
SharePoint Server Critical Security Update (KB5002863) May 12, 2026: Patch Now
Microsoft released SharePoint Server security update KB5002863 on May 12, 2026 fixing 6 critical Remote Code Execution vulnerabilities including CVE-2026-40357. EPC Group urgent patching guide for SharePoint Server Subscription Edition, 2019, and 2016 environments.
Microsoft released SharePoint Server security update KB5002863 on May 12, 2026 fixing 6 critical Remote Code Execution vulnerabilities including CVE-2026-40357. EPC Group urgent patching guide for SharePoint Server Subscription Edition, 2019, and 2016 environments.

Microsoft released SharePoint Server security update KB5002863 on May 12, 2026, addressing 6 critical Remote Code Execution (RCE) vulnerabilities. This is an urgent patch for any organization still running SharePoint Server on-premises.
Patch immediately. CVEs addressed: CVE-2026-40357, CVE-2026-33112, CVE-2026-33110, CVE-2026-40368, CVE-2026-35439, CVE-2026-40367. These are RCE vulnerabilities — unauthenticated attackers can execute arbitrary code on unpatched SharePoint Server. EPC Group's recommended action: patch within 72 hours of bulletin release for any internet-exposed SharePoint farm.
If you're still running SharePoint on-premises (vs SharePoint Online), this affects you. SharePoint Online customers are protected by Microsoft's managed infrastructure.
SharePoint Server RCE vulnerabilities are exactly the attack pattern used in the 2023 0patch ToolShell incident and the 2025 Cuba ransomware campaigns targeting SharePoint farms. Once exploited:
The combination of (a) network-reachable application server + (b) high-privilege service account + (c) connected SQL + AD = catastrophic blast radius.
Hour 0-4: Inventory + risk assessment
Hour 4-24: Test environment patching
4. Apply KB5002863 to test farm
5. Validate functionality (sites, custom solutions, search, workflows)
6. Document any breakage + workaround
Hour 24-72: Production patching
7. Backup full SharePoint farm (config + content DBs + customizations) before patching
8. Apply KB5002863 to production farms during maintenance window
9. Run SharePoint Health Analyzer + verify clean
Day 4+: Post-patch hardening
10. Audit SharePoint service account permissions (least privilege)
11. Restrict SharePoint extranet access via Conditional Access or VPN
12. Enable Defender for Identity monitoring on SharePoint service accounts
13. Verify SharePoint search indexing healthy (sometimes broken by security updates)
If you're still on SharePoint on-premises in 2026, this CVE pattern will repeat. Microsoft is releasing security updates roughly monthly for SharePoint Server. Each patch is an operational event. Migration to SharePoint Online eliminates the patching burden entirely.
EPC Group SharePoint Online migration: 4-12 months depending on environment. See /blog/zero-loss-sharepoint-migration-runbook-2026 for the 32-step methodology. Cost typically pays back via operational savings within 18-24 months even before considering improved security posture.
Federal / DoD: SharePoint Server in GCC High needs patching with FedRAMP impact assessment.
Healthcare: SharePoint farms storing PHI need urgent patching. RCE exploitation = HIPAA breach event. 60-day breach notification clock starts on day of exploitation, not detection.
Financial Services: SharePoint farms in MNPI workflows + customer records need immediate patch. SEC Reg S-P + NYDFS 23 NYCRR 500 have prompt-patching requirements.
Manufacturing: SharePoint farms connected to OT networks (engineering drawings, IP, schematics) are high-value targets.
We're shipping emergency SharePoint Server patching engagements this week:
Typical scope: $40K-$120K depending on farm complexity (1-5 farm engagement).
Q: Should we patch in maintenance window or emergency?
A: If internet-exposed: emergency (within 72 hours). If internal-only with strong network segmentation: scheduled maintenance window within 7 days.
Q: What if our SharePoint farm has heavy custom code?
A: Apply patch to test farm first. Validate custom solutions still work. Most full-trust + sandboxed solutions survive patches but always validate.
Q: What about SharePoint 2013 or older?
A: SharePoint 2013 and older are end-of-life. Microsoft is NOT releasing patches. Migration to SharePoint Online (or at minimum Subscription Edition) is the only option.
Q: How do we know if we're already compromised?
A: Microsoft Defender for Identity + Defender for Endpoint on SharePoint servers + audit log review. If you're unsure, engage incident response BEFORE patching (patching destroys forensic evidence).
Q: Why EPC Group?
A: 29 years SharePoint consulting since SharePoint 2003 Beta Team. Microsoft Solutions Partner with all six designations under the Microsoft AI Cloud Partner Program. Microsoft Press author (multiple SharePoint inside-out volumes). See /reviews and /industries/healthcare for regulated-industry experience.
CEO & Chief AI Architect
Microsoft Press bestselling author with 29 years of enterprise consulting experience.
View Full ProfileMicrosoft Agent 365 became generally available May 1, 2026. New Registry Sync preview connects AWS Bedrock + Google Cloud agents for unified governance. Agent approval flow, network controls, $15/user/mo standalone or bundled in M365 E7. EPC Group governance breakdown.
Microsoft NewsMicrosoft added GPT 5.5 Instant to Microsoft 365 Copilot in May 2026. Lower latency for common work questions, image-based inputs, and STEM tasks. What this changes for enterprise rollout + governance + EPC Group recommendations.
Microsoft NewsMicrosoft Power BI May 2026 update brings the redesigned Power Query Get Data experience (Preview), Card with States improvements, Copilot enhancements, and consistency across Fabric + Power BI Desktop + Excel. EPC Group breakdown + adoption guide.
Our team of experts can help you implement enterprise-grade microsoft news solutions tailored to your organization's needs.