{"id":45500,"date":"2026-04-17T05:25:00","date_gmt":"2026-04-16T21:25:00","guid":{"rendered":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/04\/17\/new-microsoft-defender-redsun-zero-day-poc-grants-system-privileges\/"},"modified":"2026-04-17T05:25:00","modified_gmt":"2026-04-16T21:25:00","slug":"new-microsoft-defender-redsun-zero-day-poc-grants-system-privileges","status":"publish","type":"post","link":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/04\/17\/new-microsoft-defender-redsun-zero-day-poc-grants-system-privileges\/","title":{"rendered":"New Microsoft Defender \u201cRedSun\u201d zero-day PoC grants SYSTEM privileges"},"content":{"rendered":"\n<p style=\"text-align:center\"><img loading=\"lazy\" decoding=\"async\" height=\"900\" src=\"https:\/\/www.bleepstatic.com\/content\/hl-images\/2023\/10\/11\/Microsoft-Defender_for_Endpoint.jpg\" width=\"1600\" alt=\"New Microsoft Defender \u201cRedSun\u201d zero-day PoC grants SYSTEM privileges\"><\/p>\n<p>A researcher known as &#8220;Chaotic Eclipse&#8221; has published a proof-of-concept exploit for a second Microsoft Defender zero-day, dubbed &#8220;RedSun,&#8221; in the past two weeks, protesting how the company works with cybersecurity researchers.<\/p>\n<p>This exploit is for a local privilege escalation (LPE) flaw that grants SYSTEM privileges in Windows 10, Windows 11, and Windows Server on the latest <a href=\"https:\/\/www.bleepingcomputer.com\/news\/microsoft\/microsoft-april-2026-patch-tuesday-fixes-167-flaws-2-zero-days\/\" target=\"_blank\" rel=\"nofollow noopener\">April Patch Tuesday<\/a> patches, when Windows Defender is enabled.<\/p>\n<p>&#8220;When Windows Defender realizes that a malicious file has a cloud tag, for whatever stupid and hilarious reason, the antivirus that&#8217;s supposed to protect decides that it is a good idea to just rewrite the file it found again to it&#8217;s original location,&#8221; <a href=\"https:\/\/github.com\/Nightmare-Eclipse\/RedSun\" target=\"_blank\" rel=\"nofollow noopener\">explains the researcher<\/a>.<\/p>\n<div align=\"center\" style=\"width:98%; margin:0 auto; text-align:center; padding:4px; background:#f0f0f0; border:1px solid #ccc; border-radius:6px;\">  <a href=\"https:\/\/www.adaptivesecurity.com\/demo\/security-awareness-training?utm_source=display_network&amp;utm_medium=paid_display&amp;utm_campaign=2026_04_display_bleepingcomputer&amp;utm_id=701Rd00000fE8REIA0&amp;utm_content=970x250\" rel=\"nofollow noopener\" target=\"_blank\"><img decoding=\"async\" src=\"https:\/\/www.bleepstatic.com\/c\/a\/as-tour-the-platform-970-x250.jpg\" style=\"margin-top: 0px;\" alt=\"New Microsoft Defender \u201cRedSun\u201d zero-day PoC grants SYSTEM privileges\"><\/a> <\/div>\n<p>&#8220;The PoC abuses this behaviour to overwrite system files and gain administrative privileges.&#8221;<\/p>\n<p>Will Dormann, principal vulnerability analyst at Tharros, has confirmed to BleepingComputer that the exploit for the new Microsoft Defender RedSun zero-day works and grants SYSTEM privileges on fully patched Windows 10, Windows 11, and Windows Server 2019 and later.<\/p>\n<p>&#8220;This Exploit uses the &#8216;Cloud Files API&#8217;, writes EICAR to a file using it, uses an oplock to win a volume shadow copy race, and uses a directory junction\/reparse point to redirect the file rewrite (with new contents) to C:Windowssystem32TieringEngineService.exe,&#8221; Dormann wrote in a <a href=\"https:\/\/infosec.exchange\/@wdormann\/116412019416916182\" target=\"_blank\" rel=\"nofollow noopener\">thread on Mastodon<\/a>.<\/p>\n<p>&#8220;At this point, the Cloud Files Infrastructure runs the attacker-planted TieringEngineService.exe (which is the RedSun.exe exploit itself) as SYSTEM. Game over.&#8221;<\/p>\n<div style=\"text-align:center\">\n<figure style=\"display:inline-block\"><img loading=\"lazy\" decoding=\"async\" height=\"600\" src=\"https:\/\/www.bleepstatic.com\/images\/news\/Microsoft\/zero-day\/r\/redsun\/redsun-exploit.png\" width=\"800\" alt=\"New Microsoft Defender \u201cRedSun\u201d zero-day PoC grants SYSTEM privileges\"><figcaption><strong>RedSun exploit granting SYSTEM privileges in a fully-patched Windows 11<\/strong><br \/><em>Source: Dormann<\/em><br \/>  &nbsp;<\/figcaption><\/figure>\n<\/div>\n<p>Dormann says that some antivirus vendors on VirusTotal are detecting the exploit [<a href=\"https:\/\/www.virustotal.com\/gui\/file\/d84250e2ad053ab4097d0591933935573e4cab3e975360004a126abc102dc6f6\" target=\"_blank\" rel=\"nofollow noopener\">VirusTotal<\/a>] because the exploit executable contains an embedded EIRCAR (antivirus test file). However, he reduced detections [<a href=\"https:\/\/www.virustotal.com\/gui\/file\/ba55a1618302dfcf8c09d8eb8346e0a6fb252c2d61d5fa4db8a40cbab475f37e\" target=\"_blank\" rel=\"nofollow noopener\">VirusTotal<\/a>] by encrypting the EICAR string within the executable.<\/p>\n<p>Last week, this researcher, known as &#8220;Chaotic Eclipse,&#8221; released an <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/disgruntled-researcher-leaks-bluehammer-windows-zero-day-exploit\/\" target=\"_blank\" rel=\"nofollow noopener\">exploit for a different Microsoft Defender LPE zero-day<\/a>, dubbed &#8220;BlueHammer,&#8221; which is now tracked as&nbsp;<a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2026-33825\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2026-33825<\/a>. Microsoft fixed the flaw as part of this month&#8217;s Patch Tuesday security updates.<\/p>\n<p>The researcher says they published both zero-day PoCs in protest at how Microsoft works with cybersecurity researchers who disclose vulnerabilities to the Microsoft Security Response Center (MSRC).<\/p>\n<p>&#8220;Normally, I would go through the process of begging them to fix a bug but to summarize, I was told personally by them that they will ruin my life and they did and I&#8217;m not sure if I was the only who had this horride experience or few people did but I think most would just eat it and cut their losses but for me, they took away everything,&#8221; <a href=\"https:\/\/deadeclipse666.blogspot.com\/2026\/04\/public-disclosure-response-for-cve-2026.html\" target=\"_blank\" rel=\"nofollow noopener\">alleged the researcher<\/a>.<\/p>\n<p>&#8220;They mopped the floor with me and pulled every childish game they could. It was soo bad at some point I was wondering if I was dealing with a massive corporation or someone who is just having fun seeing me suffer but it seems to be a collective decision.&#8221;<\/p>\n<p>BleepingComputer contacted the researcher for more details on their interaction with the MSRC.<\/p>\n<p>When contacting Microsoft about these alleged issues, they shared the following statement.<\/p>\n<p>&#8220;Microsoft has a customer commitment to investigate reported security issues and update impacted devices to protect customers as soon as possible,&#8221; a Microsoft spokesperson told BleepingComputer.<\/p>\n<p>&#8220;We also support coordinated vulnerability disclosure, a widely adopted industry practice that helps ensure issues are carefully investigated and addressed before public disclosure, supporting both customer protection and the security research community.&#8221;<\/p>\n<style> .ia_ad {     background-color: #f0f6ff;     width: 95%;     max-width: 800px;     margin: 15px auto;     border-radius: 8px;     border: 1px solid #d6ddee;     display: flex;     align-items: stretch;     padding: 0;     overflow: hidden; }  .ia_lef {     flex: 1;     max-width: 200px;     height: auto;     display: flex;     align-items: stretch; }  .ia_lef a {     display: flex;     width: 100%;     height: 100%; }   .ia_lef a img {     width: 100%;     height: 100%;          border-radius: 8px 0 0 8px;     margin: 0;     display: block; }  .ia_rig {     flex: 2;     padding: 10px;     display: flex;     flex-direction: column;     justify-content: center; }  .ia_rig h2 {     font-size: 17px !important;     font-weight: 700;     color: #333;     line-height: 1.4;     font-family: Georgia, \"Times New Roman\", Times, serif;     margin: 0 0 14px 0; }  .ia_rig p {     font-weight: bold;     font-size: 14px;     margin: 0 0 clamp(6px, 2vw, 14px) 0; }  .ia_button {     background-color: #FFF;     border: 1px solid #3b59aa;     color: black;     text-align: center;     text-decoration: none;     border-radius: 8px;     display: inline-block;     font-size: 16px;     font-weight: bold;     cursor: pointer;     padding: 10px 20px;     width: fit-content; }  .ia_button a {     text-decoration: none;     color: inherit;     display: block; }  @media (max-width: 600px) {     .ia_ad {         flex-direction: column;         align-items: center;     }      .ia_lef {         max-width: 100%;     }      .ia_lef a img {         border-radius: 8px 8px 0 0;     }       .ia_rig {         padding: 15px;         width: 100%;     }      .ia_button {         width: 100%; \tmargin: 0px auto;     } } <\/style>\n<div>\n<div>         <a href=\"https:\/\/hubs.li\/Q048zztN0\" target=\"_blank\" rel=\"noopener sponsored\">             <img decoding=\"async\" src=\"https:\/\/www.bleepingcomputer.com\/news\/microsoft\/new-microsoft-defender-redsun-zero-day-poc-grants-system-privileges\/data:image\/gif;base64,R0lGODlhAQABAAAAACH5BAEKAAEALAAAAAABAAEAAAICTAEAOw==\" data-src=\"https:\/\/www.bleepstatic.com\/c\/p\/picus-whitepaper.jpg\" alt=\"New Microsoft Defender \u201cRedSun\u201d zero-day PoC grants SYSTEM privileges\"><\/a>     <\/div>\n<div>\n<h2><a href=\"https:\/\/hubs.li\/Q048zztN0\" target=\"_blank\" rel=\"noopener sponsored\">Automated Pentesting Covers Only 1 of 6 Surfaces.<\/a><\/h2>\n<p>Automated pentesting proves the path exists. BAS proves whether your controls stop it. Most teams run one without the other.<\/p>\n<p>This whitepaper maps six validation surfaces, shows where coverage ends, and provides practitioners with three diagnostic questions for any tool evaluation.<\/p>\n<p>           <button><a href=\"https:\/\/hubs.li\/Q048zztN0\" target=\"_blank\" rel=\"noopener sponsored\">Get Your Copy Now<\/a><\/button>     <\/div>\n<\/p><\/div>\n<div>\n<h3>Related Articles:<\/h3>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/microsoft\/microsoft-some-windows-servers-ask-for-bitlocker-key-after-april-updates\/\">Microsoft: April updates trigger BitLocker key prompts on some servers<\/a><\/p>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/microsoft\/microsoft-adds-windows-protections-for-malicious-remote-desktop-files\/\">Microsoft adds Windows protections for malicious Remote Desktop files<\/a><\/p>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/hackers-exploiting-acrobat-reader-zero-day-flaw-since-december\/\">Hackers exploiting Acrobat Reader zero-day flaw since December<\/a><\/p>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/disgruntled-researcher-leaks-bluehammer-windows-zero-day-exploit\/\">Disgruntled researcher leaks &ldquo;BlueHammer&rdquo; Windows zero-day exploit<\/a><\/p>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/ex-l3harris-exec-jailed-for-selling-zero-days-to-russian-exploit-broker\/\">Ex-L3Harris exec jailed for selling zero-days to Russian exploit broker<\/a><\/p>\n<\/p><\/div>\n","protected":false},"excerpt":{"rendered":"<p>A researcher known as &#8220;Chaotic Eclipse&#8221; has [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[28],"tags":[],"class_list":["post-45500","post","type-post","status-publish","format-standard","hentry","category--bleepingcomputer"],"_links":{"self":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/45500","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/comments?post=45500"}],"version-history":[{"count":0,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/45500\/revisions"}],"wp:attachment":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/media?parent=45500"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/categories?post=45500"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/tags?post=45500"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}