Microsoft Strengthens Security with Patches for SharePoint Zero-Day and 168 Additional Vulnerabilities

Published:

spot_img

Microsoft Strengthens Security with Patches for SharePoint Zero-Day and 168 Additional Vulnerabilities

On Tuesday, Microsoft announced a significant update aimed at addressing a record 169 security vulnerabilities across its product suite. This release is particularly noteworthy as it includes a zero-day vulnerability that has been actively exploited in the wild, highlighting the ongoing challenges organizations face in maintaining cybersecurity.

Overview of the Vulnerabilities

Among the 169 vulnerabilities, 157 are classified as Important, eight as Critical, three as Moderate, and one as Low in severity. The breakdown reveals that 93 of these flaws are related to privilege escalation, while 21 pertain to information disclosure and another 21 to remote code execution. Additional categories include 14 security feature bypasses, 10 spoofing vulnerabilities, and nine denial-of-service issues.

Notably, the update also addresses four non-Microsoft Common Vulnerabilities and Exposures (CVEs) affecting third-party products: AMD (CVE-2023-20585), Node.js (CVE-2026-21637), Windows Secure Boot (CVE-2026-25250), and Git for Windows (CVE-2026-32631). This comprehensive update follows the resolution of 78 vulnerabilities in Microsoft’s Chromium-based Edge browser last month.

Historical Context and Industry Impact

This release marks the second-largest Patch Tuesday in Microsoft’s history, just shy of the record set in October 2025, which saw 183 security flaws addressed. According to Satnam Narang, a senior staff research engineer at Tenable, “At this pace, 2026 is on track to affirm that 1,000+ Patch Tuesday CVEs annually is the norm.” This trend underscores the increasing complexity and frequency of security threats that organizations must navigate.

In the past eight months, privilege escalation vulnerabilities have dominated the Patch Tuesday landscape, accounting for 57% of all CVEs patched in April. In contrast, remote code execution vulnerabilities have decreased to just 12%, indicating a shift in the types of threats organizations are facing.

Active Exploitation of CVE-2026-32201

One of the vulnerabilities that has garnered significant attention is CVE-2026-32201, a spoofing vulnerability affecting Microsoft SharePoint Server, which carries a CVSS score of 6.5. Microsoft has indicated that improper input validation within SharePoint allows unauthorized attackers to spoof content over a network. This vulnerability enables attackers to view sensitive information and alter disclosed data, although it does not allow them to restrict access to resources.

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has responded to the active exploitation of this vulnerability by adding it to the Known Exploited Vulnerabilities (KEV) catalog. Federal Civilian Executive Branch (FCEB) agencies are required to remediate this vulnerability by April 28, 2026.

Implications of CVE-2026-33825 in Microsoft Defender

Another critical vulnerability is CVE-2026-33825, a privilege escalation flaw in Microsoft Defender with a CVSS score of 7.8. This vulnerability could allow an authorized attacker to elevate privileges locally by exploiting inadequate access controls within Defender. Microsoft has stated that no user action is required to install the update for this vulnerability, as the platform updates itself automatically.

The patch addresses a zero-day exploit known as BlueHammer, which was publicly disclosed on GitHub by a security researcher following a breakdown in communication with Microsoft regarding the vulnerability disclosure process. This exploit leverages the Microsoft Defender update process to escalate privileges, allowing low-privileged users to gain SYSTEM-level access.

Remote Code Execution Risk in IKE Service Extensions

Among the most severe vulnerabilities addressed in this update is CVE-2026-33824, which affects the Windows Internet Key Exchange (IKE) Service Extensions and has a CVSS score of 9.8. Exploitation of this vulnerability requires an attacker to send specially crafted packets to a Windows machine with IKE v2 enabled, potentially leading to remote code execution.

Adam Barnett, a lead software engineer at Rapid7, noted that vulnerabilities allowing unauthenticated remote code execution against modern Windows assets are rare. However, the IKE service is exposed to untrusted networks, making it a target for attackers. The implications for enterprise environments are significant, particularly for those relying on VPN or IPsec for secure communications. Successful exploitation could lead to complete system compromise, enabling attackers to steal sensitive data or disrupt operations.

Conclusion

The recent updates from Microsoft illustrate the evolving landscape of cybersecurity threats and the critical need for organizations to remain vigilant. With a record number of vulnerabilities addressed, the urgency for timely patching and remediation has never been more pronounced. As organizations navigate these challenges, the importance of robust security measures and proactive threat management cannot be overstated.

For further details on the vulnerabilities addressed, refer to the original reporting source: thehackernews.com.

Keep reading for the latest cybersecurity developments, threat intelligence and breaking updates from across the Middle East.

spot_img

Related articles

Recent articles

Integrated Transport Centre Strengthens Partnerships with Strategic Partners in Abu Dhabi

Integrated Transport Centre Strengthens Partnerships with Strategic Partners in Abu Dhabi Abu Dhabi's Integrated Transport Centre (ITC), a key entity under the Department of Municipalities...

NIST Restricts CVE Enrichment Following 263% Surge in Submissions

NIST Restricts CVE Enrichment Following 263% Surge in Submissions The National Institute of Standards and Technology (NIST) has implemented significant changes to its management of...

Al Nada Tower Achieves LEED Gold Certification, Strengthening MREF’s Investment Strategy

Al Nada Tower Achieves LEED Gold Certification, Strengthening MREF's Investment Strategy Kuwait Financial Centre “Markaz” has announced that Al Nada Tower has been awarded LEED...

Tis Hazari Court Convicts CBI Joint Director and Retired ACP for Malicious 2000 Raid on Ashok Aggarwal

Tis Hazari Court Convicts CBI Joint Director and Retired ACP for Malicious 2000 Raid on Ashok Aggarwal In a significant ruling, Delhi's Tis Hazari Court...