Microsoft April 2026 Patch Tuesday Addresses 163 Vulnerabilities
Microsoft's April 2026 Patch Tuesday addresses 163 vulnerabilities, including 8 critical ones, ranging from Tampering to Remote Code Execution and Privilege Escalation, affecting various Microsoft products; it is recommended to apply patches immediately.
Microsoft’s April 2026 Patch Tuesday addresses 163 vulnerabilities across its product range, with 8 rated as critical. This update includes fixes for actively exploited zero-day vulnerabilities. The vulnerabilities span multiple categories, including remote code execution (RCE), elevation of privilege, and spoofing. Specifically, CVE-2026-32201 is a zero-day actively exploited in Microsoft SharePoint, and CVE-2026-33826 poses a critical RCE risk in Windows Active Directory environments. Given the wide range of impacted products and the severity of certain vulnerabilities, organizations are strongly advised to prioritize patching to mitigate potential risks of exploitation and lateral movement. The updates cover both server and workstation products.
Attack Chain
- Initial Access (CVE-2026-32201): An attacker exploits a spoofing vulnerability in Microsoft SharePoint, potentially through cross-site scripting (XSS).
- Exploitation (CVE-2026-33826): An authenticated attacker sends a specially crafted RPC call to an RPC host within a restricted Active Directory domain.
- Code Execution (CVE-2026-33826): The crafted RPC call triggers code execution with the same permissions as the RPC host on the target system.
- Privilege Escalation (CVE-2026-33825): An attacker leverages insufficient access control granularity in Microsoft Defender to escalate privileges locally.
- Network Propagation (CVE-2026-33824, CVE-2026-33827): An unauthenticated attacker sends crafted packets to a target with IKE version 2 enabled, or a crafted IPv6 packet to a Windows node where IPSec is enabled, to achieve code execution.
- Defense Evasion (CVE-2026-27913): An attacker bypasses Secure Boot by exploiting an input validation vulnerability in Windows BitLocker.
- Lateral Movement (CVE-2026-33826): Threat actors use the foothold established via Active Directory exploitation to move laterally within the organization’s network.
- Impact: The attacker steals data and deploys malware across the compromised network.
Impact
The successful exploitation of these vulnerabilities could lead to a range of impacts, from data theft and malware deployment to complete system compromise. Given that Microsoft products are widely used across various sectors, a successful attack could affect a large number of organizations, including those in critical infrastructure. The exploitation of Active Directory vulnerabilities (CVE-2026-33826) is particularly concerning, as it could allow attackers to establish a foothold for lateral movement, potentially affecting hundreds or thousands of systems within an enterprise network. The actively exploited SharePoint vulnerability (CVE-2026-32201) could lead to sensitive information disclosure and unauthorized modifications.
Recommendation
- Apply the Microsoft April 2026 Patch Tuesday updates immediately to all affected systems, prioritizing those with critical vulnerabilities, especially CVE-2026-32201 (SharePoint) and CVE-2026-33826 (Active Directory).
- Upscale monitoring and detection capabilities to identify suspicious activity related to the exploitation of these vulnerabilities, as recommended by the advisory.
- Deploy the Sigma rule to detect suspicious RPC calls indicative of CVE-2026-33826 exploitation in Windows Active Directory environments.
- Implement firewall rules to mitigate the risk of CVE-2026-33824 exploitation targeting the Windows Internet Key Exchange (IKE) Service Extensions, as suggested in the advisory.
- Review and enforce strict input validation practices to prevent exploitation of spoofing vulnerabilities like CVE-2026-32201 and CVE-2026-26151.
Detection coverage 2
Detect Suspicious RPC Calls to Active Directory
highDetects suspicious RPC calls indicative of potential CVE-2026-33826 exploitation in Windows Active Directory environments.
Detect Exploitation Attempts CVE-2026-33824 (Windows IKE Service Extensions)
mediumDetects suspicious network traffic to IKE service extensions, potentially indicating exploitation attempts related to CVE-2026-33824.
Detection queries are kept inside the platform. Get full rules →