Microsoft's April 2026 Patch Tuesday Addresses 164 CVEs, Including Two Zero-Days and a Critical RDP Flaw

Microsoft's April Patch Tuesday Fixes 164 Flaws, Including Actively Exploited SharePoint Zero-Day

HIGH
April 18, 2026
April 27, 2026
6m read
Patch ManagementVulnerability

Related Entities(initial)

Organizations

Products & Tech

Microsoft SharePoint Server Microsoft DefenderRemote Desktop ClientWindows BitLocker

CVE Identifiers

CVE-2026-32201
MEDIUM
CVSS:6.5
CVE-2026-33825
HIGH
CVSS:7.8
CVE-2026-33824
CRITICAL
CVSS:9.8
CVE-2026-32157
CRITICAL
CVSS:8.8
CVE-2026-27913
MEDIUM
CVE-2026-33827
HIGH
CVSS:8.1

Full Report(when first published)

Executive Summary

Microsoft has released its April 2026 Patch Tuesday security updates, delivering fixes for a substantial 164 new CVEs. This massive update addresses eight vulnerabilities rated as Critical and 154 as Important. Highlighting the urgency of this release, the patches include fixes for two zero-day vulnerabilities. The first, CVE-2026-32201, is a spoofing vulnerability in Microsoft SharePoint Server that is being actively exploited in the wild. The second, CVE-2026-33825, is a publicly disclosed privilege escalation flaw in Microsoft Defender. Additionally, the update mitigates several other critical remote code execution (RCE) risks, including a 9.8 CVSS flaw in the Windows IKE service and a critical bug in the Remote Desktop Client, making this a critical patch cycle for all Windows administrators.

Vulnerabilities Addressed

This Patch Tuesday is one of the largest in recent memory, underscoring a wide range of threats to the Windows ecosystem.

Zero-Day Vulnerabilities

  • CVE-2026-32201 - Microsoft SharePoint Server Spoofing Vulnerability (CVSS 6.5, Actively Exploited): This is the most urgent vulnerability to address. An unauthenticated attacker can exploit this flaw to view sensitive information and modify data on a vulnerable SharePoint server. While Microsoft labels it as "spoofing," security experts suggest the impact could be similar to Cross-Site Scripting (XSS), potentially allowing an attacker to execute scripts in a user's browser context, steal authentication tokens, and impersonate the user.
  • CVE-2026-33825 - Microsoft Defender Privilege Escalation Vulnerability (CVSS 7.8, Publicly Disclosed): Also known as "BlueHammer," this flaw was publicly leaked before a patch was available. It allows a local attacker with basic user privileges to execute code with SYSTEM-level permissions. While local access is required, it's a powerful tool for attackers who have gained an initial foothold through other means.

Critical Vulnerabilities

  • CVE-2026-33824 - Windows Internet Key Exchange (IKE) Service Extensions RCE (CVSS 9.8): This is a network-based, low-complexity RCE vulnerability that requires no user interaction, making it potentially "wormable." A remote, unauthenticated attacker could send a specially crafted IPsec packet to a vulnerable server to achieve code execution.
  • CVE-2026-32157 - Remote Desktop Client Use-After-Free RCE (CVSS 8.8): This vulnerability resides in the RDP client, not the server. An attacker would need to control a malicious RDP server and entice a user to connect to it. If successful, the attacker could achieve RCE on the client's machine.
  • Other Critical Flaws: The remaining critical vulnerabilities affect various components, including Windows TCP/IP and other system services, all of which could lead to remote code execution.

Notable Important Vulnerability

  • CVE-2026-27913 - Windows BitLocker Security Feature Bypass: This vulnerability could allow an attacker with physical access to a device to bypass the Secure Boot feature, potentially leading to the compromise of data encrypted with BitLocker.

Affected Products

The vulnerabilities span a wide range of Microsoft products, including:

  • Microsoft Windows (all supported versions)
  • Microsoft SharePoint Server
  • Microsoft Defender
  • Windows Internet Key Exchange (IKE) Service
  • Remote Desktop Client
  • Windows BitLocker
  • Microsoft Office
  • Azure components

Impact Assessment

The impact of this patch cycle is significant due to the sheer volume of fixes and the criticality of the vulnerabilities addressed. The actively exploited SharePoint zero-day (CVE-2026-32201) poses an immediate threat to organizations using on-premise SharePoint, potentially leading to data breaches and further network compromise. The critical, wormable RCE in the IKE service (CVE-2026-33824) represents a systemic risk to all unpatched Windows systems with the service exposed. Failure to apply these patches in a timely manner leaves organizations exposed to a wide array of attacks, from data theft and privilege escalation to full remote code execution and ransomware deployment.

Deployment Priority

Patching should be prioritized based on risk and exposure:

  1. Internet-Facing Systems: Immediately patch all internet-facing SharePoint servers (CVE-2026-32201) and any systems running the IKE service (CVE-2026-33824).
  2. Critical Servers and Workstations: Deploy patches to all domain controllers, critical application servers, and privileged user workstations to mitigate the Defender LPE (CVE-2026-33825) and other RCE flaws.
  3. General User Population: Roll out the updates to the general user population to address the RDP client vulnerability and other remaining flaws.

Installation Instructions

Updates are available via the standard Windows Update, Windows Server Update Services (WSUS), and the Microsoft Update Catalog. Administrators should test the patches in a non-production environment before broad deployment to check for any operational issues. Given the critical nature of these vulnerabilities, the risk of not patching far outweighs the risk of potential patch-related issues for most organizations. Verify successful installation by checking the update history or using a vulnerability management solution to rescan assets.

Cyber Observables

  • For CVE-2026-32201 (SharePoint): Monitor SharePoint ULS logs and IIS logs for unusual requests, especially those involving script execution or unexpected redirects, which could indicate XSS-like exploitation attempts.
  • For CVE-2026-33824 (IKE): Monitor network traffic on UDP port 500 and 4500 for malformed or anomalous IKE packets from untrusted sources.

Timeline of Events

1
April 16, 2026
Microsoft releases its April 2026 Patch Tuesday updates.
2
April 18, 2026
This article was published

Article Updates

April 27, 2026

New details on April Patch Tuesday, including total CVEs (247 with third-party), vulnerability type breakdown, and a new RDP spoofing CVE.

MITRE ATT&CK Mitigations

The primary mitigation is to apply the April 2026 security updates from Microsoft across all affected systems as quickly as possible.

Mapped D3FEND Techniques:

For the IKE RCE (CVE-2026-33824), if patching is delayed, block UDP ports 500 and 4500 at the perimeter firewall for any systems that do not explicitly require IPsec VPN access.

Mapped D3FEND Techniques:

For the SharePoint flaw (CVE-2026-32201), a well-configured Web Application Firewall (WAF) with rules against XSS and spoofing attacks may provide some level of protection as a compensating control.

D3FEND Defensive Countermeasures

The April 2026 Patch Tuesday is not a routine update; it is an emergency response to active threats. The 'Software Update' countermeasure must be executed with urgency. Prioritize deployment in three waves. Wave 1 (Immediate): All internet-facing systems, especially SharePoint servers (for CVE-2026-32201) and any server with UDP ports 500/4500 open (for CVE-2026-33824). This wave must be completed within 24-48 hours. Wave 2 (Urgent): All domain controllers, critical application servers, and privileged access workstations. This addresses the Defender LPE (CVE-2026-33825) and prevents attackers who gain a foothold from escalating privileges. This wave should be completed within 72 hours. Wave 3 (Standard): The remainder of the enterprise fleet. Use vulnerability management tools to continuously scan and verify patch compliance. Any system that fails to patch must be flagged, and manual intervention should be triggered. The existence of an actively exploited zero-day means there is no grace period for deployment.

While patching is paramount, Inbound Traffic Filtering provides a critical compensating control, especially for the potentially wormable IKE RCE (CVE-2026-33824). Conduct an immediate review of all perimeter firewall rules. For any system that is not a designated VPN endpoint, create explicit deny rules for inbound traffic on UDP port 500 and UDP port 4500. This follows the principle of 'deny by default'. For legitimate VPN gateways, restrict access to these ports to only known, trusted IP ranges where possible. For the SharePoint vulnerability (CVE-2026-32201), ensure your Web Application Firewall (WAF) is in blocking mode and has up-to-date rulesets for XSS and other injection attacks. While a WAF is not a guaranteed defense against a zero-day, it can block unsophisticated exploitation attempts and provide valuable detection telemetry. This filtering acts as a shield, reducing the attack surface while the patch deployment is in progress.

Timeline of Events

1
April 16, 2026

Microsoft releases its April 2026 Patch Tuesday updates.

Sources & References(when first published)

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

Patch TuesdayMicrosoftZeroDaySharePointRDPVulnerabilityCVE

📢 Share This Article

Help others stay informed about cybersecurity threats