Patch Now: Microsoft April Patch Tuesday Update Fixes 2 Zero Days

Share:

April 2026 is the second-largest Microsoft Patch Tuesday on record (247 total CVEs). ZDI and Rapid7 analysts attribute the surge, particularly the ~60 browser vulnerabilities included via Chromium, to AI-assisted vulnerability discovery. The Patch Tuesday addressed two significant 0-day vulnerabilities. CVE-2026-32201 is a SharePoint Spoofing vulnerability that has been actively exploited in the wild. CVE-2026-33825 is an Elevation of Privilege (EoP) vulnerability in Microsoft Defender that was publicly disclosed prior to a fix being available.

Severity: Critical

Vulnerability Overview

1. CVE-2026-32201 – SharePoint Spoofing

  • This is the higher operational priority despite its lower CVSS score (6.5).
  • The root cause is improper input validation (CWE-20) in SharePoint’s network-facing layer, requiring zero authentication and zero user interaction, making it trivially scalable.
  • The post-exploitation impact is limited to data view/modification (no availability impact), suggesting it is likely being used for credential theft, session hijacking, or reconnaissance rather than destructive attacks.
  • Affected Products: SharePoint Server Subscription Edition, 2019, and 2016.

2. CVE-2026-33825 — Microsoft Defender EoP

  • A proof-of-concept is publicly available, and the vulnerability is rated “Exploitation More Likely” by Microsoft.
  • It is a local privilege escalation to SYSTEM via insufficient access control granularity in the Defender platform meaning an attacker who has already gained a foothold (perhaps via the SharePoint flaw) could chain this to fully compromise the host.
  • This chaining scenario makes the two vulnerabilities particularly dangerous together. Remediation is largely automatic if Defender’s update mechanism is working, but fleet-wide verification is essential.
  • Affected Products: Microsoft Defender Antimalware Platform versions prior to 4.18.26030.3011.

Other Notable Microsoft Cves

1. CVE-2026-33827 (Wormable candidate, CVSS 8.1, Windows TCP/IP remote code execution)

Remote, unauthenticated RCE with no user interaction potentially wormable on systems with IPv6 + IPSec enabled. Race condition limits reliability but ZDI notes race conditions are routinely exploited at Pwn2Own. Patch before public exploits emerge.

2. CVE-2026-33824 (Wormable candidate, CVSS 9.8, Windows IKE service extensions RCE)

Second wormable-class bug this month. Affects systems with IKE enabled. External attack blocked by filtering UDP 500/4500 at the perimeter, but insider lateral movement remains possible. Enterprises using IKE should prioritise.

3. CVE-2026-26149 (Security bypass, CVSS 9.0, Microsoft Power Apps security feature bypass)

Allows attackers to bypass a security warning and trick users into triggering external protocol calls that perform unintended device actions. Social engineering + protocol abuse vector.

4. CVE-2026-23670 (Virtualization-Based Security (VBS) bypass, CVSS 5.7)

Allows a compromised Windows kernel (VTL0) to manipulate memory in the secure kernel (VTL1) — breaking VBS isolation guarantees. ZDI calls this the most interesting security-bypass of the month. Undermines hardware-backed security assumptions.

Recommendations

  1. Prioritise SharePoint patching immediately. Apply the relevant KB for your SharePoint version (SE: 5002853, 2019: 5002854, 2016: 5002861). If patching is delayed, restrict external network access to SharePoint and enable enhanced logging on SharePoint ULS and WAF for spoofing indicators.
  2. Microsoft Defender typically auto-updates. Confirm all endpoints are running Antimalware Platform ≥ v4.18.26030.3011.
  3. Test and deploy TCP/IP and IKE patches urgently. Interim: block UDP 500/4500 at the perimeter for IKE. Monitor for public exploit code, which has not yet appeared but is likely to emerge given the wormable class.
  4. Users should update their Chromium-based browsers to the latest version.

Source:

  • https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-32201
  • https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-33825
  • https://www.zerodayinitiative.com/blog/2026/4/14/the-april-2026-security-update-review
  • https://krebsonsecurity.com/2026/04/patch-tuesday-april-2026-edition/

Enjoyed reading this Threat Intelligence Advisory? Stay updated with our latest exclusive content by following us on Twitter and LinkedIn

No related posts found.

Ampcus Cyber
Privacy Overview

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.

Talk to an expert