Microsoft Patch Tuesday Analysis – April 2026

Executive Summary

On Tuesday, April 14, 2026, Microsoft released its monthly security patch, addressing 165 vulnerabilities across its products.

By severity level:

  • Important - 154;
  • Critical - 8;
  • Low - 1;
  • Moderate - 2.

Exploited (Zero-Days) and Publicly Disclosed Vulnerabilities

Special attention should be paid to the following 2 vulnerabilities. Patching them is the highest priority:

  • CVE-2026-32201 (CVSS 6.5; Important) - Microsoft SharePoint Server Spoofing Vulnerability (Spoofing). A vulnerability in Microsoft SharePoint Server caused by improper input validation (CWE-20). It allows a remote, unauthenticated attacker to execute a spoofing attack over the network without user interaction. Successful exploitation enables the attacker to gain access to confidential information and modify it without disrupting the server's overall availability.
  • CVE-2026-33825 (CVSS 7.8; Important) - Microsoft Defender Elevation of Privilege Vulnerability (Elevation of Privilege). A vulnerability in the Microsoft Defender Antimalware Platform caused by insufficient access control granularity (CWE-1220). A local authenticated attacker with low privileges can exploit incorrect permissions restrictions in platform components (including the MsMpEng.exe user process and associated kernel drivers) to seize full control of the system with SYSTEM-level privileges.

General Trends

The April 2026 Patch Tuesday has proven to be truly record-breaking and challenging for IT administrators: Microsoft released fixes for a colossal 165 vulnerabilities. This massive release more than doubles last month's figures and brings us back to the peak values seen last autumn. Such a vast volume of updates indicates a global cleanup of the codebase ahead of the spring OS releases. Key trends for April include:

  • Attacks on security and trust systems: Of particular concern is the publicly disclosed vulnerability in Microsoft Defender itself (CVE-2026-33825). Using an antimalware platform for privilege escalation is a classic example of protection tools becoming an attack vector. Coupled with mass fixes for Security Feature Bypasses involving Windows Hello, BitLocker, Secure Boot, Boot Manager, and Windows Shell, this suggests that attackers are actively seeking ways to disable or circumvent core Windows defense mechanisms.
  • Active exploitation of corporate portals: Active exploitation of the spoofing vulnerability in Microsoft SharePoint Server (CVE-2026-32201) has been confirmed. Despite a medium CVSS score (6.5), the fact that it is being used in real-world attacks makes it critically dangerous for the corporate sector, as it allows attackers to stealthily manipulate data and bypass authentication mechanisms.
  • Fundamental network threats (RCE): This month closes a number of critical Remote Code Execution (RCE) vulnerabilities in core network components of the OS. The fixes affect the TCP/IP stack, IKE (IPsec) service, Active Directory, SQL Server, and Remote Desktop Client. Bugs in such low-level and network protocols traditionally open the door to self-propagating threats (worms) and mass infrastructure compromise.
  • Total dominance of Elevation of Privilege (EoP): Out of 165 fixes, the lion's share is aimed at patching local privilege escalation holes. Dozens of components were affected: from AFD, UPnP, and Projected File System drivers to DWM and Win32k. This highlights that once the initial perimeter is breached, attackers have a massive arsenal at their disposal to gain full rights (SYSTEM) on unpatched machines.
  • The ongoing Office crisis: The Microsoft Office suite (including Word and Excel) received yet another batch of RCE fixes. This confirms that malicious documents remain one of the primary payload delivery tools in phishing campaigns.

Complete Vulnerability List

Below is a table detailing all vulnerabilities patched this month.

CVETitleTypeCVSSSeverityExploitedPublicly Disclosed
CVE-2026-33825Microsoft Defender Elevation of Privilege VulnerabilityElevation of Privilege7.8ImportantNoYes
CVE-2026-32201Microsoft SharePoint Server Spoofing VulnerabilitySpoofing6.5ImportantYesNo
CVE-2026-33824Windows Internet Key Exchange (IKE) Service Extensions Remote Code Execution VulnerabilityRemote Code Execution9.8CriticalNoNo
CVE-2026-26149Microsoft Power Apps Security Feature BypassSecurity Feature Bypass9.0ImportantNoNo
CVE-2026-26167Windows Push Notifications Elevation of Privilege VulnerabilityElevation of Privilege8.8ImportantNoNo
CVE-2026-26178Windows Advanced Rasterization Platform Elevation of Privilege VulnerabilityElevation of Privilege8.8ImportantNoNo
CVE-2026-32157Remote Desktop Client Remote Code Execution VulnerabilityRemote Code Execution8.8CriticalNoNo
CVE-2026-32171Azure Logic Apps Elevation of Privilege VulnerabilityElevation of Privilege8.8ImportantNoNo
CVE-2026-32225Windows Shell Security Feature Bypass VulnerabilitySecurity Feature Bypass8.8ImportantNoNo
CVE-2026-33120Microsoft SQL Server Remote Code Execution VulnerabilityRemote Code Execution8.8ImportantNoNo
CVE-2026-27928Windows Hello Security Feature Bypass VulnerabilitySecurity Feature Bypass8.7ImportantNoNo
CVE-2026-32091Microsoft Brokering File System Elevation of Privilege VulnerabilityElevation of Privilege8.4ImportantNoNo
CVE-2026-32162Windows COM Elevation of Privilege VulnerabilityElevation of Privilege8.4ImportantNoNo
CVE-2026-32190Microsoft Office Remote Code Execution VulnerabilityRemote Code Execution8.4CriticalNoNo
CVE-2026-32221Windows Graphics Component Remote Code Execution VulnerabilityRemote Code Execution8.4ImportantNoNo
CVE-2026-33114Microsoft Word Remote Code Execution VulnerabilityRemote Code Execution8.4CriticalNoNo
CVE-2026-33115Microsoft Word Remote Code Execution VulnerabilityRemote Code Execution8.4CriticalNoNo
CVE-2026-33827Windows TCP/IP Remote Code Execution VulnerabilityRemote Code Execution8.1CriticalNoNo
CVE-2026-27912Windows Kerberos Elevation of Privilege VulnerabilityElevation of Privilege8.0ImportantNoNo
CVE-2026-33826Windows Active Directory Remote Code Execution VulnerabilityRemote Code Execution8.0CriticalNoNo
CVE-2026-20930Windows Management Services Elevation of Privilege VulnerabilityElevation of Privilege7.8ImportantNoNo
CVE-2026-23657Microsoft Word Remote Code Execution VulnerabilityRemote Code Execution7.8ImportantNoNo
CVE-2026-26143Microsoft PowerShell Security Feature Bypass VulnerabilitySecurity Feature Bypass7.8ImportantNoNo
CVE-2026-26153Windows Encrypted File System (EFS) Elevation of Privilege VulnerabilityElevation of Privilege7.8ImportantNoNo
CVE-2026-26156Windows Hyper-V Remote Code Execution VulnerabilityRemote Code Execution7.8ImportantNoNo
CVE-2026-26159Remote Desktop Licensing Service Elevation of Privilege VulnerabilityElevation of Privilege7.8ImportantNoNo
CVE-2026-26160Remote Desktop Licensing Service Elevation of Privilege VulnerabilityElevation of Privilege7.8ImportantNoNo
CVE-2026-26161Windows Sensor Data Service Elevation of Privilege VulnerabilityElevation of Privilege7.8ImportantNoNo
CVE-2026-26162Windows OLE Elevation of Privilege VulnerabilityElevation of Privilege7.8ImportantNoNo
CVE-2026-26163Windows Kernel Elevation of Privilege VulnerabilityElevation of Privilege7.8ImportantNoNo
CVE-2026-26168Windows Ancillary Function Driver for WinSock Elevation of Privilege VulnerabilityElevation of Privilege7.8ImportantNoNo
CVE-2026-26170PowerShell Elevation of Privilege VulnerabilityElevation of Privilege7.8ImportantNoNo
CVE-2026-26172Windows Push Notifications Elevation of Privilege VulnerabilityElevation of Privilege7.8ImportantNoNo
CVE-2026-26176Windows Client Side Caching driver (csc.sys) Elevation of Privilege VulnerabilityElevation of Privilege7.8ImportantNoNo
CVE-2026-26179Windows Kernel Elevation of Privilege VulnerabilityElevation of Privilege7.8ImportantNoNo
CVE-2026-26180Windows Kernel Elevation of Privilege VulnerabilityElevation of Privilege7.8ImportantNoNo
CVE-2026-26181Microsoft Brokering File System Elevation of Privilege VulnerabilityElevation of Privilege7.8ImportantNoNo
CVE-2026-26183Remote Access Management service/API (RPC server) Elevation of Privilege VulnerabilityElevation of Privilege7.8ImportantNoNo
CVE-2026-26184Windows Projected File System Elevation of Privilege VulnerabilityElevation of Privilege7.8ImportantNoNo
CVE-2026-27907Windows Storage Spaces Controller Elevation of Privilege VulnerabilityElevation of Privilege7.8ImportantNoNo
CVE-2026-27909Windows Search Service Elevation of Privilege VulnerabilityElevation of Privilege7.8ImportantNoNo
CVE-2026-27910Windows Installer Elevation of Privilege VulnerabilityElevation of Privilege7.8ImportantNoNo
CVE-2026-27911Windows User Interface Core Elevation of Privilege VulnerabilityElevation of Privilege7.8ImportantNoNo
CVE-2026-27914Microsoft Management Console Elevation of Privilege VulnerabilityElevation of Privilege7.8ImportantNoNo
CVE-2026-27915Windows UPnP Device Host Elevation of Privilege VulnerabilityElevation of Privilege7.8ImportantNoNo
CVE-2026-27916Windows UPnP Device Host Elevation of Privilege VulnerabilityElevation of Privilege7.8ImportantNoNo
CVE-2026-27918Windows Shell Elevation of Privilege VulnerabilityElevation of Privilege7.8ImportantNoNo
CVE-2026-27919Windows UPnP Device Host Elevation of Privilege VulnerabilityElevation of Privilege7.8ImportantNoNo
CVE-2026-27920Windows UPnP Device Host Elevation of Privilege VulnerabilityElevation of Privilege7.8ImportantNoNo
CVE-2026-27923Desktop Window Manager Elevation of Privilege VulnerabilityElevation of Privilege7.8ImportantNoNo
CVE-2026-27924Desktop Window Manager Elevation of Privilege VulnerabilityElevation of Privilege7.8ImportantNoNo
CVE-2026-27927Windows Projected File System Elevation of Privilege VulnerabilityElevation of Privilege7.8ImportantNoNo
CVE-2026-32069Windows Projected File System Elevation of Privilege VulnerabilityElevation of Privilege7.8ImportantNoNo
CVE-2026-32074Windows Projected File System Elevation of Privilege VulnerabilityElevation of Privilege7.8ImportantNoNo
CVE-2026-32076Windows Storage Spaces Controller Elevation of Privilege VulnerabilityElevation of Privilege7.8ImportantNoNo
CVE-2026-32077Windows UPnP Device Host Elevation of Privilege VulnerabilityElevation of Privilege7.8ImportantNoNo
CVE-2026-32078Windows Projected File System Elevation of Privilege VulnerabilityElevation of Privilege7.8ImportantNoNo
CVE-2026-32089Windows Speech Brokered Api Elevation of Privilege VulnerabilityElevation of Privilege7.8ImportantNoNo
CVE-2026-32090Windows Speech Brokered Api Elevation of Privilege VulnerabilityElevation of Privilege7.8ImportantNoNo
CVE-2026-32152Desktop Window Manager Elevation of Privilege VulnerabilityElevation of Privilege7.8ImportantNoNo
CVE-2026-32153Windows Speech Runtime Elevation of Privilege VulnerabilityElevation of Privilege7.8ImportantNoNo
CVE-2026-32154Desktop Window Manager Elevation of Privilege VulnerabilityElevation of Privilege7.8ImportantNoNo
CVE-2026-32155Desktop Window Manager Elevation of Privilege VulnerabilityElevation of Privilege7.8ImportantNoNo
CVE-2026-32158Windows Push Notifications Elevation of Privilege VulnerabilityElevation of Privilege7.8ImportantNoNo
CVE-2026-32159Windows Push Notifications Elevation of Privilege VulnerabilityElevation of Privilege7.8ImportantNoNo
CVE-2026-32160Windows Push Notifications Elevation of Privilege VulnerabilityElevation of Privilege7.8ImportantNoNo
CVE-2026-32163Windows User Interface Core Elevation of Privilege VulnerabilityElevation of Privilege7.8ImportantNoNo
CVE-2026-32164Windows User Interface Core Elevation of Privilege VulnerabilityElevation of Privilege7.8ImportantNoNo
CVE-2026-32165Windows User Interface Core Elevation of Privilege VulnerabilityElevation of Privilege7.8ImportantNoNo
CVE-2026-32168Azure Monitor Agent Elevation of Privilege VulnerabilityElevation of Privilege7.8ImportantNoNo
CVE-2026-32183Windows Snipping Tool Remote Code Execution VulnerabilityRemote Code Execution7.8ImportantNoNo
CVE-2026-32184Microsoft High Performance Compute (HPC) Pack Elevation of Privilege VulnerabilityElevation of Privilege7.8ImportantNoNo
CVE-2026-32189Microsoft Excel Remote Code Execution VulnerabilityRemote Code Execution7.8ImportantNoNo
CVE-2026-32192Azure Monitor Agent Elevation of Privilege VulnerabilityElevation of Privilege7.8ImportantNoNo
CVE-2026-32197Microsoft Excel Remote Code Execution VulnerabilityRemote Code Execution7.8ImportantNoNo
CVE-2026-32198Microsoft Excel Remote Code Execution VulnerabilityRemote Code Execution7.8ImportantNoNo
CVE-2026-32199Microsoft Excel Remote Code Execution VulnerabilityRemote Code Execution7.8ImportantNoNo
CVE-2026-32200Microsoft PowerPoint Remote Code Execution VulnerabilityRemote Code Execution7.8ImportantNoNo
CVE-2026-32222Windows Win32k Elevation of Privilege VulnerabilityElevation of Privilege7.8ImportantNoNo
CVE-2026-33095Microsoft Word Remote Code Execution VulnerabilityRemote Code Execution7.8ImportantNoNo
CVE-2026-33098Windows Container Isolation FS Filter Driver Elevation of Privilege VulnerabilityElevation of Privilege7.8ImportantNoNo
CVE-2026-33101Windows Print Spooler Elevation of Privilege VulnerabilityElevation of Privilege7.8ImportantNoNo
CVE-2026-27913Windows BitLocker Security Feature Bypass VulnerabilitySecurity Feature Bypass7.7ImportantNoNo
CVE-2026-23666.NET Framework Denial of Service VulnerabilityDenial of Service7.5CriticalNoNo
CVE-2026-26154Windows Server Update Service (WSUS) Tampering VulnerabilityTampering7.5ImportantNoNo
CVE-2026-26171.NET Denial of Service VulnerabilityDenial of Service7.5ImportantNoNo
CVE-2026-32071Windows Local Security Authority Subsystem Service (LSASS) Denial of Service VulnerabilityDenial of Service7.5ImportantNoNo
CVE-2026-32178.NET Spoofing VulnerabilitySpoofing7.5ImportantNoNo
CVE-2026-32203.NET and Visual Studio Denial of Service VulnerabilityDenial of Service7.5ImportantNoNo
CVE-2026-33096HTTP.sys Denial of Service VulnerabilityDenial of Service7.5ImportantNoNo
CVE-2026-33116.NET, .NET Framework, and Visual Studio Denial of Service VulnerabilityDenial of Service7.5ImportantNoNo
CVE-2026-32156Windows UPnP Device Host Remote Code Execution VulnerabilityRemote Code Execution7.4ImportantNoNo
CVE-2026-32149Windows Hyper-V Remote Code Execution VulnerabilityRemote Code Execution7.3ImportantNoNo
CVE-2026-26151Remote Desktop Spoofing VulnerabilitySpoofing7.1ImportantNoNo
CVE-2026-32188Microsoft Excel Information Disclosure VulnerabilityInformation Disclosure7.1ImportantNoNo
CVE-2026-25184Applocker Filter Driver (applockerfltr.sys) Elevation of Privilege VulnerabilityElevation of Privilege7.0ImportantNoNo
CVE-2026-26152Microsoft Cryptographic Services Elevation of Privilege VulnerabilityElevation of Privilege7.0ImportantNoNo
CVE-2026-26165Windows Shell Elevation of Privilege VulnerabilityElevation of Privilege7.0ImportantNoNo
CVE-2026-26166Windows Shell Elevation of Privilege VulnerabilityElevation of Privilege7.0ImportantNoNo
CVE-2026-26173Windows Ancillary Function Driver for WinSock Elevation of Privilege VulnerabilityElevation of Privilege7.0ImportantNoNo
CVE-2026-26174Windows Server Update Service (WSUS) Elevation of Privilege VulnerabilityElevation of Privilege7.0ImportantNoNo
CVE-2026-26177Windows Ancillary Function Driver for WinSock Elevation of Privilege VulnerabilityElevation of Privilege7.0ImportantNoNo
CVE-2026-26182Windows Ancillary Function Driver for WinSock Elevation of Privilege VulnerabilityElevation of Privilege7.0ImportantNoNo
CVE-2026-27908Windows TDI Translation Driver (tdx.sys) Elevation of Privilege VulnerabilityElevation of Privilege7.0ImportantNoNo
CVE-2026-27917Windows WFP NDIS Lightweight Filter Driver (wfplwfs.sys) Elevation of Privilege VulnerabilityElevation of Privilege7.0ImportantNoNo
CVE-2026-27921Windows TDI Translation Driver (tdx.sys) Elevation of Privilege VulnerabilityElevation of Privilege7.0ImportantNoNo
CVE-2026-27922Windows Ancillary Function Driver for WinSock Elevation of Privilege VulnerabilityElevation of Privilege7.0ImportantNoNo
CVE-2026-27926Windows Cloud Files Mini Filter Driver Elevation of Privilege VulnerabilityElevation of Privilege7.0ImportantNoNo
CVE-2026-27929Windows LUA File Virtualization Filter Driver Elevation of Privilege VulnerabilityElevation of Privilege7.0ImportantNoNo
CVE-2026-32068Windows Simple Search and Discovery Protocol (SSDP) Service Elevation of Privilege VulnerabilityElevation of Privilege7.0ImportantNoNo
CVE-2026-32070Windows Common Log File System Driver Elevation of Privilege VulnerabilityElevation of Privilege7.0ImportantNoNo
CVE-2026-32073Windows Ancillary Function Driver for WinSock Elevation of Privilege VulnerabilityElevation of Privilege7.0ImportantNoNo
CVE-2026-32075Windows UPnP Device Host Elevation of Privilege VulnerabilityElevation of Privilege7.0ImportantNoNo
CVE-2026-32080Windows WalletService Elevation of Privilege VulnerabilityElevation of Privilege7.0ImportantNoNo
CVE-2026-32082Windows Simple Search and Discovery Protocol (SSDP) Service Elevation of Privilege VulnerabilityElevation of Privilege7.0ImportantNoNo
CVE-2026-32083Windows Simple Search and Discovery Protocol (SSDP) Service Elevation of Privilege VulnerabilityElevation of Privilege7.0ImportantNoNo
CVE-2026-32086Windows Function Discovery Service (fdwsd.dll) Elevation of Privilege VulnerabilityElevation of Privilege7.0ImportantNoNo
CVE-2026-32087Windows Function Discovery Service (fdwsd.dll) Elevation of Privilege VulnerabilityElevation of Privilege7.0ImportantNoNo
CVE-2026-32093Windows Function Discovery Service (fdwsd.dll) Elevation of Privilege VulnerabilityElevation of Privilege7.0ImportantNoNo
CVE-2026-32150Windows Function Discovery Service (fdwsd.dll) Elevation of Privilege VulnerabilityElevation of Privilege7.0ImportantNoNo
CVE-2026-32195Windows Kernel Elevation of Privilege VulnerabilityElevation of Privilege7.0ImportantNoNo
CVE-2026-32219Microsoft Brokering File System Elevation of Privilege VulnerabilityElevation of Privilege7.0ImportantNoNo
CVE-2026-32224Windows Server Update Service (WSUS) Elevation of Privilege VulnerabilityElevation of Privilege7.0ImportantNoNo
CVE-2026-33099Windows Ancillary Function Driver for WinSock Elevation of Privilege VulnerabilityElevation of Privilege7.0ImportantNoNo
CVE-2026-33100Windows Ancillary Function Driver for WinSock Elevation of Privilege VulnerabilityElevation of Privilege7.0ImportantNoNo
CVE-2026-33104Win32k Elevation of Privilege VulnerabilityElevation of Privilege7.0ImportantNoNo
CVE-2026-32223Windows USB Printing Stack (usbprint.sys) Elevation of Privilege VulnerabilityElevation of Privilege6.8ImportantNoNo
CVE-2026-0390UEFI Secure Boot Security Feature Bypass VulnerabilitySecurity Feature Bypass6.7ImportantNoNo
CVE-2026-32167SQL Server Elevation of Privilege VulnerabilityElevation of Privilege6.7ImportantNoNo
CVE-2026-32176SQL Server Elevation of Privilege VulnerabilityElevation of Privilege6.7ImportantNoNo
CVE-2026-26155Microsoft Local Security Authority Subsystem Service Information Disclosure VulnerabilityInformation Disclosure6.5ImportantNoNo
CVE-2026-27925Windows UPnP Device Host Information Disclosure VulnerabilityInformation Disclosure6.5ImportantNoNo
CVE-2026-32151Windows Shell Information Disclosure VulnerabilityInformation Disclosure6.5ImportantNoNo
CVE-2026-32072Active Directory Spoofing VulnerabilitySpoofing6.2ImportantNoNo
CVE-2026-26169Windows Kernel Memory Information Disclosure VulnerabilityInformation Disclosure6.1ImportantNoNo
CVE-2026-32088Windows Biometric Service Security Feature Bypass VulnerabilitySecurity Feature Bypass6.1ImportantNoNo
CVE-2026-32196Windows Admin Center Spoofing VulnerabilitySpoofing6.1ImportantNoNo
CVE-2026-33822Microsoft Word Information Disclosure VulnerabilityInformation Disclosure6.1ImportantNoNo
CVE-2026-32226.NET Framework Denial of Service VulnerabilityDenial of Service5.9ImportantNoNo
CVE-2026-23653GitHub Copilot and Visual Studio Code Information Disclosure VulnerabilityInformation Disclosure5.7ImportantNoNo
CVE-2026-23670Windows Virtualization-Based Security (VBS) Security Feature Bypass VulnerabilitySecurity Feature Bypass5.7ImportantNoNo
CVE-2026-20806Windows COM Server Information Disclosure VulnerabilityInformation Disclosure5.5ImportantNoNo
CVE-2026-27930Windows GDI Information Disclosure VulnerabilityInformation Disclosure5.5ImportantNoNo
CVE-2026-27931Windows GDI Information Disclosure VulnerabilityInformation Disclosure5.5ImportantNoNo
CVE-2026-32079Web Account Manager Information Disclosure VulnerabilityInformation Disclosure5.5ImportantNoNo
CVE-2026-32081Package Catalog Information Disclosure VulnerabilityInformation Disclosure5.5ImportantNoNo
CVE-2026-32084Windows Print Spooler Information Disclosure VulnerabilityInformation Disclosure5.5ImportantNoNo
CVE-2026-32085Remote Procedure Call Information Disclosure VulnerabilityInformation Disclosure5.5ImportantNoNo
CVE-2026-32181Connected User Experiences and Telemetry Service Denial of Service VulnerabilityDenial of Service5.5ImportantNoNo
CVE-2026-32212Universal Plug and Play (upnp.dll) Information Disclosure VulnerabilityInformation Disclosure5.5ImportantNoNo
CVE-2026-32214Universal Plug and Play (upnp.dll) Information Disclosure VulnerabilityInformation Disclosure5.5ImportantNoNo
CVE-2026-32215Windows Kernel Information Disclosure VulnerabilityInformation Disclosure5.5ImportantNoNo
CVE-2026-32216Windows Redirected Drive Buffering System Denial of Service VulnerabilityDenial of Service5.5ImportantNoNo
CVE-2026-32217Windows Kernel Information Disclosure VulnerabilityInformation Disclosure5.5ImportantNoNo
CVE-2026-32218Windows Kernel Information Disclosure VulnerabilityInformation Disclosure5.5ImportantNoNo
CVE-2026-33103Microsoft Dynamics 365 (On-Premises) Information Disclosure VulnerabilityInformation Disclosure5.5ImportantNoNo
CVE-2026-33119Microsoft Edge (Chromium-based) for Android Spoofing VulnerabilitySpoofing5.4ModerateNoNo
CVE-2026-20928Windows Recovery Environment Security Feature Bypass VulnerabilitySecurity Feature Bypass4.6ImportantNoNo
CVE-2026-20945Microsoft SharePoint Server Spoofing VulnerabilitySpoofing4.6ImportantNoNo
CVE-2026-26175Windows Boot Manager Security Feature Bypass VulnerabilitySecurity Feature Bypass4.6ImportantNoNo
CVE-2026-27906Windows Hello Security Feature Bypass VulnerabilitySecurity Feature Bypass4.4ImportantNoNo
CVE-2026-32220UEFI Secure Boot Security Feature Bypass VulnerabilitySecurity Feature Bypass4.4ImportantNoNo
CVE-2026-32202Windows Shell Spoofing VulnerabilitySpoofing4.3ImportantNoNo
CVE-2026-33118Microsoft Edge (Chromium-based) Spoofing VulnerabilitySpoofing4.3LowNoNo
CVE-2026-33829Windows Snipping Tool Spoofing VulnerabilitySpoofing4.3ModerateNoNo

Retrospective Vulnerability Analysis

  • CVE-2026-20820 — Windows Common Log File System Driver Elevation of Privilege Vulnerability (Elevation of Privilege). A heap-based buffer overflow vulnerability in the CLFS file system driver that allows a local attacker to escalate privileges to the SYSTEM level. Exploitation is carried out by creating a log container and sending a specially crafted IOCTL request with a buffer that violates memory boundaries (Out-of-Bounds write). A public PoC is available demonstrating the overflow mechanism. The vulnerability was patched in January 2026.

  • CVE-2026-21509 — Microsoft Office Security Feature Bypass Vulnerability (Security Feature Bypass). This vulnerability is related to the improper reliance on input validation when making security decisions (CWE-807). An attacker can create a specially crafted DOCX document with an embedded OLE object in which the Class ID (CLSID) is modified. This allows for a local bypass of Office security features, forcing the application to initialize potentially dangerous components (such as Shell.Explorer) without proper verification. A Python PoC is available that automates the creation of the malicious document by patching the OLE file headers. Patched in January 2026.

  • CVE-2026-20929 — Windows HTTP.sys Elevation of Privilege Vulnerability (Elevation of Privilege). A vulnerability in the HTTP.sys driver and Kerberos authentication components that allows for a CNAME Abuse technique to conduct Kerberos Relay attacks. The issue lies in improper access rights validation and the behavior of the Kerberos client: upon receiving a CNAME DNS record, the Windows client trusts the alias and forms a TGS request using the hostname from the CNAME as the SPN. This allows an attacker in a DNS MITM position (e.g., via IPv6/DHCPv6) to force any domain user to request a Kerberos ticket for a service chosen by the attacker and redirect it to nodes where Channel Binding (CBT) or signing enforcement is not configured. An extended PoC is available on GitHub featuring CNAME poisoning functions, which allows for SYSTEM-level privilege acquisition. The vulnerability was patched in January 2026.

  • CVE-2026-24289 — Windows Kernel Elevation of Privilege Vulnerability (Elevation of Privilege). A Use-After-Free (UAF) vulnerability in the Windows kernel (ntoskrnl.exe) arising from a race condition during I/O Completion Ports (IOCP) processing. The issue is that the IopCompleteRequest function reads the completion context from the file object without acquiring the necessary spin lock, allowing a local attacker to free or replace this context right while it is being used via a parallel NtSetInformationFile call. Successful exploitation allows for privilege escalation in the system to the SYSTEM level. The published PoC demonstrates the race mechanism, resulting in a fatal system crash (BSOD) with error code 0x18 (REFERENCE_BY_POINTER) on vulnerable builds. The vulnerability was patched in March 2026.

  • CVE-2026-24291 — Windows Accessibility Infrastructure (ATBroker.exe) Elevation of Privilege Vulnerability (Elevation of Privilege). A logical vulnerability, dubbed "RegPwn", related to the incorrect assignment of access rights to registry keys (CWE-732) used by the ATBroker.exe process. When the system transitions into "Secure Desktop" mode (e.g., when locking the screen or prompting a UAC window), the system process copies configuration data from registry branches that are normally writeable by a standard user. Using registry symbolic links and opportunistic locks (oplocks) on the oskmenu.xml file, a local attacker can redirect the write operation to modify critical system parameters (such as a service's ImagePath), allowing arbitrary code execution with SYSTEM privileges. The vulnerability was patched in March 2026.

  • CVE-2026-23671 — Windows Bluetooth RFCOMM Protocol Driver Elevation of Privilege Vulnerability (Elevation of Privilege). A race condition vulnerability in the Bluetooth RFCOMM protocol driver (bthport.sys) that allows a local attacker to escalate privileges to the SYSTEM level. The flaw lies in improper synchronization of access to channel objects (TOCTOU), making it possible to spoof the channel descriptor in the short window between access rights verification and operation execution. A public BlueSploit PoC module by researcher v33ru is available, demonstrating the attack using the SABM flood method to seize the system security context. The vulnerability was patched in March 2026.

Conclusion

The April 2026 update is a critical event requiring maximum concentration and immediate action from IT departments. The massive number of patches (165) will require careful deployment planning and testing; however, the process cannot be delayed due to the presence of actively exploited flaws and fundamental network threats.

Patching priorities for April:

  1. Immediate response (Zero-Days): Roll out updates to SharePoint servers to block the actively exploited CVE-2026-32201. Additionally, urgently update the Microsoft Defender platform (CVE-2026-33825) to prevent the antivirus from being used against the system itself.
  2. Network perimeter and infrastructure protection: Critical RCEs in the IKE, TCP/IP, and Active Directory services are a "nightmare" scenario for network administrators. Internet-facing servers (especially VPN and IPsec gateways) and Domain Controllers must be updated on the very first night.
  3. Endpoint protection: Install patches for components responsible for bypassing security (Windows Shell, SmartScreen, BitLocker), and update the Microsoft Office suites to neutralize attack vectors via phishing and malicious links.

It is also highly recommended to carefully review the "Retrospective Vulnerability Analysis" section. The emergence of powerful public exploits for March and February vulnerabilities (such as Kerberos CNAME Abuse, RegPwn for ATBroker, and kernel overflows) means that attackers have already automated attacks on systems that were not updated in the first quarter of 2026. Addressing your technical debt regarding patches is absolutely vital right now.

Paranoid Security Microsoft Patch Tuesday Analysis – February 2026 February 10
MS Patch Tuesday Microsoft Patch Tuesday Analysis – February 2026
Paranoid Security How Attackers Abuse Signed Drivers to Take Over Infrastructure. Using BYOVD to Bypass PPL Protection Mechanisms in Windows. February 5
Vulnerability Research How Attackers Abuse Signed Drivers to Take Over Infrastructure. Using BYOVD to Bypass PPL Protection Mechanisms in Windows.
Paranoid Security Microsoft Patch Tuesday Analysis – January 2026 January 13
MS Patch Tuesday Microsoft Patch Tuesday Analysis – January 2026