Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
SOCs & MSSPs Prevent Phishing Missed Incidents Email
May 13, 2026
Fragnesia Linux Vulnerability Let Attackers Gain Root Privileges
May 13, 2026
Foxconn Confirms Cyberattack by Nitrogen Ransomware Gang
May 13, 2026
Home/CyberSecurity News/Microsoft Patch Tuesday April 2026: Actively Vulnerabilities Fixed
CyberSecurity News

Microsoft Patch Tuesday April 2026: Actively Vulnerabilities Fixed

Microsoft’s April 2026 Patch Tuesday security update addresses 168 vulnerabilities across its product portfolio, including one actively exploited zero-day and one publicly disclosed flaw. Both...

Emy Elsamnoudy
Emy Elsamnoudy
April 14, 2026 2 Min Read
7 0

Microsoft’s April 2026 Patch Tuesday security update addresses 168 vulnerabilities across its product portfolio, including one actively exploited zero-day and one publicly disclosed flaw. Both require immediate prioritization by organizations.

Zero-Day Under Active Exploitation

The most critical issue in this month’s release is CVE-2026-32201, a Microsoft SharePoint Server Spoofing Vulnerability currently being actively exploited in the wild.

Rated Important, this flaw allows attackers to conduct spoofing attacks against SharePoint environments, posing a significant risk to enterprises relying on SharePoint for document management and collaboration. Security teams are urged to apply the patch immediately, as exploitation has already been confirmed.

Additionally, CVE-2026-33825, a Microsoft Defender Elevation of Privilege Vulnerability, was publicly disclosed before this patch cycle. While no active exploitation has been reported, the public availability of information about this flaw increases the likelihood of imminent abuse, making it a high-priority remediation target.

Of the 168 vulnerabilities patched this month, the distribution by attack type is as follows:

Impact Count
Elevation of Privilege 93
Information Disclosure 21
Remote Code Execution 20
Security Feature Bypass 13
Denial of Service 10
Spoofing 8
Tampering 2
Defense in Depth 1
Total 168

Critical RCE Vulnerabilities Patched

Among the eight Critical-rated flaws, all but one are Remote Code Execution (RCE) vulnerabilities, underscoring the severity of this month’s release:

  • CVE-2026-33827 – Windows TCP/IP Remote Code Execution Vulnerability
  • CVE-2026-33826 – Windows Active Directory Remote Code Execution Vulnerability
  • CVE-2026-33824 – Windows Internet Key Exchange (IKE) Service Extensions RCE
  • CVE-2026-33115 & CVE-2026-33114 – Microsoft Word Remote Code Execution (two separate flaws)
  • CVE-2026-32190 – Microsoft Office Remote Code Execution Vulnerability
  • CVE-2026-32157 – Remote Desktop Client Remote Code Execution Vulnerability
  • CVE-2026-23666 – .NET Framework Denial of Service Vulnerability (Critical-rated)

The Windows TCP/IP and Active Directory RCE flaws are particularly alarming because they can be exploited at the network level without user interaction in certain configurations.

This month’s updates span a wide range of Microsoft products and services, including Windows Kernel (multiple EoP flaws), Windows Print Spooler, Windows LSASS, Windows Hyper-V, Remote Desktop Licensing Service, Azure Monitor Agent, Azure Logic Apps, Microsoft SQL Server, SharePoint Server, PowerShell, GitHub Copilot, and Visual Studio Code.

The Windows UPnP Device Host component alone received multiple EoP patches, signaling focused hardening of Windows networking subsystems.

Security and IT teams should take the following steps immediately:

  • Prioritize CVE-2026-32201 (SharePoint) as an emergency patch given confirmed exploitation
  • Address CVE-2026-33825 (Microsoft Defender) due to its public disclosure status
  • Deploy all Critical-rated RCE patches, particularly for Windows TCP/IP, Active Directory, and Remote Desktop Client
  • Review and patch .NET Framework and Office components to block local and document-based attack vectors
  • Audit systems for WSUS and BitLocker bypass vulnerabilities (CVE-2026-32224, CVE-2026-27913), which could undermine update delivery and disk encryption integrity.

Security teams should apply all April 2026 patches as soon as possible, with immediate priority on CVE-2026-32201.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackCVEExploitPatchSecurityVulnerabilityzero-day

Share Article

Emy Elsamnoudy

Emy Elsamnoudy

Emy is a cybersecurity analyst and reporter specializing in threat hunting, defense strategies, and industry trends. With expertise in proactive security measures, Emily covers the tools and techniques organizations use to detect and prevent cyber attacks. She is a regular speaker at security conferences and has contributed to industry reports on threat intelligence and security operations. Emily's reporting focuses on helping organizations improve their security posture through practical, actionable insights.

Previous Post

CISA Warns of Microsoft Exchange and Windows CLFS Vulnerabilities

Next Post

Fortinet Patches Critical Flaws in Forti Vulnerabilities Across

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
iOS 26.5 Brings End-to-end Encrypted RCS Messaging Between iPhone
May 13, 2026
Critical Exim BDAT GnuTLS Flaw Vulnerability Enables
May 13, 2026
Google Boosts Android Mobile Security with New AI Protections
May 13, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Jennifer sherman
Jennifer sherman
Sarah simpson
Sarah simpson
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us