Skip to content Skip to sidebar Skip to footer

April 2026 Patch Tuesday: Critical Updates, Active Exploitation and What Organisations Must Do Now

Executive Summary – Key Highlights

Microsoft’s April 2026 Patch Tuesday is one of the largest and most urgent security update cycles on record, addressing 163–167 vulnerabilities across Windows, Microsoft 365, Office, SharePoint, Defender, Azure components, and core infrastructure services. [bleepingcomputer.com], [securitybo…levard.com], [crowdstrike.com]

Key takeaways for organisations:

  • Two zero-day vulnerabilities fixed, one actively exploited in the wild
  • Eight Critical vulnerabilities, most enabling remote code execution
  • SharePoint Server is a top priority due to confirmed exploitation
  • Elevation of Privilege vulnerabilities dominate this release
  • Immediate patching is strongly recommended for internet-facing and regulated environments

This month’s release reinforces the importance of tight patch management, vulnerability prioritisation, and rapid remediation, particularly for organisations handling sensitive data.

Overview: Why April 2026 Matters

April 2026 represents the second-largest Patch Tuesday release in Microsoft’s history, with attackers already exploiting weaknesses before patches were available. [krebsonsecurity.com], [tenable.com]

In total, Microsoft resolved vulnerabilities across:

  • Windows desktop and server
  • Microsoft Office (Word, Excel, PowerPoint)
  • Microsoft SharePoint Server
  • Microsoft Defender
  • Active Directory, Remote Desktop, BitLocker, and TCP/IP
  • Azure services and management tooling

Many of these flaws impact core identity, collaboration, and remote access services, significantly increasing risk if not addressed promptly.

Zero-Day Vulnerabilities – Immediate Attention Required

CVE-2026-32201 – SharePoint Server Spoofing (Actively Exploited)

  • Status: Actively exploited in the wild
  • Impact: Spoofing attacks allowing malicious content to appear trusted
  • Risk: Enables phishing, social engineering, and data manipulation
  • Action: Patch immediately, especially for exposed or business-critical SharePoint environments

This vulnerability allows attackers to exploit improper input validation within SharePoint, potentially deceiving users into trusting falsified content hosted inside a legitimate platform. [bleepingcomputer.com], [infosecuri…gazine.com], [crowdstrike.com]

CVE-2026-33825 – Microsoft Defender Elevation of Privilege

  • Status: Publicly disclosed prior to patching
  • Impact: Local attackers can gain SYSTEM-level privileges
  • Risk: Can be chained with other vulnerabilities post-initial compromise
  • Action: Ensure Defender platform updates are applied across endpoints

Microsoft confirms the Defender fix is delivered automatically via security intelligence updates, but verification is critical in managed estates. [bleepingcomputer.com], [infosecuri…gazine.com]

Vulnerability Breakdown at a Glance

April’s updates are heavily skewed towards privilege escalation and system-level compromise:

  • Elevation of Privilege: 93 vulnerabilities
  • Remote Code Execution: 20 vulnerabilities (7 Critical)
  • Information Disclosure: 20 vulnerabilities
  • Security Feature Bypass: 12–13 vulnerabilities
  • Denial of Service & Spoofing: Remaining issues

Windows components account for approximately 80% of all fixes, underlining the need for comprehensive endpoint and server patching strategies. [bleepingcomputer.com], [blog.qualys.com], [crowdstrike.com]

Windows, Office and Infrastructure Impact

Windows & Server Platforms

Microsoft patched vulnerabilities across:

  • Active Directory
  • Remote Desktop Client
  • Windows TCP/IP & IKE (IPsec/VPN)
  • BitLocker, LSASS, Kernel, and WinSock

Several of these components are network-facing or identity-critical, which significantly raises exploitation impact if left unpatched. [cybersafenv.org], [infosecuri…gazine.com]

Microsoft Office & Collaboration Services

Office applications remain a consistent attack vector:

  • Multiple Remote Code Execution vulnerabilities in Word, Excel and PowerPoint
  • Additional critical focus on SharePoint Server, especially for on‑premises deployments

Organisations using Microsoft 365 hybrid or on‑prem collaboration services should ensure both server and endpoint updates are fully applied.

Adobe Updates (Also Included This Month)

Alongside Microsoft, Adobe released security updates for 56 vulnerabilities, 38 rated as Critical, affecting:

  • Adobe Acrobat Reader
  • Photoshop, Illustrator, InDesign
  • ColdFusion and Adobe Connect

Active exploitation has been reported for at least one Acrobat Reader vulnerability, making Adobe patching a parallel priority this month. [blog.qualys.com], [zerodayini…iative.com]

 

Secure Chain Guidance: What Should You Do Now?

We recommend organisations take the following risk-based approach:

  1. Patch SharePoint Server immediately, prioritising exposed systems
  2. Deploy April cumulative updates to all supported Windows endpoints and servers
  3. Verify Defender platform versions are fully up to date
  4. Accelerate patching for Remote Desktop, AD, VPN, and identity services
  5. Confirm Office and Adobe updates across user devices
  6. Validate remediation via vulnerability scanning and reporting tools

For regulated sectors (legal, finance, healthcare), delays in addressing known exploited vulnerabilities may create compliance and audit risk.

Leave a comment