Skip to content

Daily Threat Intel

Cyber threat intelligence for security leaders

Menu
  • Vulnerabilities
  • Malware
  • Breaches
  • Enterprise
  • Supply Chain
  • Emerging Threats
  • Cloud
  • About us
Menu
software update concept

2 Zero-Days and 18 Other High Risk Vulns in Microsoft’s April Update

Posted on April 14, 2026

Image source: The KonG, Shutterstock

In total, the company released fixes for 165 CVEs this Patch Tuesday

Microsoft released fixes for 165 CVEs this month. That is the second highest set of vulnerabilities on record for a Patch Tuesday after the company’s 175-patch update in October 2025.

Two of the CVEs need immediate attention because they are zero-days. Microsoft identified 18 other bugs as vulnerabilities that attackers are more likely to exploit for a variety of reasons.

Here are the two 0-days:

CVE-2026-32201, a Microsoft SharePoint Server Spoofing vulnerability that attackers are already exploiting. Attackers can exploit the flaw to spoof malicious content and fool users into trusting it.

CVE-2026-33825, an elevation of privilege vulnerability in Defender for which proof-of-exploit code (BlueHammer) is publicly available. Attackers who successfully abuse it can gain SYSTEM level access on affected devices

The following are the vulnerabilities that Microsoft categorized as “Exploitation More Likely” vulnerabilities and therefore meriting high-priority attention.

CVE-2026-0390 Security Bypass in Windows Boot Loader

CVE-2026-26151 Remote Desktop Spoofing Vulnerability

CVE-2026-26169 Windows Kernel Memory Information Disclosure Vulnerability

CVE-2026-27906 Windows Hello Security Feature Bypass Vulnerability

CVE-2026-27908 Windows TDI Translation Driver (tdx.sys) Elevation of Privilege Vulnerability

CVE-2026-27909 Windows Search Service Elevation of Privilege Vulnerability

CVE-2026-27913 Windows BitLocker Security Feature Bypass Vulnerability

CVE-2026-27914 Microsoft Management Console Elevation of Privilege Vulnerability

CVE-2026-27921 Windows TDI Translation Driver (tdx.sys) Elevation of Privilege Vulnerability

CVE-2026-32070  Windows Common Log File System Driver Elevation of Privilege Vulnerability

CVE-2026-32075 Windows UPnP Device Host Elevation of Privilege Vulnerability

CVE-2026-32093 Windows Function Discovery Service (fdwsd.dll) Elevation of Privilege Vulnerability

CVE-2026-32152 Desktop Window Manager Elevation of Privilege Vulnerability

CVE-2026-32154 Desktop Window Manager Elevation of Privilege Vulnerability

CVE-2026-32162 Windows COM Elevation of Privilege Vulnerability

CVE-2026-32202 Windows Shell Spoofing Vulnerability

CVE-2026-32225 Windows Shell Security Feature Bypass Vulnerability

CVE-2026-33825 Microsoft Defender Elevation of Privilege Vulnerability

CVE-2026-33826 Windows Active Directory Remote Code Execution Vulnerability

Share

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

  • Project Glasswing FAQ: A Look at Anthropic’s Bid to Secure the Internet
  • 2 Zero-Days and 18 Other High Risk Vulns in Microsoft’s April Update
  • Criminals Weaponize Microsoft’s Device Code Authentication in Widescale Phishing Operation
  • Iran-Linked Actors Disrupt Rockwell/Allen Bradley PLCs
  • Are Your Systems Patched Against Storm-1175 Attacks?
©2026 Daily Threat Intel | Design: Newspaperly WordPress Theme