Microsoft released its May 2026 Patch Tuesday on Wednesday 13 May with 120 CVEs addressed and no zero-days exploited in the wild, breaking a 22-month streak in which every Patch Tuesday since July 2024 had contained at least one zero-day 1 2. BleepingComputer, which tracks the monthly cycle alongside Microsoft Security Response Center disclosures, recorded the gap as the first scheduled release in the streak without an actively exploited flaw.
The headline broke before the picture settled. Within 48 hours of the release, CISA added two further CVEs to the Known Exploited Vulnerabilities catalogue outside the scheduled window: CVE-2026-20182 in Cisco SD-WAN on Thursday 14 May, and CVE-2026-42897 in Exchange Server's Outlook Web Access on Friday 15 May. Both were actively exploited; only the Cisco flaw had a vendor patch. The Exchange addition mirrored the Palo Alto out-of-band pattern that opened May and ran alongside the Microsoft LSASS out-of-band fix issued in April .
For security operations Teams, the signal-quality question matters. Patch Tuesday was the predictable artefact around which monthly vulnerability-management work was scheduled. A clean Patch Tuesday next to two out-of-band KEVs within two days does not show improved vendor security posture; it shows that the exploitation timeline has decoupled from the scheduled release. The defensive cadence assumption (a 30-day cycle around the second Tuesday of each month) no longer maps to where the urgent disclosures actually arrive. Federal civilian agencies remain bound by Binding Operational Directive 22-01 regardless of when the KEV addition lands, and the Trump administration's FY27 proposal to cut CISA by $707 million does not change the issuance tempo, only the agency's capacity to enforce it.
