Microsoft April 2026 Patch Tuesday - 163 CVEs Addressed

Microsoft's April 2026 Patch Tuesday has fixed 163 CVEs, including critical vulnerabilities. Users across various sectors must act quickly to patch their systems and mitigate risks.

VulnerabilitiesHIGHUpdated: Published:
Featured image for Microsoft April 2026 Patch Tuesday - 163 CVEs Addressed

Original Reporting

AI Summary

CyberPings AI·Reviewed by Rohit Rana

🎯Basically, Microsoft fixed many security flaws in their software to keep users safe.

What Happened

In April 2026, Microsoft released its Patch Tuesday update, addressing a staggering 163 CVEs (Common Vulnerabilities and Exposures). This release included eight critical vulnerabilities, 154 important, and one moderate. Notably, it was the second-largest Patch Tuesday to date, just shy of the record set in October 2025.

Among the patched vulnerabilities were two zero-day exploits, one of which was actively exploited in the wild. The vulnerabilities spanned various Microsoft products, including Windows, Microsoft Office, and Azure services.

Key Vulnerabilities

CVE-2026-32201

One of the critical vulnerabilities, CVE-2026-32201, is a spoofing vulnerability affecting Microsoft SharePoint. It received a CVSS score of 6.5 and was exploited in real-world attacks. Microsoft has released updates for SharePoint 2016, 2019, and the Subscription Edition to mitigate this risk.

CVE-2026-33824

Another critical flaw, CVE-2026-33824, affects the Windows Internet Key Exchange (IKE) Service Extensions. With a CVSS score of 9.8, this vulnerability can be exploited by unauthenticated attackers sending crafted packets. Microsoft recommends implementing firewall rules as a temporary mitigation.

CVE-2026-33825

CVE-2026-33825, an elevation of privilege vulnerability in Microsoft Defender, was disclosed publicly before a patch was available. It has a CVSS score of 7.8 and is believed to be linked to a zero-day exploit known as BlueHammer.

Who's Affected

The vulnerabilities affect a wide range of Microsoft products, impacting users across various sectors, including government, healthcare, and finance. Organizations using Microsoft services should prioritize patching to safeguard their systems.

What You Should Do

  1. Update Immediately: Ensure that all Microsoft products are updated with the latest patches.
  2. Monitor Systems: Regularly scan your environment for any unpatched systems.
  3. Implement Mitigations: For critical vulnerabilities, apply recommended mitigations if immediate patching isn't feasible.
  4. Stay Informed: Follow Microsoft’s security advisories for updates on vulnerabilities and patches.

By addressing these vulnerabilities promptly, organizations can significantly reduce their risk of exploitation and enhance their overall security posture.

🔒 Pro Insight

🔒 Pro insight: The presence of multiple zero-days indicates a heightened urgency for organizations to prioritize patch management and vulnerability assessments.

Related Pings