Microsoft Patch Tuesday Analysis – April 2026
Executive Summary
On Tuesday, April 14, 2026, Microsoft released its monthly security patch, addressing 165 vulnerabilities across its products.
By severity level:
- Important - 154;
- Critical - 8;
- Low - 1;
- Moderate - 2.
Exploited (Zero-Days) and Publicly Disclosed Vulnerabilities
Special attention should be paid to the following 2 vulnerabilities. Patching them is the highest priority:
- CVE-2026-32201 (CVSS 6.5; Important) - Microsoft SharePoint Server Spoofing Vulnerability (Spoofing). A vulnerability in Microsoft SharePoint Server caused by improper input validation (CWE-20). It allows a remote, unauthenticated attacker to execute a spoofing attack over the network without user interaction. Successful exploitation enables the attacker to gain access to confidential information and modify it without disrupting the server's overall availability.
- CVE-2026-33825 (CVSS 7.8; Important) - Microsoft Defender Elevation of Privilege Vulnerability (Elevation of Privilege). A vulnerability in the Microsoft Defender Antimalware Platform caused by insufficient access control granularity (CWE-1220). A local authenticated attacker with low privileges can exploit incorrect permissions restrictions in platform components (including the MsMpEng.exe user process and associated kernel drivers) to seize full control of the system with SYSTEM-level privileges.
General Trends
The April 2026 Patch Tuesday has proven to be truly record-breaking and challenging for IT administrators: Microsoft released fixes for a colossal 165 vulnerabilities. This massive release more than doubles last month's figures and brings us back to the peak values seen last autumn. Such a vast volume of updates indicates a global cleanup of the codebase ahead of the spring OS releases. Key trends for April include:
- Attacks on security and trust systems: Of particular concern is the publicly disclosed vulnerability in Microsoft Defender itself (CVE-2026-33825). Using an antimalware platform for privilege escalation is a classic example of protection tools becoming an attack vector. Coupled with mass fixes for Security Feature Bypasses involving Windows Hello, BitLocker, Secure Boot, Boot Manager, and Windows Shell, this suggests that attackers are actively seeking ways to disable or circumvent core Windows defense mechanisms.
- Active exploitation of corporate portals: Active exploitation of the spoofing vulnerability in Microsoft SharePoint Server (CVE-2026-32201) has been confirmed. Despite a medium CVSS score (6.5), the fact that it is being used in real-world attacks makes it critically dangerous for the corporate sector, as it allows attackers to stealthily manipulate data and bypass authentication mechanisms.
- Fundamental network threats (RCE): This month closes a number of critical Remote Code Execution (RCE) vulnerabilities in core network components of the OS. The fixes affect the TCP/IP stack, IKE (IPsec) service, Active Directory, SQL Server, and Remote Desktop Client. Bugs in such low-level and network protocols traditionally open the door to self-propagating threats (worms) and mass infrastructure compromise.
- Total dominance of Elevation of Privilege (EoP): Out of 165 fixes, the lion's share is aimed at patching local privilege escalation holes. Dozens of components were affected: from AFD, UPnP, and Projected File System drivers to DWM and Win32k. This highlights that once the initial perimeter is breached, attackers have a massive arsenal at their disposal to gain full rights (SYSTEM) on unpatched machines.
- The ongoing Office crisis: The Microsoft Office suite (including Word and Excel) received yet another batch of RCE fixes. This confirms that malicious documents remain one of the primary payload delivery tools in phishing campaigns.
Complete Vulnerability List
Below is a table detailing all vulnerabilities patched this month.
| CVE | Title | Type | CVSS | Severity | Exploited | Publicly Disclosed |
|---|---|---|---|---|---|---|
| CVE-2026-33825 | Microsoft Defender Elevation of Privilege Vulnerability | Elevation of Privilege | 7.8 | Important | No | Yes |
| CVE-2026-32201 | Microsoft SharePoint Server Spoofing Vulnerability | Spoofing | 6.5 | Important | Yes | No |
| CVE-2026-33824 | Windows Internet Key Exchange (IKE) Service Extensions Remote Code Execution Vulnerability | Remote Code Execution | 9.8 | Critical | No | No |
| CVE-2026-26149 | Microsoft Power Apps Security Feature Bypass | Security Feature Bypass | 9.0 | Important | No | No |
| CVE-2026-26167 | Windows Push Notifications Elevation of Privilege Vulnerability | Elevation of Privilege | 8.8 | Important | No | No |
| CVE-2026-26178 | Windows Advanced Rasterization Platform Elevation of Privilege Vulnerability | Elevation of Privilege | 8.8 | Important | No | No |
| CVE-2026-32157 | Remote Desktop Client Remote Code Execution Vulnerability | Remote Code Execution | 8.8 | Critical | No | No |
| CVE-2026-32171 | Azure Logic Apps Elevation of Privilege Vulnerability | Elevation of Privilege | 8.8 | Important | No | No |
| CVE-2026-32225 | Windows Shell Security Feature Bypass Vulnerability | Security Feature Bypass | 8.8 | Important | No | No |
| CVE-2026-33120 | Microsoft SQL Server Remote Code Execution Vulnerability | Remote Code Execution | 8.8 | Important | No | No |
| CVE-2026-27928 | Windows Hello Security Feature Bypass Vulnerability | Security Feature Bypass | 8.7 | Important | No | No |
| CVE-2026-32091 | Microsoft Brokering File System Elevation of Privilege Vulnerability | Elevation of Privilege | 8.4 | Important | No | No |
| CVE-2026-32162 | Windows COM Elevation of Privilege Vulnerability | Elevation of Privilege | 8.4 | Important | No | No |
| CVE-2026-32190 | Microsoft Office Remote Code Execution Vulnerability | Remote Code Execution | 8.4 | Critical | No | No |
| CVE-2026-32221 | Windows Graphics Component Remote Code Execution Vulnerability | Remote Code Execution | 8.4 | Important | No | No |
| CVE-2026-33114 | Microsoft Word Remote Code Execution Vulnerability | Remote Code Execution | 8.4 | Critical | No | No |
| CVE-2026-33115 | Microsoft Word Remote Code Execution Vulnerability | Remote Code Execution | 8.4 | Critical | No | No |
| CVE-2026-33827 | Windows TCP/IP Remote Code Execution Vulnerability | Remote Code Execution | 8.1 | Critical | No | No |
| CVE-2026-27912 | Windows Kerberos Elevation of Privilege Vulnerability | Elevation of Privilege | 8.0 | Important | No | No |
| CVE-2026-33826 | Windows Active Directory Remote Code Execution Vulnerability | Remote Code Execution | 8.0 | Critical | No | No |
| CVE-2026-20930 | Windows Management Services Elevation of Privilege Vulnerability | Elevation of Privilege | 7.8 | Important | No | No |
| CVE-2026-23657 | Microsoft Word Remote Code Execution Vulnerability | Remote Code Execution | 7.8 | Important | No | No |
| CVE-2026-26143 | Microsoft PowerShell Security Feature Bypass Vulnerability | Security Feature Bypass | 7.8 | Important | No | No |
| CVE-2026-26153 | Windows Encrypted File System (EFS) Elevation of Privilege Vulnerability | Elevation of Privilege | 7.8 | Important | No | No |
| CVE-2026-26156 | Windows Hyper-V Remote Code Execution Vulnerability | Remote Code Execution | 7.8 | Important | No | No |
| CVE-2026-26159 | Remote Desktop Licensing Service Elevation of Privilege Vulnerability | Elevation of Privilege | 7.8 | Important | No | No |
| CVE-2026-26160 | Remote Desktop Licensing Service Elevation of Privilege Vulnerability | Elevation of Privilege | 7.8 | Important | No | No |
| CVE-2026-26161 | Windows Sensor Data Service Elevation of Privilege Vulnerability | Elevation of Privilege | 7.8 | Important | No | No |
| CVE-2026-26162 | Windows OLE Elevation of Privilege Vulnerability | Elevation of Privilege | 7.8 | Important | No | No |
| CVE-2026-26163 | Windows Kernel Elevation of Privilege Vulnerability | Elevation of Privilege | 7.8 | Important | No | No |
| CVE-2026-26168 | Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability | Elevation of Privilege | 7.8 | Important | No | No |
| CVE-2026-26170 | PowerShell Elevation of Privilege Vulnerability | Elevation of Privilege | 7.8 | Important | No | No |
| CVE-2026-26172 | Windows Push Notifications Elevation of Privilege Vulnerability | Elevation of Privilege | 7.8 | Important | No | No |
| CVE-2026-26176 | Windows Client Side Caching driver (csc.sys) Elevation of Privilege Vulnerability | Elevation of Privilege | 7.8 | Important | No | No |
| CVE-2026-26179 | Windows Kernel Elevation of Privilege Vulnerability | Elevation of Privilege | 7.8 | Important | No | No |
| CVE-2026-26180 | Windows Kernel Elevation of Privilege Vulnerability | Elevation of Privilege | 7.8 | Important | No | No |
| CVE-2026-26181 | Microsoft Brokering File System Elevation of Privilege Vulnerability | Elevation of Privilege | 7.8 | Important | No | No |
| CVE-2026-26183 | Remote Access Management service/API (RPC server) Elevation of Privilege Vulnerability | Elevation of Privilege | 7.8 | Important | No | No |
| CVE-2026-26184 | Windows Projected File System Elevation of Privilege Vulnerability | Elevation of Privilege | 7.8 | Important | No | No |
| CVE-2026-27907 | Windows Storage Spaces Controller Elevation of Privilege Vulnerability | Elevation of Privilege | 7.8 | Important | No | No |
| CVE-2026-27909 | Windows Search Service Elevation of Privilege Vulnerability | Elevation of Privilege | 7.8 | Important | No | No |
| CVE-2026-27910 | Windows Installer Elevation of Privilege Vulnerability | Elevation of Privilege | 7.8 | Important | No | No |
| CVE-2026-27911 | Windows User Interface Core Elevation of Privilege Vulnerability | Elevation of Privilege | 7.8 | Important | No | No |
| CVE-2026-27914 | Microsoft Management Console Elevation of Privilege Vulnerability | Elevation of Privilege | 7.8 | Important | No | No |
| CVE-2026-27915 | Windows UPnP Device Host Elevation of Privilege Vulnerability | Elevation of Privilege | 7.8 | Important | No | No |
| CVE-2026-27916 | Windows UPnP Device Host Elevation of Privilege Vulnerability | Elevation of Privilege | 7.8 | Important | No | No |
| CVE-2026-27918 | Windows Shell Elevation of Privilege Vulnerability | Elevation of Privilege | 7.8 | Important | No | No |
| CVE-2026-27919 | Windows UPnP Device Host Elevation of Privilege Vulnerability | Elevation of Privilege | 7.8 | Important | No | No |
| CVE-2026-27920 | Windows UPnP Device Host Elevation of Privilege Vulnerability | Elevation of Privilege | 7.8 | Important | No | No |
| CVE-2026-27923 | Desktop Window Manager Elevation of Privilege Vulnerability | Elevation of Privilege | 7.8 | Important | No | No |
| CVE-2026-27924 | Desktop Window Manager Elevation of Privilege Vulnerability | Elevation of Privilege | 7.8 | Important | No | No |
| CVE-2026-27927 | Windows Projected File System Elevation of Privilege Vulnerability | Elevation of Privilege | 7.8 | Important | No | No |
| CVE-2026-32069 | Windows Projected File System Elevation of Privilege Vulnerability | Elevation of Privilege | 7.8 | Important | No | No |
| CVE-2026-32074 | Windows Projected File System Elevation of Privilege Vulnerability | Elevation of Privilege | 7.8 | Important | No | No |
| CVE-2026-32076 | Windows Storage Spaces Controller Elevation of Privilege Vulnerability | Elevation of Privilege | 7.8 | Important | No | No |
| CVE-2026-32077 | Windows UPnP Device Host Elevation of Privilege Vulnerability | Elevation of Privilege | 7.8 | Important | No | No |
| CVE-2026-32078 | Windows Projected File System Elevation of Privilege Vulnerability | Elevation of Privilege | 7.8 | Important | No | No |
| CVE-2026-32089 | Windows Speech Brokered Api Elevation of Privilege Vulnerability | Elevation of Privilege | 7.8 | Important | No | No |
| CVE-2026-32090 | Windows Speech Brokered Api Elevation of Privilege Vulnerability | Elevation of Privilege | 7.8 | Important | No | No |
| CVE-2026-32152 | Desktop Window Manager Elevation of Privilege Vulnerability | Elevation of Privilege | 7.8 | Important | No | No |
| CVE-2026-32153 | Windows Speech Runtime Elevation of Privilege Vulnerability | Elevation of Privilege | 7.8 | Important | No | No |
| CVE-2026-32154 | Desktop Window Manager Elevation of Privilege Vulnerability | Elevation of Privilege | 7.8 | Important | No | No |
| CVE-2026-32155 | Desktop Window Manager Elevation of Privilege Vulnerability | Elevation of Privilege | 7.8 | Important | No | No |
| CVE-2026-32158 | Windows Push Notifications Elevation of Privilege Vulnerability | Elevation of Privilege | 7.8 | Important | No | No |
| CVE-2026-32159 | Windows Push Notifications Elevation of Privilege Vulnerability | Elevation of Privilege | 7.8 | Important | No | No |
| CVE-2026-32160 | Windows Push Notifications Elevation of Privilege Vulnerability | Elevation of Privilege | 7.8 | Important | No | No |
| CVE-2026-32163 | Windows User Interface Core Elevation of Privilege Vulnerability | Elevation of Privilege | 7.8 | Important | No | No |
| CVE-2026-32164 | Windows User Interface Core Elevation of Privilege Vulnerability | Elevation of Privilege | 7.8 | Important | No | No |
| CVE-2026-32165 | Windows User Interface Core Elevation of Privilege Vulnerability | Elevation of Privilege | 7.8 | Important | No | No |
| CVE-2026-32168 | Azure Monitor Agent Elevation of Privilege Vulnerability | Elevation of Privilege | 7.8 | Important | No | No |
| CVE-2026-32183 | Windows Snipping Tool Remote Code Execution Vulnerability | Remote Code Execution | 7.8 | Important | No | No |
| CVE-2026-32184 | Microsoft High Performance Compute (HPC) Pack Elevation of Privilege Vulnerability | Elevation of Privilege | 7.8 | Important | No | No |
| CVE-2026-32189 | Microsoft Excel Remote Code Execution Vulnerability | Remote Code Execution | 7.8 | Important | No | No |
| CVE-2026-32192 | Azure Monitor Agent Elevation of Privilege Vulnerability | Elevation of Privilege | 7.8 | Important | No | No |
| CVE-2026-32197 | Microsoft Excel Remote Code Execution Vulnerability | Remote Code Execution | 7.8 | Important | No | No |
| CVE-2026-32198 | Microsoft Excel Remote Code Execution Vulnerability | Remote Code Execution | 7.8 | Important | No | No |
| CVE-2026-32199 | Microsoft Excel Remote Code Execution Vulnerability | Remote Code Execution | 7.8 | Important | No | No |
| CVE-2026-32200 | Microsoft PowerPoint Remote Code Execution Vulnerability | Remote Code Execution | 7.8 | Important | No | No |
| CVE-2026-32222 | Windows Win32k Elevation of Privilege Vulnerability | Elevation of Privilege | 7.8 | Important | No | No |
| CVE-2026-33095 | Microsoft Word Remote Code Execution Vulnerability | Remote Code Execution | 7.8 | Important | No | No |
| CVE-2026-33098 | Windows Container Isolation FS Filter Driver Elevation of Privilege Vulnerability | Elevation of Privilege | 7.8 | Important | No | No |
| CVE-2026-33101 | Windows Print Spooler Elevation of Privilege Vulnerability | Elevation of Privilege | 7.8 | Important | No | No |
| CVE-2026-27913 | Windows BitLocker Security Feature Bypass Vulnerability | Security Feature Bypass | 7.7 | Important | No | No |
| CVE-2026-23666 | .NET Framework Denial of Service Vulnerability | Denial of Service | 7.5 | Critical | No | No |
| CVE-2026-26154 | Windows Server Update Service (WSUS) Tampering Vulnerability | Tampering | 7.5 | Important | No | No |
| CVE-2026-26171 | .NET Denial of Service Vulnerability | Denial of Service | 7.5 | Important | No | No |
| CVE-2026-32071 | Windows Local Security Authority Subsystem Service (LSASS) Denial of Service Vulnerability | Denial of Service | 7.5 | Important | No | No |
| CVE-2026-32178 | .NET Spoofing Vulnerability | Spoofing | 7.5 | Important | No | No |
| CVE-2026-32203 | .NET and Visual Studio Denial of Service Vulnerability | Denial of Service | 7.5 | Important | No | No |
| CVE-2026-33096 | HTTP.sys Denial of Service Vulnerability | Denial of Service | 7.5 | Important | No | No |
| CVE-2026-33116 | .NET, .NET Framework, and Visual Studio Denial of Service Vulnerability | Denial of Service | 7.5 | Important | No | No |
| CVE-2026-32156 | Windows UPnP Device Host Remote Code Execution Vulnerability | Remote Code Execution | 7.4 | Important | No | No |
| CVE-2026-32149 | Windows Hyper-V Remote Code Execution Vulnerability | Remote Code Execution | 7.3 | Important | No | No |
| CVE-2026-26151 | Remote Desktop Spoofing Vulnerability | Spoofing | 7.1 | Important | No | No |
| CVE-2026-32188 | Microsoft Excel Information Disclosure Vulnerability | Information Disclosure | 7.1 | Important | No | No |
| CVE-2026-25184 | Applocker Filter Driver (applockerfltr.sys) Elevation of Privilege Vulnerability | Elevation of Privilege | 7.0 | Important | No | No |
| CVE-2026-26152 | Microsoft Cryptographic Services Elevation of Privilege Vulnerability | Elevation of Privilege | 7.0 | Important | No | No |
| CVE-2026-26165 | Windows Shell Elevation of Privilege Vulnerability | Elevation of Privilege | 7.0 | Important | No | No |
| CVE-2026-26166 | Windows Shell Elevation of Privilege Vulnerability | Elevation of Privilege | 7.0 | Important | No | No |
| CVE-2026-26173 | Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability | Elevation of Privilege | 7.0 | Important | No | No |
| CVE-2026-26174 | Windows Server Update Service (WSUS) Elevation of Privilege Vulnerability | Elevation of Privilege | 7.0 | Important | No | No |
| CVE-2026-26177 | Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability | Elevation of Privilege | 7.0 | Important | No | No |
| CVE-2026-26182 | Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability | Elevation of Privilege | 7.0 | Important | No | No |
| CVE-2026-27908 | Windows TDI Translation Driver (tdx.sys) Elevation of Privilege Vulnerability | Elevation of Privilege | 7.0 | Important | No | No |
| CVE-2026-27917 | Windows WFP NDIS Lightweight Filter Driver (wfplwfs.sys) Elevation of Privilege Vulnerability | Elevation of Privilege | 7.0 | Important | No | No |
| CVE-2026-27921 | Windows TDI Translation Driver (tdx.sys) Elevation of Privilege Vulnerability | Elevation of Privilege | 7.0 | Important | No | No |
| CVE-2026-27922 | Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability | Elevation of Privilege | 7.0 | Important | No | No |
| CVE-2026-27926 | Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability | Elevation of Privilege | 7.0 | Important | No | No |
| CVE-2026-27929 | Windows LUA File Virtualization Filter Driver Elevation of Privilege Vulnerability | Elevation of Privilege | 7.0 | Important | No | No |
| CVE-2026-32068 | Windows Simple Search and Discovery Protocol (SSDP) Service Elevation of Privilege Vulnerability | Elevation of Privilege | 7.0 | Important | No | No |
| CVE-2026-32070 | Windows Common Log File System Driver Elevation of Privilege Vulnerability | Elevation of Privilege | 7.0 | Important | No | No |
| CVE-2026-32073 | Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability | Elevation of Privilege | 7.0 | Important | No | No |
| CVE-2026-32075 | Windows UPnP Device Host Elevation of Privilege Vulnerability | Elevation of Privilege | 7.0 | Important | No | No |
| CVE-2026-32080 | Windows WalletService Elevation of Privilege Vulnerability | Elevation of Privilege | 7.0 | Important | No | No |
| CVE-2026-32082 | Windows Simple Search and Discovery Protocol (SSDP) Service Elevation of Privilege Vulnerability | Elevation of Privilege | 7.0 | Important | No | No |
| CVE-2026-32083 | Windows Simple Search and Discovery Protocol (SSDP) Service Elevation of Privilege Vulnerability | Elevation of Privilege | 7.0 | Important | No | No |
| CVE-2026-32086 | Windows Function Discovery Service (fdwsd.dll) Elevation of Privilege Vulnerability | Elevation of Privilege | 7.0 | Important | No | No |
| CVE-2026-32087 | Windows Function Discovery Service (fdwsd.dll) Elevation of Privilege Vulnerability | Elevation of Privilege | 7.0 | Important | No | No |
| CVE-2026-32093 | Windows Function Discovery Service (fdwsd.dll) Elevation of Privilege Vulnerability | Elevation of Privilege | 7.0 | Important | No | No |
| CVE-2026-32150 | Windows Function Discovery Service (fdwsd.dll) Elevation of Privilege Vulnerability | Elevation of Privilege | 7.0 | Important | No | No |
| CVE-2026-32195 | Windows Kernel Elevation of Privilege Vulnerability | Elevation of Privilege | 7.0 | Important | No | No |
| CVE-2026-32219 | Microsoft Brokering File System Elevation of Privilege Vulnerability | Elevation of Privilege | 7.0 | Important | No | No |
| CVE-2026-32224 | Windows Server Update Service (WSUS) Elevation of Privilege Vulnerability | Elevation of Privilege | 7.0 | Important | No | No |
| CVE-2026-33099 | Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability | Elevation of Privilege | 7.0 | Important | No | No |
| CVE-2026-33100 | Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability | Elevation of Privilege | 7.0 | Important | No | No |
| CVE-2026-33104 | Win32k Elevation of Privilege Vulnerability | Elevation of Privilege | 7.0 | Important | No | No |
| CVE-2026-32223 | Windows USB Printing Stack (usbprint.sys) Elevation of Privilege Vulnerability | Elevation of Privilege | 6.8 | Important | No | No |
| CVE-2026-0390 | UEFI Secure Boot Security Feature Bypass Vulnerability | Security Feature Bypass | 6.7 | Important | No | No |
| CVE-2026-32167 | SQL Server Elevation of Privilege Vulnerability | Elevation of Privilege | 6.7 | Important | No | No |
| CVE-2026-32176 | SQL Server Elevation of Privilege Vulnerability | Elevation of Privilege | 6.7 | Important | No | No |
| CVE-2026-26155 | Microsoft Local Security Authority Subsystem Service Information Disclosure Vulnerability | Information Disclosure | 6.5 | Important | No | No |
| CVE-2026-27925 | Windows UPnP Device Host Information Disclosure Vulnerability | Information Disclosure | 6.5 | Important | No | No |
| CVE-2026-32151 | Windows Shell Information Disclosure Vulnerability | Information Disclosure | 6.5 | Important | No | No |
| CVE-2026-32072 | Active Directory Spoofing Vulnerability | Spoofing | 6.2 | Important | No | No |
| CVE-2026-26169 | Windows Kernel Memory Information Disclosure Vulnerability | Information Disclosure | 6.1 | Important | No | No |
| CVE-2026-32088 | Windows Biometric Service Security Feature Bypass Vulnerability | Security Feature Bypass | 6.1 | Important | No | No |
| CVE-2026-32196 | Windows Admin Center Spoofing Vulnerability | Spoofing | 6.1 | Important | No | No |
| CVE-2026-33822 | Microsoft Word Information Disclosure Vulnerability | Information Disclosure | 6.1 | Important | No | No |
| CVE-2026-32226 | .NET Framework Denial of Service Vulnerability | Denial of Service | 5.9 | Important | No | No |
| CVE-2026-23653 | GitHub Copilot and Visual Studio Code Information Disclosure Vulnerability | Information Disclosure | 5.7 | Important | No | No |
| CVE-2026-23670 | Windows Virtualization-Based Security (VBS) Security Feature Bypass Vulnerability | Security Feature Bypass | 5.7 | Important | No | No |
| CVE-2026-20806 | Windows COM Server Information Disclosure Vulnerability | Information Disclosure | 5.5 | Important | No | No |
| CVE-2026-27930 | Windows GDI Information Disclosure Vulnerability | Information Disclosure | 5.5 | Important | No | No |
| CVE-2026-27931 | Windows GDI Information Disclosure Vulnerability | Information Disclosure | 5.5 | Important | No | No |
| CVE-2026-32079 | Web Account Manager Information Disclosure Vulnerability | Information Disclosure | 5.5 | Important | No | No |
| CVE-2026-32081 | Package Catalog Information Disclosure Vulnerability | Information Disclosure | 5.5 | Important | No | No |
| CVE-2026-32084 | Windows Print Spooler Information Disclosure Vulnerability | Information Disclosure | 5.5 | Important | No | No |
| CVE-2026-32085 | Remote Procedure Call Information Disclosure Vulnerability | Information Disclosure | 5.5 | Important | No | No |
| CVE-2026-32181 | Connected User Experiences and Telemetry Service Denial of Service Vulnerability | Denial of Service | 5.5 | Important | No | No |
| CVE-2026-32212 | Universal Plug and Play (upnp.dll) Information Disclosure Vulnerability | Information Disclosure | 5.5 | Important | No | No |
| CVE-2026-32214 | Universal Plug and Play (upnp.dll) Information Disclosure Vulnerability | Information Disclosure | 5.5 | Important | No | No |
| CVE-2026-32215 | Windows Kernel Information Disclosure Vulnerability | Information Disclosure | 5.5 | Important | No | No |
| CVE-2026-32216 | Windows Redirected Drive Buffering System Denial of Service Vulnerability | Denial of Service | 5.5 | Important | No | No |
| CVE-2026-32217 | Windows Kernel Information Disclosure Vulnerability | Information Disclosure | 5.5 | Important | No | No |
| CVE-2026-32218 | Windows Kernel Information Disclosure Vulnerability | Information Disclosure | 5.5 | Important | No | No |
| CVE-2026-33103 | Microsoft Dynamics 365 (On-Premises) Information Disclosure Vulnerability | Information Disclosure | 5.5 | Important | No | No |
| CVE-2026-33119 | Microsoft Edge (Chromium-based) for Android Spoofing Vulnerability | Spoofing | 5.4 | Moderate | No | No |
| CVE-2026-20928 | Windows Recovery Environment Security Feature Bypass Vulnerability | Security Feature Bypass | 4.6 | Important | No | No |
| CVE-2026-20945 | Microsoft SharePoint Server Spoofing Vulnerability | Spoofing | 4.6 | Important | No | No |
| CVE-2026-26175 | Windows Boot Manager Security Feature Bypass Vulnerability | Security Feature Bypass | 4.6 | Important | No | No |
| CVE-2026-27906 | Windows Hello Security Feature Bypass Vulnerability | Security Feature Bypass | 4.4 | Important | No | No |
| CVE-2026-32220 | UEFI Secure Boot Security Feature Bypass Vulnerability | Security Feature Bypass | 4.4 | Important | No | No |
| CVE-2026-32202 | Windows Shell Spoofing Vulnerability | Spoofing | 4.3 | Important | No | No |
| CVE-2026-33118 | Microsoft Edge (Chromium-based) Spoofing Vulnerability | Spoofing | 4.3 | Low | No | No |
| CVE-2026-33829 | Windows Snipping Tool Spoofing Vulnerability | Spoofing | 4.3 | Moderate | No | No |
Retrospective Vulnerability Analysis
CVE-2026-20820 — Windows Common Log File System Driver Elevation of Privilege Vulnerability (Elevation of Privilege). A heap-based buffer overflow vulnerability in the CLFS file system driver that allows a local attacker to escalate privileges to the SYSTEM level. Exploitation is carried out by creating a log container and sending a specially crafted IOCTL request with a buffer that violates memory boundaries (Out-of-Bounds write). A public PoC is available demonstrating the overflow mechanism. The vulnerability was patched in January 2026.
CVE-2026-21509 — Microsoft Office Security Feature Bypass Vulnerability (Security Feature Bypass). This vulnerability is related to the improper reliance on input validation when making security decisions (CWE-807). An attacker can create a specially crafted DOCX document with an embedded OLE object in which the Class ID (CLSID) is modified. This allows for a local bypass of Office security features, forcing the application to initialize potentially dangerous components (such as Shell.Explorer) without proper verification. A Python PoC is available that automates the creation of the malicious document by patching the OLE file headers. Patched in January 2026.
CVE-2026-20929 — Windows HTTP.sys Elevation of Privilege Vulnerability (Elevation of Privilege). A vulnerability in the HTTP.sys driver and Kerberos authentication components that allows for a CNAME Abuse technique to conduct Kerberos Relay attacks. The issue lies in improper access rights validation and the behavior of the Kerberos client: upon receiving a CNAME DNS record, the Windows client trusts the alias and forms a TGS request using the hostname from the CNAME as the SPN. This allows an attacker in a DNS MITM position (e.g., via IPv6/DHCPv6) to force any domain user to request a Kerberos ticket for a service chosen by the attacker and redirect it to nodes where Channel Binding (CBT) or signing enforcement is not configured. An extended PoC is available on GitHub featuring CNAME poisoning functions, which allows for SYSTEM-level privilege acquisition. The vulnerability was patched in January 2026.
CVE-2026-24289 — Windows Kernel Elevation of Privilege Vulnerability (Elevation of Privilege). A Use-After-Free (UAF) vulnerability in the Windows kernel (ntoskrnl.exe) arising from a race condition during I/O Completion Ports (IOCP) processing. The issue is that the IopCompleteRequest function reads the completion context from the file object without acquiring the necessary spin lock, allowing a local attacker to free or replace this context right while it is being used via a parallel NtSetInformationFile call. Successful exploitation allows for privilege escalation in the system to the SYSTEM level. The published PoC demonstrates the race mechanism, resulting in a fatal system crash (BSOD) with error code 0x18 (REFERENCE_BY_POINTER) on vulnerable builds. The vulnerability was patched in March 2026.
CVE-2026-24291 — Windows Accessibility Infrastructure (ATBroker.exe) Elevation of Privilege Vulnerability (Elevation of Privilege). A logical vulnerability, dubbed "RegPwn", related to the incorrect assignment of access rights to registry keys (CWE-732) used by the ATBroker.exe process. When the system transitions into "Secure Desktop" mode (e.g., when locking the screen or prompting a UAC window), the system process copies configuration data from registry branches that are normally writeable by a standard user. Using registry symbolic links and opportunistic locks (oplocks) on the oskmenu.xml file, a local attacker can redirect the write operation to modify critical system parameters (such as a service's ImagePath), allowing arbitrary code execution with SYSTEM privileges. The vulnerability was patched in March 2026.
CVE-2026-23671 — Windows Bluetooth RFCOMM Protocol Driver Elevation of Privilege Vulnerability (Elevation of Privilege). A race condition vulnerability in the Bluetooth RFCOMM protocol driver (bthport.sys) that allows a local attacker to escalate privileges to the SYSTEM level. The flaw lies in improper synchronization of access to channel objects (TOCTOU), making it possible to spoof the channel descriptor in the short window between access rights verification and operation execution. A public BlueSploit PoC module by researcher v33ru is available, demonstrating the attack using the SABM flood method to seize the system security context. The vulnerability was patched in March 2026.
Conclusion
The April 2026 update is a critical event requiring maximum concentration and immediate action from IT departments. The massive number of patches (165) will require careful deployment planning and testing; however, the process cannot be delayed due to the presence of actively exploited flaws and fundamental network threats.
Patching priorities for April:
- Immediate response (Zero-Days): Roll out updates to SharePoint servers to block the actively exploited CVE-2026-32201. Additionally, urgently update the Microsoft Defender platform (CVE-2026-33825) to prevent the antivirus from being used against the system itself.
- Network perimeter and infrastructure protection: Critical RCEs in the IKE, TCP/IP, and Active Directory services are a "nightmare" scenario for network administrators. Internet-facing servers (especially VPN and IPsec gateways) and Domain Controllers must be updated on the very first night.
- Endpoint protection: Install patches for components responsible for bypassing security (Windows Shell, SmartScreen, BitLocker), and update the Microsoft Office suites to neutralize attack vectors via phishing and malicious links.
It is also highly recommended to carefully review the "Retrospective Vulnerability Analysis" section. The emergence of powerful public exploits for March and February vulnerabilities (such as Kerberos CNAME Abuse, RegPwn for ATBroker, and kernel overflows) means that attackers have already automated attacks on systems that were not updated in the first quarter of 2026. Addressing your technical debt regarding patches is absolutely vital right now.