{"id":45440,"date":"2026-04-15T22:17:20","date_gmt":"2026-04-15T14:17:20","guid":{"rendered":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/04\/15\/microsoft-fixes-two-zero-days-in-april-patch-tuesday-infosecurity-magazine\/"},"modified":"2026-04-15T22:17:20","modified_gmt":"2026-04-15T14:17:20","slug":"microsoft-fixes-two-zero-days-in-april-patch-tuesday-infosecurity-magazine","status":"publish","type":"post","link":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/04\/15\/microsoft-fixes-two-zero-days-in-april-patch-tuesday-infosecurity-magazine\/","title":{"rendered":"Microsoft Fixes Two Zero-Days in April Patch Tuesday &#8211; Infosecurity Magazine"},"content":{"rendered":"<p>Microsoft published a higher-than-usual list of fixes for CVEs as part of its monthly Patch Tuesday update round yesterday, including two zero-day vulnerabilities.<\/p>\n<p>One of these, CVE-2026-32201, is being actively exploited in the wild.<\/p>\n<p>It is described as a server spoofing vulnerability in SharePoint whereby improper input validation allows an unauthorized attacker to perform spoofing over a network.<\/p>\n<p>&ldquo;By exploiting this flaw, an attacker can manipulate how information is presented to users, potentially tricking them into trusting malicious content. While the direct impact on data is limited, the ability to deceive users makes this a powerful tool for broader attacks,&rdquo; explained Action1 president, Mike Walters.<\/p>\n<p>&ldquo;It can be used to deceive employees, partners, or customers by presenting falsified information within trusted SharePoint environments. This CVE can enable phishing attacks, unauthorized data manipulation, or <a href=\"https:\/\/www.infosecurityeurope.com\/en-gb\/blog\/threat-vectors\/hacking-your-brain-top-13-social-engineering-techniques.html\" target=\"_self\">social engineering<\/a> campaigns that lead to further compromise.&rdquo;<\/p>\n<p><a href=\"https:\/\/www.infosecurity-magazine.com\/news\/microsoft-fixes-two-publicly\/\" target=\"_blank\"><em>Read more on Patch Tuesday: Microsoft Fixes Two Publicly Disclosed Zero-Days.<\/em><\/a><\/p>\n<p>The second zero-day has been publicly disclosed but not exploited at this time.<\/p>\n<p>CVE-2026-33825 is an elevation of privilege (EoP) vulnerability in Microsoft Defender that could enable a threat actor to gain system-level access.<\/p>\n<p>Jack Bicer, director of vulnerability research at Action1, warned that the CVE could be chained with others in real-world attacks.<\/p>\n<p>&ldquo;CVE-2026-33825 significantly increases risk in environments where attackers have already gained a foothold,&rdquo; he added.<\/p>\n<p>&ldquo;Once exploited, it allows full control over endpoints, enabling data exfiltration, disabling security tools, and lateral movement across networks. Even environments with strong perimeter defenses are at risk if internal systems are compromised.&rdquo;<\/p>\n<h2><strong>EoP Bugs Dominate&nbsp;April<\/strong><\/h2>\n<p>In fact, EoP vulnerabilities are by far the largest category of CVEs this month, amounting to 93 flaws. Information disclosure (21), remote code execution (20) and security feature bypass (13) comprise the next-largest categories by volume.<\/p>\n<p>Walters urged sysadmins to also look at CVE-2026-33824. With a CVSS score of 9.8, the remote code execution flaw is the most dangerous on paper this month and impacts the Windows Internet Key Exchange (IKE) service.<\/p>\n<p>Threat actors could exploit the vulnerability remotely by sending specially crafted network packets, with internet-facing IKEv2 systems particularly at risk, he said.<\/p>\n<p>&ldquo;This issue poses a serious threat to enterprise environments, especially those relying on VPN or IPsec for secure communications,&rdquo; Walters continued. &ldquo;Successful exploitation can result in complete system compromise, allowing attackers to steal sensitive data, disrupt operations, or move laterally across the network.&rdquo;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Microsoft published a higher-than-usual list of fixes f [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[26],"tags":[],"class_list":["post-45440","post","type-post","status-publish","format-standard","hentry","category--infosecurity-magazine"],"_links":{"self":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/45440","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/comments?post=45440"}],"version-history":[{"count":0,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/45440\/revisions"}],"wp:attachment":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/media?parent=45440"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/categories?post=45440"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/tags?post=45440"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}