{"id":45436,"date":"2026-04-15T22:20:06","date_gmt":"2026-04-15T14:20:06","guid":{"rendered":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/04\/15\/microsoft-issues-patches-for-sharepoint-zero-day-and-168-other-new-vulnerabilities\/"},"modified":"2026-04-15T22:20:06","modified_gmt":"2026-04-15T14:20:06","slug":"microsoft-issues-patches-for-sharepoint-zero-day-and-168-other-new-vulnerabilities","status":"publish","type":"post","link":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/04\/15\/microsoft-issues-patches-for-sharepoint-zero-day-and-168-other-new-vulnerabilities\/","title":{"rendered":"Microsoft Issues Patches for SharePoint Zero-Day and 168 Other New Vulnerabilities"},"content":{"rendered":"<div style=\"clear: both;\"><a href=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjKhAYMS4CZDglUzVBKPpIJJJjC7LSHIE8r8HSYTDvQtfuqIlLk-jorWPPNvMPaiuWSriWM2WP-cyKqr_TRwlOG65EY9ZZWuRYsrzcn05wg3mkQd_-j103HEjHaUryyOF7jWj6IuAM6VwCUloPq_9RMt959E-yG8qF4n1acw3OfY73fWw4p90V0ClaY4hjo\/s1600\/windows-update.jpg\" style=\"clear: left; display: block; float: left; padding: 1em 0px; text-align: center;\"><img decoding=\"async\" border=\"0\" data-original-height=\"470\" data-original-width=\"900\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjKhAYMS4CZDglUzVBKPpIJJJjC7LSHIE8r8HSYTDvQtfuqIlLk-jorWPPNvMPaiuWSriWM2WP-cyKqr_TRwlOG65EY9ZZWuRYsrzcn05wg3mkQd_-j103HEjHaUryyOF7jWj6IuAM6VwCUloPq_9RMt959E-yG8qF4n1acw3OfY73fWw4p90V0ClaY4hjo\/s1600\/windows-update.jpg\" alt=\"Microsoft Issues Patches for SharePoint Zero-Day and 168 Other New Vulnerabilities\" \/><\/a><\/div>\n<p>Microsoft on Tuesday released updates to address a&nbsp;record <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/releaseNote\/2026-apr\">169 security&nbsp;flaws<\/a> across its product portfolio, including one vulnerability that&nbsp;has been actively&nbsp;exploited in the&nbsp;wild.<\/p>\n<p>Of these 169 vulnerabilities, 157 are rated Important, eight are rated&nbsp;Critical, three are rated Moderate,&nbsp;and one is rated Low in&nbsp;severity. Ninety-three of the flaws are classified as privilege escalation, followed by 21 information disclosure, 21 remote code execution, 14 security feature bypass, 10 spoofing, and nine denial-of-service vulnerabilities.<\/p>\n<p>Also included among the 169 flaws are&nbsp;four non-Microsoft&nbsp;issued&nbsp;CVEs impacting AMD (CVE-2023-20585), Node.js&nbsp;(CVE-2026-21637), Windows Secure Boot (CVE-2026-25250), and Git for Windows (CVE-2026-32631). The updates are in addition&nbsp;to <a href=\"https:\/\/learn.microsoft.com\/en-us\/deployedge\/microsoft-edge-relnotes-security\">78 vulnerabilities<\/a> that&nbsp;have been&nbsp;addressed&nbsp;in its Chromium-based Edge browser since&nbsp;the <a href=\"https:\/\/thehackernews.com\/2026\/03\/microsoft-patches-84-flaws-in-march.html\">update that&nbsp;was released last&nbsp;month<\/a>.<\/p>\n<p>The release makes it&nbsp;the second&nbsp;biggest Patch Tuesday&nbsp;ever, a&nbsp;little below the record set in October 2025, when Microsoft addressed&nbsp;a <a href=\"https:\/\/thehackernews.com\/2025\/10\/two-new-windows-zero-days-exploited-in.html\">massive 183 security&nbsp;flaws<\/a>.&nbsp;&#8220;At this pace, 2026 is on track to affirm that 1,000+ Patch Tuesday CVEs annually is the&nbsp;norm,&#8221; Satnam Narang, senior staff research engineer at Tenable,&nbsp;said.<\/p>\n<p>&#8220;Not only that, but elevation of privilege bugs continue to dominate the Patch Tuesday cycle over the last eight months, accounting for a record 57% of all CVEs patched in April, while remote code execution (RCE) vulnerabilities have dropped to just 12%, tied with information disclosure vulnerabilities this&nbsp;month.&#8221;<\/p>\n<p>The vulnerability that has come under active exploitation&nbsp;is <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-32201\">CVE-2026-32201<\/a> (CVSS score: 6.5), a spoofing vulnerability impacting Microsoft SharePoint&nbsp;Server.<\/p>\n<p> <a name=\"more\"><\/a> <\/p>\n<p>&#8220;Improper input validation in Microsoft Office SharePoint allows an unauthorized attacker to perform spoofing over a&nbsp;network,&#8221; Microsoft said in an&nbsp;advisory.&nbsp;&#8220;An attacker who successfully exploited the vulnerability could view some sensitive information (Confidentiality), make changes to disclosed information (Integrity), but cannot limit access to the resource (Availability).&#8221;<\/p>\n<p>Although the vulnerability&nbsp;was internally discovered, it&#8217;s currently not known&nbsp;how it&#8217;sbeing&nbsp;exploited, and who may be behind the&nbsp;activity, and the scale of such&nbsp;efforts.<\/p>\n<p>&#8220;This zero-day vulnerability in Microsoft SharePoint Server is caused by improper input validation, allowing attackers to spoof trusted content or interfaces over a&nbsp;network,&#8221; Mike Walters, president and co-founder of Action1,&nbsp;said.&nbsp;<\/p>\n<p>&#8220;By exploiting this flaw, an attacker can manipulate how information is presented to users, potentially tricking them into trusting malicious content. While&nbsp;the direct impact on data is limited, the ability to deceive users makes this a powerful tool for broader&nbsp;attacks.&#8221;<\/p>\n<p>The active exploitation of CVE-2026-32201 has prompted the U.S. Cybersecurity and Infrastructure Security Agency (CISA)&nbsp;to <a href=\"https:\/\/www.cisa.gov\/news-events\/alerts\/2026\/04\/14\/cisa-adds-two-known-exploited-vulnerabilities-catalog\">add<\/a> it to the Known Exploited Vulnerabilities&nbsp;(<a href=\"https:\/\/www.cisa.gov\/known-exploited-vulnerabilities-catalog\">KEV<\/a>) catalog, requiring Federal Civilian Executive Branch (FCEB) agencies to remediate the shortcoming by April 28,&nbsp;2026.<\/p>\n<p>Another vulnerability of note is a privilege escalation flaw in Microsoft Defender&nbsp;(<a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-33825\">CVE-2026-33825<\/a>, CVSS score: 7.8), which&nbsp;has been&nbsp;flagged as publicly known at the time of&nbsp;release. According to Redmond, the vulnerability could allow an authorized attacker to elevate privileges locally&nbsp;by taking advantage&nbsp;ofDefender&#8217;slack of&nbsp;adequate granular access&nbsp;controls.<\/p>\n<p>Microsoft noted that no user action is required to install the update for CVE-2026-33825, as the platform updates itself frequently by default. Systems that have disabled Microsoft Defender are not in an exploitable&nbsp;state.<\/p>\n<p>While Microsoft&#8217;s advisory makes no mention of public exploit code, the patch is said to resolve a zero-day known&#160;as <a href=\"https:\/\/www.tenable.com\/blog\/microsofts-april-2026-patch-tuesday-addresses-163-cves-cve-2026-32201\">BlueHammer<\/a> that&#160;was <a href=\"https:\/\/deadeclipse666.blogspot.com\/2026\/04\/public-disclosure.html\">shared<\/a> on GitHub on April 3, 2026, by a disgruntled security researcher using the alias&#160;&#8221;<a href=\"https:\/\/x.com\/ChaoticEclipse0\/status\/2040052131491660027\">Chaotic&#160;Eclipse<\/a>&#8221; after a breakdown in communication with the tech giant over its handling of the vulnerability disclosure process. As&#160;of writing, access to the public exploit repository requires a user to sign in to&#160;GitHub.<\/p>\n<p>Per Cyderes, the vulnerability exploits the Microsoft Defender update process through Volume Shadow Copy abuse to escalate a low-privileged user to NT AUTHORITYSYSTEM by chaining together legitimate Windows&#160;features.<\/p>\n<p>&#8220;During certain Defender update and remediation workflows, Defender creates a temporary Volume Shadow Copy snapshot,&#8221; security researchers Rahul Ramesh and Reegun&#160;Jayapaul <a href=\"https:\/\/www.cyderes.com\/howler-cell\/windows-zero-day-bluehammer\">explained<\/a> earlier this month. &#8220;BlueHammer uses Cloud Files callbacks and oplocks to pause Defender at precisely the right moment, leaving the snapshot mounted and the SAM, SYSTEM, and SECURITY registry hives accessible &#8211; files&#160;that are normally&#160;locked at&#160;runtime.&#8221;<\/p>\n<p>&#8220;Successful exploitation allows an attacker to read the SAM database, decrypt NTLM password hashes, take over a local administrator account, and spawn a SYSTEM-level shell, all while restoring the original password hash to avoid detection.&#8221;<\/p>\n<p>Security researcher Will Dormann, in&#160;a <a href=\"https:\/\/infosec.exchange\/@wdormann\/116358064691025711\">post on&#160;Mastodon<\/a>, confirmed the BlueHammer exploit no longer works and &#8220;seems fixed as of CVE-2026-33825,&#8221; although &#8220;some of the suspicious parts of the exploit still seem to&#160;work.&#8221;<\/p>\n<p>One of the most severe vulnerabilities is&nbsp;a case&nbsp;of remote code&nbsp;execution impacting the Windows Internet Key Exchange (IKE) Service Extensions.Tracked&nbsp;as <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-33824\">CVE-2026-33824<\/a>, the security defect has a CVSS score of&nbsp;9.8&nbsp;out of&nbsp;10.0.<\/p>\n<p>&#8220;Exploitation requires an attacker to send specially crafted packets to a Windows machine with IKE v2 enabled, which could enable remote code execution,&#8221; Adam Barnett, lead software engineer at Rapid7, said in a statement.<\/p>\n<p>&#8220;Vulnerabilities leading to unauthenticated RCE against modern Windows assets are relatively rare, or we&#8217;d see more wormable vulnerabilities self-propagating across the internet. However, since IKE provides secure tunnel negotiation services, for instance, for VPNs, it is necessarily exposed to untrusted networks and reachable in a pre-authorization&nbsp;context.&#8221;<\/p>\n<p>Walters noted that the security flaw poses a serious threat to enterprise environments, particularly those relying on VPN or IPsec for secure communications. Successful exploitation of the vulnerability could result in complete system compromise, allowing bad actors to steal sensitive data, disrupt operations, or move laterally across the&nbsp;network.<\/p>\n<p>&#8220;The lack of required user interaction makes this especially dangerous for internet-facing systems. Its&nbsp;low attack complexity and full system impact make it a prime candidate for rapid weaponization,&#8221; Walters added. &#8220;Internet-facing systems running IKEv2 services are particularly at risk, and delaying patch deployment increases exposure to potential widespread&nbsp;attacks.&#8221;<\/p>\n<div><\/div>\n<div>Found this article interesting?  Follow us on <a href='https:\/\/news.google.com\/publications\/CAAqLQgKIidDQklTRndnTWFoTUtFWFJvWldoaFkydGxjbTVsZDNNdVkyOXRLQUFQAQ' rel='noopener' target='_blank'>Google News<\/a>, <a href='https:\/\/twitter.com\/thehackersnews' rel='noopener' target='_blank'>Twitter<\/a> and <a href='https:\/\/www.linkedin.com\/company\/thehackernews\/' rel='noopener' target='_blank'>LinkedIn<\/a> to read more exclusive content we post.<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Microsoft on Tuesday released updates to address a&nbsp;record 169 security&nbsp;flaws across its product portfolio, including one vulnerability that&nbsp;has been actively&nbsp;exploited in the&nbsp;wild.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6],"tags":[],"class_list":["post-45436","post","type-post","status-publish","format-standard","hentry","category-thehackernews"],"_links":{"self":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/45436","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/comments?post=45436"}],"version-history":[{"count":0,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/45436\/revisions"}],"wp:attachment":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/media?parent=45436"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/categories?post=45436"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/tags?post=45436"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}