Microsoft’s April 2026 Patch Tuesday includes security updates for 167 vulnerabilities, including two zero-days. One of these flaws was actively exploited in the wild, while the other had been publicly disclosed prior to patching. Eight vulnerabilities are classified as critical, seven involving remote code execution and one tied to denial of service.
Breakdown of Vulnerabilities
- 93 Elevation of Privilege vulnerabilities
- 20 Remote Code Execution vulnerabilities
- 21 Information Disclosure vulnerabilities
- 13 Security Feature Bypass vulnerabilities
- 10 Denial of Service vulnerabilities
- 9 Spoofing vulnerabilities
These totals do not include vulnerabilities in Mariner, Azure, and Bing that were addressed earlier in the month, nor the 80 Microsoft Edge and Chromium issues fixed separately by Google.
Zero-Day Vulnerabilities
April’s Patch Tuesday addresses two zero-day vulnerabilities, including one actively exploited.
CVE-2026-32201 | Microsoft SharePoint Server Spoofing Vulnerability
This actively exploited vulnerability allows an unauthenticated attacker to perform spoofing over a network due to improper input validation. Successful exploitation could allow access to sensitive information and enable modification of data, though it does not directly impact availability. Microsoft has not disclosed details on how the vulnerability was exploited or who reported it.
CVE-2026-33825 | Microsoft Defender Elevation of Privilege Vulnerability
This publicly disclosed vulnerability allows attackers to elevate privileges to SYSTEM level. The issue has been addressed in Microsoft Defender Antimalware Platform version 4.18.26050.3011, which is distributed automatically through security updates. The flaw was discovered by Zen Dodd and Yuanpei Xu of HUST with Diffract.
Other Notable Vulnerabilities
Microsoft also patched multiple remote code execution vulnerabilities in Microsoft Office, including Word and Excel. These flaws can be exploited either through the preview pane or by opening malicious documents, making them particularly relevant in phishing-driven attack scenarios. Systems that process external attachments face elevated risk if updates are delayed.
Adobe and Other Vendor Updates
Several major vendors released security updates alongside Microsoft’s April patches:
- Adobe issued updates across a wide range of products, including Illustrator, Acrobat, Photoshop, ColdFusion, and InDesign, and addressed an actively exploited zero-day in Reader and Acrobat.
- Apache patched a long-standing remote code execution vulnerability in ActiveMQ Classic that had remained undiscovered for over a decade.
- Apple expanded security update support to additional iOS 18 devices to defend against the actively exploited DarkSword exploit kit.
- Cisco released updates addressing multiple vulnerabilities, including an authentication bypass in Integrated Management Controller (IMC) that could allow administrative access.
- Fortinet patched several products, including an actively exploited vulnerability in FortiClient Enterprise Management Server (EMS).
- Google released Android’s April security bulletin and patched an actively exploited Chrome zero-day.
- Researchers disclosed the GPUBreach Rowhammer-based attack, capable of privilege escalation and full system compromise under certain conditions.
- Marimo released a fix for a pre-authentication remote code execution flaw under active exploitation.
- SAP issued updates for multiple products, including a critical SQL injection vulnerability in Business Planning and Consolidation and Business Warehouse.
- wolfSSL released a fix for a vulnerability that could allow forged certificates to be accepted by affected systems.
Recommendations for Users and Administrators
Organizations should prioritize patching Microsoft SharePoint Server and Microsoft Defender deployments due to the presence of an actively exploited vulnerability and a SYSTEM-level privilege escalation flaw. Systems handling document-based workflows, particularly those using Microsoft Office, should also be updated without delay due to preview pane exploitation risk.
Security teams should monitor third-party advisories from vendors such as Adobe, Fortinet, Cisco, and SAP, especially where active exploitation has been confirmed. April’s update cycle reinforces the continued focus by threat actors on enterprise collaboration platforms, endpoint protection tools, and document-based attack vectors.
Full technical details and patch links are available in Microsoft’s Security Update Guide.
How Can Netizen Help?
Founded in 2013, Netizen is an award-winning technology firm that develops and leverages cutting-edge solutions to create a more secure, integrated, and automated digital environment for government, defense, and commercial clients worldwide. Our innovative solutions transform complex cybersecurity and technology challenges into strategic advantages by delivering mission-critical capabilities that safeguard and optimize clients’ digital infrastructure. One example of this is our popular “CISO-as-a-Service” offering that enables organizations of any size to access executive level cybersecurity expertise at a fraction of the cost of hiring internally.
Netizen also operates a state-of-the-art 24x7x365 Security Operations Center (SOC) that delivers comprehensive cybersecurity monitoring solutions for defense, government, and commercial clients. Our service portfolio includes cybersecurity assessments and advisory, hosted SIEM and EDR/XDR solutions, software assurance, penetration testing, cybersecurity engineering, and compliance audit support. We specialize in serving organizations that operate within some of the world’s most highly sensitive and tightly regulated environments where unwavering security, strict compliance, technical excellence, and operational maturity are non-negotiable requirements. Our proven track record in these domains positions us as the premier trusted partner for organizations where technology reliability and security cannot be compromised.
Netizen holds ISO 27001, ISO 9001, ISO 20000-1, and CMMI Level III SVC registrations demonstrating the maturity of our operations. We are a proud Service-Disabled Veteran-Owned Small Business (SDVOSB) certified by U.S. Small Business Administration (SBA) that has been named multiple times to the Inc. 5000 and Vet 100 lists of the most successful and fastest-growing private companies in the nation. Netizen has also been named a national “Best Workplace” by Inc. Magazine, a multiple awardee of the U.S. Department of Labor HIRE Vets Platinum Medallion for veteran hiring and retention, the Lehigh Valley Business of the Year and Veteran-Owned Business of the Year, and the recipient of dozens of other awards and accolades for innovation, community support, working environment, and growth.
Looking for expert guidance to secure, automate, and streamline your IT infrastructure and operations? Start the conversation today.















You must be logged in to post a comment.