
π―Microsoft just released a big update to fix security holes in its software. Some of these holes are really dangerous and could let bad guys trick people or take control of their computers. It's super important for everyone to update their software right away to stay safe.
The Flaw
Microsoft's April 2026 Patch Tuesday security update has fixed a total of 168 vulnerabilities, with eight rated as critical. Among these, two zero-day vulnerabilities have been identified: CVE-2026-32201, a SharePoint Server Spoofing Vulnerability, and CVE-2026-33825, an Elevation of Privilege Vulnerability in Microsoft Defender. CVE-2026-32201 is particularly concerning as it is currently being exploited in the wild, allowing unauthorized attackers to perform spoofing over a network and potentially access sensitive information. Microsoft has assigned it an βimportantβ severity rating with a CVSS score of 6.5, indicating a significant risk. CVE-2026-33825, disclosed publicly before the patch release, has a CVSSv3 score of 7.8.
What's at Risk
CVE-2026-32201 allows attackers to conduct spoofing attacks against SharePoint environments, posing significant risks for organizations that rely on SharePoint for document management. The potential for data alteration adds another layer of concern. CVE-2026-33825, while not currently exploited, has been flagged as having a high risk following its public disclosure. Additionally, critical Remote Code Execution (RCE) vulnerabilities, such as CVE-2026-33826 affecting Windows Active Directory and CVE-2026-33824 affecting the Windows Internet Key Exchange (IKE) Service, are of high concern due to their potential for exploitation without user interaction. Microsoft has also noted that 19 of the patched vulnerabilities have an exploitability rating of 'exploitation more likely', indicating a heightened risk of future attacks.
Patch Status
Microsoft's advisory indicates that the April 2026 update includes patches for a wide range of products, including Windows, Microsoft Office, and Azure services. The update is the second largest Patch Tuesday release, narrowly missing the record set in October 2025. Notably, the distribution of vulnerabilities includes 93 Elevation of Privilege vulnerabilities, 21 Information Disclosure vulnerabilities, and 20 Remote Code Execution vulnerabilities. CVE-2026-32201 has already been added to CISAβs Known Exploited Vulnerabilities (KEV) catalog, and federal agencies have been instructed to patch it by April 28.
Immediate Actions
Security teams should prioritize the following actions:
Containment
- 1.Apply the patch for CVE-2026-32201 immediately due to confirmed exploitation.
- 2.Address CVE-2026-33825 as it poses a high risk following its public disclosure.
- 3.Deploy all critical RCE patches, particularly for Windows TCP/IP, Active Directory, and Remote Desktop Client.
Remediation
- 4.Review and patch .NET Framework and Office components to mitigate local and document-based attack vectors.
- 5.Audit systems for vulnerabilities that could undermine update delivery and disk encryption integrity, such as CVE-2026-27913.
Additional Insights
The critical RCE vulnerabilities, particularly CVE-2026-33824, have received a CVSSv3 score of 9.8, indicating a high likelihood of exploitation. Microsoft has suggested implementing firewall rules for UDP ports 500 and 4500 as a temporary mitigation strategy until patches can be applied. Furthermore, the advisory highlights the importance of user awareness regarding potential spoofing attacks in Remote Desktop Protocol (RDP) files, which now include enhanced warning dialogues to prevent accidental exploitation. Organizations are strongly advised to conduct regular vulnerability assessments and ensure that all systems are updated promptly to minimize risks associated with these vulnerabilities.
This Patch Tuesday is significant not just for its size but also for the immediate risks associated with the zero-day vulnerabilities. Organizations need to act swiftly to safeguard their systems.



