Data from the 2026 Microsoft Vulnerabilities Report they reveal an uncomfortable truth for security equipment: it is not the total volume of CVE that determines the real risk of an organization, but the concentration of vulnerabilities that enable silent and high-impact attacks. In 2025 Microsoft published 1,273 vulnerabilities, a figure similar to previous years, but critical failures doubled (from 78 to 157), a clear sign that apparent stability in the total number can mask an increase in damage potential.
The most relevant pattern is the shift to vulnerabilities that facilitate the escalation of privileges and the filtration of information: Elevation of Privilege accounted for about 40% of the CVE, while the vulnerabilities of Information Disclosure increased by 73% per year. That is not harmless: an opponent who obtains credentials or chooses silent recognition routes can move laterally as a legitimate user, evade detection and maximize impact without the need for "noisy" exploits. This trend fits the techniques described in the MITRE ATT & CK framework, which prioritize persistent access and lateral movement ( MITRE ATT & CK).

Cloud and productivity platforms emerge as high-risk areas: Azure and Dynamics 365 saw a worrisome leap in critical vulnerabilities (from 4 to 37), and in Azure / Entre ID errors such as CVE-2025-55241 - an error that allowed forgery of accepted tokens in multiple tenants - which shows that a single misconfigured identity can deliver "the keys of the kingdom" to an attacker. Microsoft Office, for its part, increased its vulnerabilities by 234% and multiplied its critical CVE by ten; since Office is the usual point of contact with users, this amplifies the risk of entry via social engineering and malicious documents.
Servers remain priority objectives: Windows Server accumulated 780 vulnerabilities, 50 of them critical. Attacking servers offers attackers faster and deeper access than an isolated end point, because they generally run services with high privileges and support critical business processes. Therefore, relying only on "patching all the critical" does not guarantee protection if the architecture of identities and privileges remains weak.
The practical implications are clear: effective mitigation requires moving the focus from mere patch management to a strategy focused on reducing the blast radius and controlling identities and privileges. This involves auditing and eliminating permanent administrative permits, apply least privilege to human accounts and machines (including IA agents), and treat service accounts and agents with the same rigour as to real users. Many organizations still lack specific controls on the identity of IA agents and mechanisms to audit their tokens and real-time permits.
Priority actions should be contextual and continuous: prioritise corrections not by pure CVSS, but by the role of vulnerability in attack chains (does it facilitate climbing, lateral movement or access to control cloud plans?), map findings to frameworks such as MITRE ATT & CK and business scenarios, and apply immediate compensatory controls when a patch is not viable. These measures include the rotation and removal of permanent credentials, enabling MFA and Conditional Access in Azure AD, network segmentation to reduce lateral reach, and monitoring and specific alerts for atypical identity behavior.

At the technical-operational level, it is appropriate to strengthen detection and response with telemetry focused on identities and tokens (emission and validation log, service-principals anomalies), integrate privilege management tools (PAM / PSM), and monitor Office vectors (preview breads, macros, add-ins) that have again become relevant. It's not enough to park: You have to close the privilege climbing door and keep an eye on who has the keys and how you use them.. Resources such as NIST's National Vulnerability Catalogue (NVD) should be consulted for public reference on disclosure and fault monitoring ( NVD) and the Microsoft Security Response Center ( MSRC).
Finally, governance must incorporate the management of new actors in the perimeter of trust, especially IA agents. Without clear identity policies, minimum permissions and continuous visibility, these agents can become as dangerous climbing vectors as human accounts. The strategic recommendation is to move towards Zero Standing Privilege models, continuous entity management and prioritization based on business impact: that transforms the reactive patch response into a proactive strategy that reduces damage when critical vulnerabilities appear.
If your organization still bases its safety on CVE count metrics, it is time to change the board: look who can do what, in what context and with what easy a failure can transform a committed credential into a large-scale commitment. To further the findings and guidance of the analysis, you can download the full report here: 2026 Microsoft Vulnerabilities Report.
Related
More news on the same subject.

18-year-old Ukrainian youth leads a network of infostealers that violated 28,000 accounts and left $250,000 in losses
The Ukrainian authorities, in coordination with US agents. They have focused on an operation of infostealer which, according to the Ukrainian Cyber Police, was allegedly adminis...

RAMPART and Clarity redefine the safety of IA agents with reproducible testing and governance from the start
Microsoft has presented two open source tools, RAMPART and Clarity, aimed at changing the way the safety of IA agents is tested: one that automates and standardizes technical te...

The digital signature is in check: Microsoft dismands a service that turned malware into apparently legitimate software
Microsoft announced the disarticulation of a "malware-signing-as-a-service" operation that exploited its device signature system to convert malicious code into seemingly legitim...

A single GitHub workflow token opened the door to the software supply chain
A single GitHub workflow token failed in the rotation and opened the door. This is the central conclusion of the incident in Grafana Labs following the recent wave of malicious ...

WebWorm 2025: the malware that is hidden in Discord and Microsoft Graphh to evade detection
The latest observations by cyber security researchers point to a change in worrying tactics of an actor linked to China known as WebWorm: in 2025 it has incorporated back doors ...

Identity is no longer enough: continuous verification of the device for real-time security
Identity remains the backbone of many security architectures, but today that column is cracking under new pressures: advanced phishing, real-time proxyan authentication kits and...

The dark matter of identity is changing the rules of corporate security
The Identity Gap: Snapshot 2026 report published by Orchid Security puts numbers to a dangerous trend: the "dark matter" of identity - accounts and credentials that are neither ...