Skip to content
Threat Feed
high advisory

Microsoft Defender Privilege Escalation Vulnerability (CVE-2026-33825)

CVE-2026-33825 allows a locally authenticated attacker to escalate privileges in Microsoft Defender due to insufficient access control granularity.

CVE-2026-33825 describes a privilege escalation vulnerability affecting Microsoft Defender. The vulnerability stems from insufficient granularity of access control, allowing an attacker with local access and some level of authorization to elevate their privileges on the system. The vulnerability was published on April 14, 2026. Successful exploitation of this vulnerability would allow an attacker to perform actions with higher privileges than intended, potentially leading to system compromise. Microsoft has released a patch, and defenders should apply it as soon as possible.

Attack Chain

  1. Attacker gains initial local access to a system with Microsoft Defender installed. This may be achieved through existing credentials or exploitation of another vulnerability.
  2. The attacker identifies a specific area within Microsoft Defender where access control is insufficiently granular.
  3. The attacker crafts a malicious request or input that exploits the identified access control weakness.
  4. Microsoft Defender processes the malicious request, failing to properly validate the attacker’s authorization level.
  5. The attacker gains elevated privileges within the context of Microsoft Defender.
  6. The attacker leverages the elevated privileges to modify Defender settings, policies, or configurations.
  7. The attacker uses the modified Defender configuration to execute arbitrary code with elevated privileges on the system.
  8. The attacker achieves full system compromise, potentially leading to data theft, malware installation, or denial of service.

Impact

Successful exploitation of CVE-2026-33825 allows an attacker to escalate privileges on a system running Microsoft Defender. This could allow the attacker to disable security features, install malware, steal sensitive data, or gain complete control of the affected system. Given the widespread deployment of Microsoft Defender, this vulnerability poses a significant risk to a large number of organizations and individuals.

Recommendation

  • Apply the Microsoft patch for CVE-2026-33825 immediately to remediate the vulnerability (https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33825).
  • Monitor process creation events for unusual processes spawned by Microsoft Defender processes (see Sigma rule below).
  • Review and harden Microsoft Defender’s configuration to ensure least privilege and prevent unauthorized modifications.

Detection coverage 2

Suspicious Process Spawned by Microsoft Defender

high

Detects suspicious processes spawned by Microsoft Defender processes, potentially indicating privilege escalation.

sigma tactics: privilege_escalation techniques: T1068 sources: process_creation, windows

Defender Configuration Modification via Command Line

medium

Detects command-line modifications to Defender's configuration, potentially indicative of exploitation attempts.

sigma tactics: defense_evasion techniques: T1562.001 sources: process_creation, windows

Detection queries are kept inside the platform. Get full rules →

Indicators of compromise

1

email

TypeValue
email[email protected]