An attacker exploiting either vulnerability could gain full control of a Windows system — including VPN gateways, domain infrastructure, and encrypted communications endpoints — without needing any credentials or employee interaction. For organizations relying on IPSec or VPN for remote access or site-to-site connectivity, successful exploitation could sever secure communications, expose internal network segments, or enable ransomware deployment across connected systems. Regulatory exposure is elevated for any organization subject to data protection requirements where network infrastructure controls are a compliance dependency.
You Are Affected If
You run Windows systems with the IKEv2 service (ikeext.dll) active — present by default on systems using VPN or IPSec
You run Windows systems with IPSec enabled alongside IPv6 (tcpip.sys exposure for CVE-2026-33827)
Your IKE/IPSec endpoints are reachable from the internet or untrusted network segments without strict IP allowlisting
You have not applied the May 2026 Patch Tuesday cumulative update to affected Windows systems
You operate site-to-site VPN tunnels, remote access VPN infrastructure, or IPSec-secured network segments on Windows
Board Talking Points
Microsoft disclosed two critical vulnerabilities in core Windows networking components that allow attackers to take full control of affected systems remotely, without any credentials or employee action.
IT security teams should apply the May 2026 Microsoft security update to all affected systems within 24-72 hours, prioritizing internet-facing and VPN infrastructure.
Organizations that do not patch remain exposed to full system compromise on any Windows system running VPN or IPSec services, with no warning and no authentication barrier for an attacker.
HIPAA — Windows IPSec/VPN infrastructure frequently secures ePHI in transit; compromise of these components could constitute a breach of transmission security controls under the HIPAA Security Rule (45 CFR § 164.312(e))
PCI-DSS — IPSec tunnels used to segment or transmit cardholder data environments fall under PCI-DSS network security controls; exploitation could violate segmentation and encryption requirements
NERC CIP — Operational technology environments using Windows-based VPN or IPSec for Electronic Security Perimeter access may have direct exposure under CIP-007 and CIP-005 requirements