×

Microsoft Addresses 167 Vulnerabilities, Including Two Zero-Days, in April 2026 Patch Tuesday Update

In its April 2026 Patch Tuesday release, Microsoft has addressed a substantial number of security vulnerabilities, totaling 167, including two critical zero-day flaws. This comprehensive update underscores Microsoft's commitment to enhancing the security of its products and protecting users from potential threats.

Overview of the April 2026 Patch Tuesday

On April 14, 2026, Microsoft released its monthly security updates, commonly known as Patch Tuesday. This month's release is particularly significant due to the high number of vulnerabilities addressed and the inclusion of two zero-day exploits.

Breakdown of Vulnerabilities

The 167 vulnerabilities addressed in this update span various categories:

  • 93 Elevation of Privilege Vulnerabilities
  • 20 Remote Code Execution Vulnerabilities
  • 21 Information Disclosure Vulnerabilities
  • 13 Security Feature Bypass Vulnerabilities
  • 10 Denial of Service Vulnerabilities
  • 9 Spoofing Vulnerabilities

Among these, eight are classified as critical, with seven involving remote code execution and one related to denial of service. The remaining vulnerabilities are deemed important. ([bleepingcomputer.com](https://www.bleepingcomputer.com/news/microsoft/microsoft-april-2026-patch-tuesday-fixes-167-flaws-2-zero-days/?utm_source=openai))

Zero-Day Vulnerabilities Addressed

Zero-day vulnerabilities are particularly concerning as they are exploited by attackers before developers have had the opportunity to release fixes. This month's update addresses two such vulnerabilities:

CVE-2026-32201: Microsoft SharePoint Server Spoofing Vulnerability

This vulnerability allows an unauthenticated attacker to perform spoofing over a network due to improper input validation in Microsoft Office SharePoint. Successful exploitation could enable attackers to view sensitive information and modify disclosed data, impacting both confidentiality and integrity. Microsoft has confirmed that this vulnerability was actively exploited in the wild prior to the release of the patch. ([bleepingcomputer.com](https://www.bleepingcomputer.com/news/microsoft/microsoft-april-2026-patch-tuesday-fixes-167-flaws-2-zero-days/?utm_source=openai))

CVE-2026-33825: Microsoft Defender Elevation of Privilege Vulnerability

This publicly disclosed vulnerability affects Microsoft Defender and allows attackers to elevate privileges to SYSTEM level. The issue has been addressed in the Microsoft Defender Antimalware Platform update version 4.18.26030.3011, which is automatically downloaded to systems. ([bleepingcomputer.com](https://www.bleepingcomputer.com/news/microsoft/microsoft-april-2026-patch-tuesday-fixes-167-flaws-2-zero-days/?utm_source=openai))

Critical Vulnerabilities Highlighted

In addition to the zero-day vulnerabilities, Microsoft has addressed several critical flaws in this update:

Remote Code Execution in Microsoft Office

Multiple remote code execution vulnerabilities in Microsoft Office, including Word and Excel, have been patched. These vulnerabilities could be exploited via the preview pane or by opening malicious documents, emphasizing the importance of updating Microsoft Office promptly. ([bleepingcomputer.com](https://www.bleepingcomputer.com/news/microsoft/microsoft-april-2026-patch-tuesday-fixes-167-flaws-2-zero-days/?utm_source=openai))

Denial of Service in Windows Components

A critical denial of service vulnerability affecting Windows components has been addressed. Exploitation of this flaw could lead to system crashes or service disruptions, highlighting the need for immediate patching. ([blog.qualys.com](https://blog.qualys.com/vulnerabilities-threat-research/2026/04/14/microsoft-and-adobe-patch-tuesday-april-2026-security-update-review?utm_source=openai))

Impact on Windows 11 Users

Windows 11 users are particularly affected by this update, as several vulnerabilities pertain to this operating system. The update includes cumulative updates for supported Windows versions:

  • Windows 11 version 25H2: Build 26200.8246
  • Windows 11 version 24H2: Build 26100.8246

These updates install automatically on most consumer devices unless Windows Update has been paused. ([notebookcheck.net](https://www.notebookcheck.net/Microsoft-April-2026-Patch-Tuesday-fixes-167-vulnerabilities-and-two-zero-days.1274388.0.html?utm_source=openai))

Recommendations for Users and Administrators

Given the severity and number of vulnerabilities addressed in this update, it is crucial for users and administrators to take the following actions:

  • Apply Updates Promptly: Ensure that all systems are updated with the latest patches to mitigate potential threats.
  • Verify Update Installation: Confirm that updates have been successfully installed to maintain system security.
  • Monitor for Unusual Activity: Stay vigilant for any signs of exploitation or unusual system behavior.

Conclusion

Microsoft's April 2026 Patch Tuesday release is a significant step in addressing a wide range of security vulnerabilities, including two critical zero-day exploits. By promptly applying these updates, users and administrators can enhance the security of their systems and protect against potential threats.

Key Takeaways

  • 167 Vulnerabilities Addressed: Microsoft's April 2026 Patch Tuesday update fixes a substantial number of security flaws across various categories.
  • Two Zero-Day Vulnerabilities: The update includes patches for two critical zero-day vulnerabilities, one of which was actively exploited in the wild.
  • Critical Flaws in Microsoft Office: Multiple remote code execution vulnerabilities in Microsoft Office have been addressed, emphasizing the need for prompt updates.

Future Outlook

As cyber threats continue to evolve, it is imperative for organizations to stay proactive in their security measures. Regularly applying security updates, monitoring for unusual activity, and educating users about potential threats are essential steps in maintaining a secure environment.

Call to Action

Ensuring the security of your systems requires expertise and vigilance. Consider partnering with professionals to enhance your organization's security posture. Visit saturne-ia.com to learn more about how our experts can assist you in safeguarding your systems against emerging threats.

Mariama
Business Partner
What if we talked about your project?

Book a 30-minute conversation to understand how Saturne IA provides technical teams tailored to your growth challenges.

Tell us about your project
Powered by Saturne ia