Microsoft Patches SharePoint Zero-Day and 168 Other Vulnerabilities

Microsoft has released patches for 169 vulnerabilities, including a critical zero-day in SharePoint. This highlights ongoing security challenges for users. Immediate action is recommended to mitigate risks.

VulnerabilitiesHIGHUpdated: Published:
Featured image for Microsoft Patches SharePoint Zero-Day and 168 Other Vulnerabilities

Original Reporting

THThe Hacker News

AI Summary

CyberPings AI·Reviewed by Rohit Rana

🎯Basically, Microsoft fixed a lot of security holes, including one that hackers were actively using.

What Happened

On April 15, 2026, Microsoft announced a significant update addressing 169 security vulnerabilities across its product portfolio. This includes a zero-day vulnerability in Microsoft SharePoint that has been actively exploited in the wild. Among the vulnerabilities, eight are rated Critical, while 157 are Important. This marks one of the largest Patch Tuesdays in recent history.

The Flaw

The zero-day vulnerability, identified as CVE-2026-32201, is a spoofing vulnerability affecting Microsoft SharePoint Server. It arises from improper input validation, allowing unauthorized attackers to spoof trusted content over a network. This vulnerability has a CVSS score of 6.5, indicating a moderate risk level. Exploiting it could allow attackers to view sensitive information and manipulate how it is presented to users, potentially leading to broader attacks.

What's at Risk

The implications of this vulnerability are significant, especially for organizations using SharePoint. Attackers could trick users into trusting malicious content, which could facilitate further exploitation. Additionally, the CVE-2026-33825 vulnerability in Microsoft Defender, rated at 7.8, allows privilege escalation, posing risks to systems relying on Defender for security.

Patch Status

Microsoft has released patches for all identified vulnerabilities, including the zero-day. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added CVE-2026-32201 to its Known Exploited Vulnerabilities (KEV) catalog, mandating that federal agencies remediate it by April 28, 2026. Organizations should prioritize applying these updates to mitigate risks associated with these vulnerabilities.

Immediate Actions

  1. Update Microsoft Products: Ensure all Microsoft products are updated with the latest patches.
  2. Monitor for Exploits: Keep an eye on network activity for signs of exploitation related to these vulnerabilities.
  3. Educate Users: Train staff on recognizing phishing attempts that may exploit the spoofing vulnerability.

Conclusion

The release of these patches underscores the ongoing security challenges organizations face. With the rise in vulnerabilities, especially those related to privilege escalation and remote code execution, proactive measures are essential to safeguard sensitive data and maintain system integrity.

🔒 Pro Insight

🔒 Pro insight: The active exploitation of CVE-2026-32201 highlights the urgent need for organizations to prioritize timely patching and user education.

THThe Hacker News
Read Original

Related Pings