Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

New Chaos Variant Targets Misconfigured Cloud Deployments, Adds SOCKS Proxy

April 18, 2026

Why that next data breach alert could be a trap

April 18, 2026

Masjesu Botnet Emerges as DDoS-for-Hire Service Targeting Global IoT Devices

April 17, 2026
Facebook X (Twitter) Instagram
Saturday, April 18
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»Microsoft Fixes Two Zero-Days in April Patch Tuesday
News

Microsoft Fixes Two Zero-Days in April Patch Tuesday

Team-CWDBy Team-CWDApril 17, 2026No Comments2 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


Microsoft published a higher-than-usual list of fixes for CVEs as part of its monthly Patch Tuesday update round yesterday, including two zero-day vulnerabilities.

One of these, CVE-2026-32201, is being actively exploited in the wild.

It is described as a server spoofing vulnerability in SharePoint whereby improper input validation allows an unauthorized attacker to perform spoofing over a network.

“By exploiting this flaw, an attacker can manipulate how information is presented to users, potentially tricking them into trusting malicious content. While the direct impact on data is limited, the ability to deceive users makes this a powerful tool for broader attacks,” explained Action1 president, Mike Walters.

“It can be used to deceive employees, partners, or customers by presenting falsified information within trusted SharePoint environments. This CVE can enable phishing attacks, unauthorized data manipulation, or social engineering campaigns that lead to further compromise.”

Read more on Patch Tuesday: Microsoft Fixes Two Publicly Disclosed Zero-Days.

The second zero-day has been publicly disclosed but not exploited at this time.

CVE-2026-33825 is an elevation of privilege (EoP) vulnerability in Microsoft Defender that could enable a threat actor to gain system-level access.

Jack Bicer, director of vulnerability research at Action1, warned that the CVE could be chained with others in real-world attacks.

“CVE-2026-33825 significantly increases risk in environments where attackers have already gained a foothold,” he added.

“Once exploited, it allows full control over endpoints, enabling data exfiltration, disabling security tools, and lateral movement across networks. Even environments with strong perimeter defenses are at risk if internal systems are compromised.”

EoP Bugs Dominate April

In fact, EoP vulnerabilities are by far the largest category of CVEs this month, amounting to 93 flaws. Information disclosure (21), remote code execution (20) and security feature bypass (13) comprise the next-largest categories by volume.

Walters urged sysadmins to also look at CVE-2026-33824. With a CVSS score of 9.8, the remote code execution flaw is the most dangerous on paper this month and impacts the Windows Internet Key Exchange (IKE) service.

Threat actors could exploit the vulnerability remotely by sending specially crafted network packets, with internet-facing IKEv2 systems particularly at risk, he said.

“This issue poses a serious threat to enterprise environments, especially those relying on VPN or IPsec for secure communications,” Walters continued. “Successful exploitation can result in complete system compromise, allowing attackers to steal sensitive data, disrupt operations, or move laterally across the network.”



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleAnthropic's Claude Mythos Finds Thousands of Zero-Day Flaws Across Major Systems
Next Article Shrinking the IAM Attack Surface through Identity Visibility and Intelligence Platforms (IVIP)
Team-CWD
  • Website

Related Posts

News

New Chaos Variant Targets Misconfigured Cloud Deployments, Adds SOCKS Proxy

April 18, 2026
News

Masjesu Botnet Emerges as DDoS-for-Hire Service Targeting Global IoT Devices

April 17, 2026
News

DDoS-For-Hire Services Disrupted by International Police Action

April 17, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

Why SOC Burnout Can Be Avoided: Practical Steps

November 14, 20259 Views

Cyber M&A Roundup: Cyber Giants Strengthen AI Security Offerings

December 1, 20258 Views

Why the Identity Security Fabric is Essential for Securing AI and Non-Human Identities

November 27, 20258 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

Why SOC Burnout Can Be Avoided: Practical Steps

November 14, 20259 Views
Our Picks

Why that next data breach alert could be a trap

April 18, 2026

What parents should know to protect their children from doxxing

November 28, 2025

When ‘hacking’ your game becomes a security risk

October 17, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.