April Patch Tuesday - Critical Vulnerabilities Uncovered, Including Two Zero-Days

April 2026's Patch Tuesday has revealed critical vulnerabilities, including two zero-day exploits in Microsoft products, necessitating immediate action from IT security teams.

VulnerabilitiesCRITICALUpdated: Published: πŸ“° 3 sources
Featured image for April Patch Tuesday - Critical Vulnerabilities Uncovered, Including Two Zero-Days

Original Reporting

CSCSO Online

AI Summary

CyberPings AIΒ·Reviewed by Rohit Rana

🎯This month, Microsoft found a lot of problems in their software that hackers could use to break in. Two of these problems are so serious that hackers are already using them, so it's super important for companies to fix them right away.

What Happened

April 2026's Patch Tuesday has unveiled a staggering 164 vulnerabilities, a notable increase from previous months, with two of these being actively exploited zero-days. Among the most critical vulnerabilities are CVE-2026-32201, a spoofing vulnerability in Microsoft SharePoint Server, and CVE-2026-33825, an elevation of privilege vulnerability in Microsoft Defender. Both vulnerabilities present serious risks to organizations, with the SharePoint flaw allowing unauthenticated remote attackers to manipulate sensitive information.

The Flaw

CVE-2026-32201, affecting multiple versions of SharePoint Server, has been assigned a CVSS score of 6.5. It stems from improper input validation, allowing attackers to perform spoofing attacks without needing user interaction. Microsoft confirmed that active exploitation of this vulnerability has been detected in the wild, emphasizing the urgency for organizations to apply the security patches released on April 14, 2026.

CVE-2026-33825, on the other hand, carries a higher CVSS score of 7.8 and allows local attackers to elevate their privileges within Microsoft Defender. This vulnerability was publicly disclosed prior to the patch release, and while there is no evidence of active exploitation, the existence of proof-of-concept exploit code raises concerns about potential future attacks.

What's at Risk

The vulnerabilities primarily affect enterprise environments using Microsoft products, particularly those utilizing SharePoint for collaboration and Microsoft Defender for security. The exploitation of these vulnerabilities could lead to unauthorized access to sensitive data, manipulation of documents, and potentially full domain takeover in the case of the elevation of privilege flaw.

Patch Status

Microsoft has released security updates for all affected products, including:

  • SharePoint Server Subscription Edition β€” KB5002853
  • SharePoint Server 2019 β€” KB5002854
  • SharePoint Enterprise Server 2016 β€” KB5002861 Organizations are urged to treat these patches as emergency updates and apply them immediately.

Immediate Actions

  1. Apply the respective security updates for all affected SharePoint Server versions.
  2. Audit SharePoint Server access logs for unusual activity.
  3. Restrict external-facing SharePoint instances until patches are applied.
  4. Monitor threat intelligence feeds for indicators of compromise (IOCs).
  5. Ensure that Microsoft Defender is properly configured to receive timely updates.

Risk Analysis

This month, the leading risk type is elevation of privilege, with 93 patches addressing this issue, followed by remote code execution and information disclosure vulnerabilities. The sheer volume of vulnerabilities patched this month underscores the growing complexity of the threat landscape, as organizations must navigate multiple critical patches simultaneously.

Source Perspectives

  • Technical: Microsoft’s advisory highlights the critical nature of CVE-2026-32201, emphasizing its exploitation status and the need for immediate patching. (Source: Microsoft Security Advisory)
  • Business Impact: Experts warn that the exploitation of these vulnerabilities could lead to significant data breaches, impacting organizational integrity and trust. (Source: CrowdStrike Blog)
  • Policy: The increase in vulnerabilities this month raises questions about software security practices and the need for robust patch management strategies. (Source: Cybersecurity Policy Review)

πŸ”’ Pro Insight

With the number of vulnerabilities almost tripling compared to previous months, organizations must prioritize patch management and enhance their security posture to mitigate risks effectively.

πŸ“… Story Timeline

Story broke by CSO Online

Covered by Cyber Security News

Covered by CrowdStrike Blog

Related Pings