← Back to BrewedIntel
vulnerabilitycriticalDenial of ServicePrivilege EscalationRemote Code ExecutionZero-dayCVE-2026-0390CVE-2026-23666

Apr 15, 2026 • Diksha Ojha

Microsoft Patch Tuesday, April 2026 Security Update Review

Microsoft's April 2026 Patch Tuesday addresses 163 vulnerabilities, including eight critical severity issues and one publicly disclosed zero-day actively...

Source
Qualys ThreatPROTECT
Category
vulnerability
Severity
critical

Executive Summary

Microsoft's April 2026 Patch Tuesday addresses 163 vulnerabilities, including eight critical severity issues and one publicly disclosed zero-day actively exploited in the wild. Significant flaws involve Remote Code Execution and Privilege Escalation across critical components like Windows Kernel, Active Directory, Microsoft Office, and Remote Desktop Client. CISA has added the SharePoint spoofing vulnerability to its Known Exploited Vulnerabilities Catalog, urging immediate patching before April 28, 2026. Exploitation could allow unauthenticated attackers to execute code over networks or elevate privileges locally. There are no specific threat actors or malware families identified in this bulletin, but the presence of active exploitation indicates heightened risk. Organizations must prioritize deploying these updates to mitigate risks of compromise, denial-of-service, and unauthorized access within their Microsoft ecosystems. Timely patching remains the primary defense against these widespread vulnerabilities.

Summary

April 2026’s Patch Tuesday arrives with Microsoft addressing a fresh set of vulnerabilities across its ecosystem, reinforcing the ongoing need for timely patching in an increasingly threat-heavy landscape. Here’s a quick breakdown of what you need to know. This month’s release addresses 163 vulnerabilities, including eight critical-severity vulnerabilities. In this month’s updates, Microsoft has addressed one publicly disclosed zero-day vulnerability and one being exploited … Continue reading "Microsoft Patch Tuesday, April 2026 Security Update Review"

Published Analysis

Microsoft's April 2026 Patch Tuesday addresses 163 vulnerabilities, including eight critical severity issues and one publicly disclosed zero-day actively exploited in the wild. Significant flaws involve Remote Code Execution and Privilege Escalation across critical components like Windows Kernel, Active Directory, Microsoft Office, and Remote Desktop Client. CISA has added the SharePoint spoofing vulnerability to its Known Exploited Vulnerabilities Catalog, urging immediate patching before April 28, 2026. Exploitation could allow unauthenticated attackers to execute code over networks or elevate privileges locally. There are no specific threat actors or malware families identified in this bulletin, but the presence of active exploitation indicates heightened risk. Organizations must prioritize deploying these updates to mitigate risks of compromise, denial-of-service, and unauthorized access within their Microsoft ecosystems. Timely patching remains the primary defense against these widespread vulnerabilities. April 2026’s Patch Tuesday arrives with Microsoft addressing a fresh set of vulnerabilities across its ecosystem, reinforcing the ongoing need for timely patching in an increasingly threat-heavy landscape. Here’s a quick breakdown of what you need to know. This month’s release addresses 163 vulnerabilities, including eight critical-severity vulnerabilities. In this month’s updates, Microsoft has addressed one publicly disclosed zero-day vulnerability and one being exploited … Continue reading "Microsoft Patch Tuesday, April 2026 Security Update Review" April 2026’s Patch Tuesday arrives with Microsoft addressing a fresh set of vulnerabilities across its ecosystem, reinforcing the ongoing need for timely patching in an increasingly threat-heavy landscape. Here’s a quick breakdown of what you need to know. This month’s release addresses 163 vulnerabilities, including eight critical-severity vulnerabilities. In this month’s updates, Microsoft has addressed one publicly disclosed zero-day vulnerability and one being exploited in the wild. Microsoft addressed 80 vulnerabilities in Microsoft Edge (Chromium-based) that were patched earlier this month. Microsoft Patch Tuesday, April edition, includes updates for vulnerabilities in Microsoft Graphics Component, Windows Kerberos, Windows Kernel, Windows Hyper-V, Microsoft Windows Speech, Remote Desktop Client, SQL Server, Azure Monitor Agent, Windows BitLocker, Microsoft Management Console, Windows IKE Extension, Microsoft Defender, Input-Output Memory Management Unit (IOMMU), and more. This month’s release includes fixes for several high-severity issues that could potentially enable remote code execution, privilege escalation, or denial-of-service attacks. As always, timely patch deployment is crucial to reduce exposure and ensure systems remain resilient against exploitation attempts. The April 2026 Microsoft vulnerabilities are classified as follows: Vulnerability Category Quantity Severitie s Spoofing Vulnerability 8 Important: 8 Denial of Service Vulnerability 9 Critical: 1 Important: 8 Elevation of Privilege Vulnerability 93 Important: 93 Information Disclosure Vulnerability 20 Important: 20 Remote Code Execution Vulnerability 20 Critical: 7 Important: 13 Security Feature Bypass Vulnerability 12 Important: 12 Zero-day Vulnerabilities Patched in April Patch Tuesday Edition CVE-2026-33825: Microsoft Defender Elevation of Privilege Vulnerability Microsoft Defender is a comprehensive, AI-powered security suite that provides malware protection, phishing detection, and web protection for individuals and businesses. An insufficient access-control granularity flaw in Windows Defender could allow an authenticated attacker to elevate local privileges. Insufficient Granularity of Access Control occurs when security policies are too broad, allowing authorized users to access data or perform actions beyond their intended permissions. CVE-2026-32201: Microsoft SharePoint Server Spoofing Vulnerability An improper input validation vulnerability in Microsoft Office SharePoint may allow an unauthenticated attacker to perform network spoofing. CISA acknowledged the active exploitation of the vulnerability by adding it to its Known Exploited Vulnerabilities Catalog . CISA urges users to patch the vulnerability before April 28, 2026. Critical Severity Vulnerabilities Patched in April Patch Tuesday Edition CVE-2026-32157: Remote Desktop Client Remote Code Execution Vulnerability A use-after-free flaw in the Remote Desktop Client may allow an unauthenticated attacker to execute code over the network. Successful exploitation of the vulnerability requires an authenticated user on the client to connect to a malicious server. CVE-2026-33826: Windows Active Directory Remote Code Execution Vulnerability An improper input validation flaw in Windows Active Directory could allow an authenticated attacker to execute code on an adjacent network. An attacker must send a specially crafted...

Linked Entities

  • CVE-2026-0390
  • CVE-2026-23666
  • CVE-2026-26151
  • CVE-2026-26169
  • CVE-2026-26173
  • CVE-2026-27906
  • CVE-2026-27908
  • CVE-2026-27909
  • CVE-2026-27913
  • CVE-2026-27914
  • CVE-2026-27921
  • CVE-2026-32070