Security researchers have confirmed active, in-the-wild exploitation of three zero-day vulnerabilities affecting Microsoft Defender on modern Windows systems. The vulnerabilities, codenamed BlueHammer, RedSun, and UnDefend, were publicly disclosed by a researcher known as "Chaotic Eclipse" before official patches were available for all flaws. BlueHammer (CVE-2026-33825), a local privilege escalation (LPE) flaw, was patched in the April 2026 Patch Tuesday. However, RedSun, another critical LPE vulnerability that grants SYSTEM privileges, and UnDefend, a denial-of-service (DoS) bug, remain unpatched. Huntress Labs reports observing targeted attacks where threat actors are manually deploying these exploits to elevate privileges on compromised systems, indicating a significant and immediate threat to Windows environments.
The incident highlights the dangerous intersection of vulnerability research, contentious disclosure practices, and rapid weaponization by threat actors. A researcher, frustrated with the Microsoft Security Response Center (MSRC), publicly released proof-of-concept (PoC) exploits for three distinct vulnerabilities in Microsoft Defender. This action provided threat actors with the tools to immediately target vulnerable systems.
CVE-2026-33825): A Local Privilege Escalation (LPE) vulnerability. An attacker with low-level access can exploit this to gain SYSTEM privileges. This flaw has been patched.Researchers at Huntress Labs have observed these exploits being used in targeted attacks, not widespread automated campaigns. The attackers exhibit "hands-on-keyboard" activity, running reconnaissance commands like whoami /priv and cmdkey /list after gaining initial access, before deploying the LPE exploits to escalate their privileges. This behavior is typical of sophisticated adversaries conducting targeted intrusions.
The exploits abuse core functionalities of Microsoft Defender and its interaction with the operating system.
T1068): Both BlueHammer and RedSun are classic examples of this technique. They exploit flaws in a highly privileged process (Microsoft Defender's MsMpEng.exe service, which runs as NT AUTHORITY\SYSTEM) to execute arbitrary code with elevated permissions. The RedSun exploit reportedly abuses how Defender handles file system operations during remediation.T1562): The UnDefend vulnerability is a direct implementation of this tactic. By preventing Defender from updating, attackers can ensure that their subsequent malware payloads will not be detected by the latest signatures, significantly increasing their chances of success.T1068): The core of the BlueHammer and RedSun attacks. Attackers with initial low-privilege access (e.g., from a phishing email) can run the exploit to become SYSTEM, gaining full control of the host.T1569.002): The exploits target a legitimate and critical Windows service (Microsoft Defender) to carry out their malicious actions.The active exploitation of unpatched LPEs in a default security product is a worst-case scenario. It effectively nullifies the 'defense-in-depth' principle, as the defender itself becomes the attack vector.
The impact is critical for organizations running Windows environments. An attacker who gains any level of initial access—through phishing, a separate vulnerability, or other means—can now reliably escalate to SYSTEM-level privileges on fully patched machines using the RedSun exploit. This level of access allows them to disable other security controls, deploy ransomware, steal sensitive data, and persist within the network. The UnDefend vulnerability further compounds the risk by ensuring that the primary endpoint protection is outdated and ineffective against new threats. This forces organizations into a difficult position of needing to apply emergency workarounds or accept a high level of risk until Microsoft releases a patch.
No specific file hashes or IP addresses were provided in the source articles.
Security teams should hunt for post-exploitation activity associated with these LPEs.
whoami /privcmdkey /list%windir%\Temp\MsMpEng.exe4657HKLM\SOFTWARE\Microsoft\Windows Defender, which could indicate use of the UnDefend exploit.Detection Strategies:
MsMpEng.exe spawning unusual child processes (like cmd.exe or powershell.exe) or performing unexpected file/registry modifications.cmd.exe) being spawned as a child of MsMpEng.exe is highly suspicious and should be a high-priority alert. This is a key indicator of post-exploitation activity following a successful LPE.whoami, net user, etc.) and then a spike in MsMpEng.exe activity could indicate an attack in progress.Response Actions:
Immediate Actions (Workarounds):
MsMpEng.exe and post-exploitation commands.Strategic Controls:
New details confirm active exploitation of all three Microsoft Defender zero-days, including RedSun and UnDefend, with PoCs observed in the wild by April 16.
New reports from Huntress confirm that all three Microsoft Defender zero-days (BlueHammer, RedSun, UnDefend) are actively exploited in the wild. While BlueHammer's exploitation was noted by April 10, proof-of-concept exploits for RedSun (LPE) and UnDefend (DoS) were observed being used by threat actors as early as April 16, 2026. This reinforces the immediate threat posed by these unpatched vulnerabilities, allowing attackers to escalate privileges and disable Defender updates on Windows systems.
CISA adds CVE-2026-33825 (BlueHammer) to KEV catalog, mandating patch. Detailed exploit chain for SAM dump revealed, with initial access via FortiGate VPNs.
The CISA has added CVE-2026-33825 (BlueHammer), a critical Microsoft Defender privilege escalation vulnerability, to its Known Exploited Vulnerabilities catalog, requiring federal agencies to patch by May 6, 2026. This confirms active, in-the-wild exploitation. New technical details reveal the exploit leverages a TOCTOU race condition to dump the SAM database for credential access, with initial access often gained via compromised FortiGate SSL VPNs. One observed attack originated from a Russian IP. The specific patch version is 4.18.26050.3011 or later. While the existing article noted BlueHammer was patched, this update highlights its continued critical threat due to confirmed active exploitation and government mandate.
Exploitation of the BlueHammer vulnerability is first observed in the wild.
The April 2026 Patch Tuesday is released, patching BlueHammer (CVE-2026-33825).
Exploitation of the unpatched RedSun and UnDefend vulnerabilities begins.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats