Skip Navigation

April 15, 2026 |

Microsoft April 2026 Patch Tuesday fixes two zero days, including BlueHammer

Loading table of contents...

At a glance: Microsoft’s April Patch Tuesday addresses 163 vulnerabilities, including two zero days. CVE-2026-32201 is an actively exploited spoofing vulnerability in Microsoft SharePoint Server that may allow unauthorized viewing and modification of sensitive information. CVE-2026-33825 is an elevation-of-privilege vulnerability in Microsoft Defender that enables a local user to gain SYSTEM-level access by abusing the signature update process. Applying Microsoft’s security updates and ensuring Defender platforms are current reduces risk.

Threat summary

On April 14, Microsoft released its April Patch Tuesday security updates, addressing 163 vulnerabilities across Windows, Microsoft Office, SharePoint Server, and supporting components.

The release includes eight vulnerabilities rated Critical, primarily remote code execution issues, and two zero‑day vulnerabilities. Microsoft confirmed that one of the zero days was actively exploited prior to patch availability.

Microsoft reported active exploitation of CVE-2026-32201, a spoofing vulnerability affecting Microsoft SharePoint Server. The flaw originates from improper input validation and allows a remote adversary to spoof trusted SharePoint resources over the network. Microsoft assessed the impact is mostly on confidentiality and integrity, but not availability, indicating risk of unauthorized data access or content modification within SharePoint environments.

A Common Vulnerability Scoring System (CVSS) base score of 6.5 has been assigned, and Microsoft describes the worst-case scenario as unauthorized viewing and modification of sensitive business information.

The second zero-day addressed in this release is CVE-2026-33825, an elevation-of-privilege vulnerability in Microsoft Defender assigned with CVSS:7.8. The flaw allows a local user to escalate privileges to SYSTEM-level access. Microsoft resolved the issue through an updated Microsoft Defender Antimalware Platform release (version 4.18.26050.3011), which is distributed automatically via Defender’s update mechanism.

Independent researchers have identified CVE-2026-33825 as the vulnerability publicly referred to as BlueHammer. BlueHammer is a Windows local privilege escalation zero day disclosed on April 3, 2026. The flaw abuses Microsoft Defender’s signature update mechanism, chaining a time‑of‑check to time‑of‑use race condition with path confusion to achieve SYSTEM‑level privileges.

While Microsoft’s advisory for CVE-2026-33825 does not reference it as “BlueHammer,” the flaw matches BlueHammer’s vulnerability class, affected component, and impact. There is no evidence in public reporting of a separate Microsoft Defender privilege escalation flaw being addressed under this CVE.

The vulnerability allows a low-privileged local user to elevate privileges to NT AUTHORITY\SYSTEM, the highest privilege level on Windows. It does not rely on memory corruption, kernel exploitation, or code execution within Defender itself. Instead, it abuses a sequence of legitimate Windows features during Defender’s signature update process, resulting in temporary access to normally locked registry hives, including the Security Account Manager, which stores local credential hashes.

The first public proof-of-concept for BlueHammer appeared on April 3, when exploit source code was posted to GitHub. Independent validation followed within days, including confirmation from vulnerability researchers that the technique works on fully patched systems.

Analysis

Applying the Microsoft Defender Antimalware Platform update released on April 14, remediates CVE-2026-33825. Organizations using Microsoft Defender receive this update automatically through Defender’s update mechanism. Verifying that Defender platforms are current across managed endpoints reduces exposure to SYSTEM-level privilege escalation via the Defender signature update workflow.

Until it's verified that the relevant security updates have been successfully applied to all affected endpoints and servers, risk reduction could focus on limiting how the vulnerabilities can be abused and improving visibility. BlueHammer requires local execution, so reducing opportunities for initial access, such as limiting local administrator privileges and unnecessary interactive access to endpoints, lowers overall risk. Monitoring for unusual Microsoft Defender update behavior, unexpected Volume Shadow Copy Service activity, and sudden privilege elevation can help identify potential exploitation.

While Microsoft Defender detects the original proof-of-concept exploit, multiple analyses show that modified versions can evade signature-based detection, making behavior-based monitoring more reliable than static indicators alone.

For CVE-2026-32201, applying the Microsoft security updates for Microsoft SharePoint Server remediates the actively exploited spoofing vulnerability. Microsoft has not published functional workarounds beyond patching; however, limiting external exposure of SharePoint servers and monitoring for unusual authentication activity, request patterns, and unexpected content changes can help reduce risk if patch deployment is delayed.

ThreatRoundUp_SignUp_Simplifiedx2

Stay on top of emerging threats like this.

Sign up to receive a weekly roundup of our security intelligence feed. You'll be the first to know of emerging attack vectors, threats, and vulnerabilities. 

Sign up