal data for current students and staff was accessed in the breach. Instructure stated that passwords, dates of birth, government identifiers, and financial information were not involved. ShinyHunters claimed the breach affected nearly 9,000 schools worldwide and exposed data for over 275 million students, teachers, and staff. The ransom deadline ShinyHunters set for May 12 has passed, making public disclosure of stolen data likely.
What is the patch status for Palo Alto CVE-2026-0300?
Palo Alto Networks released patches for CVE-2026-0300 on May 13, 2026. Organizations should apply the update through the standard PAN-OS software update process. As an immediate mitigation while patching is scheduled, restrict authentication portal access to trusted internal networks through Device > User Identification > Authentication Portal Settings. Disabling the portal entirely if it is not operationally required eliminates the attack surface completely until the patch can be applied.
How do I remediate CVE-2026-31431 on Docker and Kubernetes environments?
Patch the host Linux kernel to version 6.18.22, 6.19.12, or 7.0 or later through your distribution package manager. On Ubuntu and Debian, run apt update and apt upgrade. On RHEL and CentOS, run dnf update kernel. On Alpine Linux, run apk upgrade. After patching the host kernel, all containers on that host inherit the patched kernel automatically. For Kubernetes nodes, drain each node with kubectl drain before the kernel update and return it to the pool after confirming the patched version with uname -r.
What data was exposed in the ShinyHunters Canvas breach?
Instructure confirmed that personal data for current students and staff was accessed. Specific data types confirmed include names and institutional information associated with Canvas accounts. Instructure stated there is no indication that passwords, dates of birth, government identification numbers, or financial information were involved. ShinyHunters claimed broadly scoped student and staff records across 9,000 schools. Security teams should treat any email addresses associated with Canvas-using institutions as high-value phishing targets for the next 90 days.
Sources & references
Free resources
Critical CVE Reference Card 2025–2026
25 actively exploited vulnerabilities with CVSS scores, exploit status, and patch availability. Print it, pin it, share it with your SOC team.
Ransomware Incident Response Playbook
Step-by-step 24-hour IR checklist covering detection, containment, eradication, and recovery. Built for SOC teams, IR leads, and CISOs.
Get threat intel before your inbox does.
50,000+ security professionals read Decryption Digest for early warnings on zero-days, ransomware, and nation-state campaigns. Free, weekly, no spam.
Unsubscribe anytime. We never sell your data.

Founder & Cybersecurity Evangelist, Decryption Digest
Cybersecurity professional with expertise in threat intelligence, vulnerability research, and enterprise security. Covers zero-days, ransomware, and nation-state operations for 50,000+ security professionals weekly.
The Mythos Brief is free.
AI that finds 27-year-old zero-days. What it means for your security program.
