Microsoft threat watch

Security Update Guide, advisories, and patch watch.

Tracked items

20

Active or featured

20

Vendor

Microsoft

Vendor incident stream

Recent Microsoft watch items

Use this vendor page to review the latest official watch items, compare activity against your environment, and decide whether the next step is an assessment, service-owner conversation, or direct remediation planning.

activeApr 11, 2026, 8:02 AMCVE-2026-28390

Possible NULL Dereference When Processing CMS KeyTransportRecipientInfo (CVE-2026-28390)

Information published. Information published.

Customer action is required. Review the Security Update Guide entry, confirm affected Microsoft products, and prioritize patch validation or mitigation.

activeApr 11, 2026, 8:02 AMCVE-2026-28389

Possible NULL Dereference When Processing CMS KeyAgreeRecipientInfo (CVE-2026-28389)

Information published. Information published.

Customer action is required. Review the Security Update Guide entry, confirm affected Microsoft products, and prioritize patch validation or mitigation.

activeApr 11, 2026, 12:32 AMCVE-2026-5919

Chromium: CVE-2026-5919 Insufficient validation of untrusted input in WebSockets (CVE-2026-5919)

Information published.

Customer action is required. Review the Security Update Guide entry, confirm affected Microsoft products, and prioritize patch validation or mitigation.

activeApr 11, 2026, 12:32 AMCVE-2026-5918

Chromium: CVE-2026-5918 Inappropriate implementation in Navigation (CVE-2026-5918)

Information published.

Customer action is required. Review the Security Update Guide entry, confirm affected Microsoft products, and prioritize patch validation or mitigation.

activeApr 11, 2026, 12:32 AMCVE-2026-5915

Chromium: CVE-2026-5915 Insufficient validation of untrusted input in WebML (CVE-2026-5915)

Information published.

Customer action is required. Review the Security Update Guide entry, confirm affected Microsoft products, and prioritize patch validation or mitigation.

activeApr 11, 2026, 12:32 AMCVE-2026-5914

Chromium: CVE-2026-5914 Type Confusion in CSS (CVE-2026-5914)

Information published.

Customer action is required. Review the Security Update Guide entry, confirm affected Microsoft products, and prioritize patch validation or mitigation.

activeApr 11, 2026, 12:32 AMCVE-2026-5913

Chromium: CVE-2026-5913 Out of bounds read in Blink (CVE-2026-5913)

Information published.

Customer action is required. Review the Security Update Guide entry, confirm affected Microsoft products, and prioritize patch validation or mitigation.

activeApr 11, 2026, 12:32 AMCVE-2026-5912

Chromium: CVE-2026-5912 Integer overflow in WebRTC (CVE-2026-5912)

Information published.

Customer action is required. Review the Security Update Guide entry, confirm affected Microsoft products, and prioritize patch validation or mitigation.

activeApr 11, 2026, 12:32 AMCVE-2026-5911

Chromium: CVE-2026-5911 Policy bypass in ServiceWorkers (CVE-2026-5911)

Information published.

Customer action is required. Review the Security Update Guide entry, confirm affected Microsoft products, and prioritize patch validation or mitigation.

activeApr 11, 2026, 12:31 AMCVE-2026-5910

Chromium: CVE-2026-5910 Integer overflow in Media (CVE-2026-5910)

Information published.

Customer action is required. Review the Security Update Guide entry, confirm affected Microsoft products, and prioritize patch validation or mitigation.

activeApr 11, 2026, 12:31 AMCVE-2026-5909

Chromium: CVE-2026-5909 Integer overflow in Media (CVE-2026-5909)

Information published.

Customer action is required. Review the Security Update Guide entry, confirm affected Microsoft products, and prioritize patch validation or mitigation.

activeApr 11, 2026, 12:31 AMCVE-2026-5908

Chromium: CVE-2026-5908 Integer overflow in Media (CVE-2026-5908)

Information published.

Customer action is required. Review the Security Update Guide entry, confirm affected Microsoft products, and prioritize patch validation or mitigation.

activeApr 11, 2026, 12:31 AMCVE-2026-5907

Chromium: CVE-2026-5907 Insufficient data validation in Media (CVE-2026-5907)

Information published.

Customer action is required. Review the Security Update Guide entry, confirm affected Microsoft products, and prioritize patch validation or mitigation.

activeApr 11, 2026, 12:31 AMCVE-2026-5906

Chromium: CVE-2026-5906 Incorrect security UI in Omnibox (CVE-2026-5906)

Information published.

Customer action is required. Review the Security Update Guide entry, confirm affected Microsoft products, and prioritize patch validation or mitigation.

activeApr 11, 2026, 12:31 AMCVE-2026-5905

Chromium: CVE-2026-5905 Incorrect security UI in Permissions (CVE-2026-5905)

Information published.

Customer action is required. Review the Security Update Guide entry, confirm affected Microsoft products, and prioritize patch validation or mitigation.

activeApr 11, 2026, 12:31 AMCVE-2026-5904

Chromium: CVE-2026-5904 Use after free in V8 (CVE-2026-5904)

Information published.

Customer action is required. Review the Security Update Guide entry, confirm affected Microsoft products, and prioritize patch validation or mitigation.

activeApr 11, 2026, 12:31 AMCVE-2026-5903

Chromium: CVE-2026-5903 Policy bypass in IFrameSandbox (CVE-2026-5903)

Information published.

Customer action is required. Review the Security Update Guide entry, confirm affected Microsoft products, and prioritize patch validation or mitigation.

activeApr 11, 2026, 12:31 AMCVE-2026-5902

Chromium: CVE-2026-5902 Race in Media (CVE-2026-5902)

Information published.

Customer action is required. Review the Security Update Guide entry, confirm affected Microsoft products, and prioritize patch validation or mitigation.

activeApr 11, 2026, 12:31 AMCVE-2026-5901

Chromium: CVE-2026-5901 Policy bypass in DevTools (CVE-2026-5901)

Information published.

Customer action is required. Review the Security Update Guide entry, confirm affected Microsoft products, and prioritize patch validation or mitigation.

activeApr 11, 2026, 12:31 AMCVE-2026-5900

Chromium: CVE-2026-5900 Policy bypass in Downloads (CVE-2026-5900)

Information published.

Customer action is required. Review the Security Update Guide entry, confirm affected Microsoft products, and prioritize patch validation or mitigation.

Vendor watch FAQ

What is the Microsoft threat watch page?

It is the Microsoft-specific view inside ITECS Threat Radar, built to track recent advisories, incidents, and watch items that may affect Dallas-area business operations.

How should teams use the Microsoft watch page?

Use it to confirm whether current Microsoft issues overlap with your environment, prioritize remediation, and decide whether you need an assessment, managed security follow-through, or vendor-specific hardening work.

Can ITECS help respond to Microsoft security issues?

Yes. ITECS can help map Microsoft advisories against your systems, validate affected services, prioritize remediation, and connect the issue to broader managed cybersecurity or managed IT workflows.