Microsoft Patch Tuesday April 2026 Fixes 168 Vulnerability, Includes Exploited Zero-Day
Microsoft released its April 2026 Patch Tuesday security update on April 14, addressing 168 vulnerabilities, including one actively exploited zero-day flaw.
The update spans critical components, including Windows TCP/IP, Active Directory, Microsoft Office Word, .NET Framework, Hyper-V, and the Windows Kernel, making it one of the most substantial patch releases of the year.
The most urgent fix in this month’s update targets CVE-2026-32070, a Windows Common Log File System (CLFS) Driver Elevation of Privilege vulnerability rated Important by Microsoft.
This flaw has been confirmed as actively exploited in the wild, consistent with a recurring pattern of threat actors leveraging CLFS driver weaknesses to achieve SYSTEM-level privileges on compromised endpoints.
Organizations running unpatched Windows environments should treat this as the highest priority remediation this cycle, as EoP vulnerabilities of this type are commonly chained with initial access exploits in targeted ransomware and APT campaigns.
Critical Remote Code Execution Flaws
Three Critical-rated Remote Code Execution (RCE) vulnerabilities demand immediate attention from enterprise defenders:
- CVE-2026-33827 — Windows TCP/IP Remote Code Execution Vulnerability (Critical): An unauthenticated attacker could exploit this flaw over a network to execute arbitrary code, making it one of the highest-severity entries in this month’s update.
- CVE-2026-33826 — Windows Active Directory Remote Code Execution Vulnerability (Critical): Domain controller environments face particular exposure, as successful exploitation could allow adversaries to execute code within Active Directory infrastructure.
- CVE-2026-33824 — Windows Internet Key Exchange (IKE) Service Extensions RCE (Critical): This vulnerability targets VPN- and IPsec-enabled systems, posing a risk to organizations that rely on Windows IKE for encrypted tunneling.
Additionally, Microsoft patched two separate Critical Microsoft Word RCE vulnerabilities, CVE-2026-33115 and CVE-2026-33114, along with a third Important-rated Word CVE-2026-23657 — 7, highlighting persistent targeting of Office document processing by threat actors.
The April update also resolves several high-impact flaws affecting core Windows components. CVE-2026-23666, a Critical Denial-of-Service vulnerability in the .NET Framework, poses a risk to enterprise application stacks that rely on the framework.
CVE-2026-26156, a Windows Hyper-V RCE rated Important, could allow attackers to escape from virtualized environments in cloud and on-premises deployments.
Several Elevation of Privilege vulnerabilities patched this cycle affect the Windows Kernel (CVE-2026-26180, CVE-2026-26179), Windows Kerberos (CVE-2026-27912), Microsoft Defender (CVE-2026-33825), and PowerShell (CVE-2026-26170).
Security Feature Bypass vulnerabilities were also addressed in Windows BitLocker (CVE-2026-27913), Windows Hello (CVE-2026-27928), Secure Boot (CVE-2026-25250), and Windows Boot Manager (CVE-2026-26175).
On the information disclosure front, CVE-2026-32631, a Git for Windows vulnerability, allows git clone operations from manipulated repositories to leak NTLM credential hashes, posing a risk of exposing credentials in environments.
| CVE ID | Vulnerability Title | Affected Component |
|---|---|---|
| CVE-2026-33829 | Windows Snipping Tool Spoofing Vulnerability | Windows Snipping Tool |
| CVE-2026-33827 | Windows TCP/IP Remote Code Execution Vulnerability | Windows TCP/IP |
| CVE-2026-33826 | Windows Active Directory Remote Code Execution Vulnerability | Windows Active Directory |
| CVE-2026-33825 | Microsoft Defender Elevation of Privilege Vulnerability | Microsoft Defender |
| CVE-2026-33824 | Windows IKE Service Extensions Remote Code Execution Vulnerability | Windows IKE Extension |
| CVE-2026-33822 | Microsoft Word Information Disclosure Vulnerability | Microsoft Office Word |
| CVE-2026-33120 | Microsoft SQL Server Remote Code Execution Vulnerability | SQL Server |
| CVE-2026-33116 | .NET, .NET Framework, and Visual Studio Denial of Service Vulnerability | .NET / .NET Framework / Visual Studio |
| CVE-2026-33115 | Microsoft Word Remote Code Execution Vulnerability | Microsoft Office Word |
| CVE-2026-33114 | Microsoft Word Remote Code Execution Vulnerability | Microsoft Office Word |
| CVE-2026-32072 | Active Directory Spoofing Vulnerability | Windows Active Directory |
| CVE-2026-32071 | Windows LSASS Denial of Service Vulnerability | Windows LSASS |
| CVE-2026-32070 | Windows Common Log File System Driver Elevation of Privilege Vulnerability ⚠️ Exploited | Windows CLFS Driver |
| CVE-2026-32069 | Windows Projected File System Elevation of Privilege Vulnerability | Windows Projected File System |
| CVE-2026-32068 | Windows SSDP Service Elevation of Privilege Vulnerability | Windows SSDP Service |
| CVE-2026-27931 | Windows GDI Information Disclosure Vulnerability | Windows GDI |
| CVE-2026-27930 | Windows GDI Information Disclosure Vulnerability | Windows GDI |
| CVE-2026-27929 | Windows LUA File Virtualization Filter Driver Elevation of Privilege Vulnerability | Windows LUAFV |
| CVE-2026-27928 | Windows Hello Security Feature Bypass Vulnerability | Windows Hello |
| CVE-2026-27927 | Windows Projected File System Elevation of Privilege Vulnerability | Windows Projected File System |
| CVE-2026-27926 | Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability | Windows Cloud Files Mini Filter Driver |
| CVE-2026-27925 | Windows UPnP Device Host Information Disclosure Vulnerability | Windows UPnP Device Host |
| CVE-2026-27924 | Desktop Window Manager Elevation of Privilege Vulnerability | Desktop Window Manager |
| CVE-2026-27923 | Desktop Window Manager Elevation of Privilege Vulnerability | Desktop Window Manager |
| CVE-2026-27922 | Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability | Windows AFD for WinSock |
| CVE-2026-27921 | Windows TDI Translation Driver (tdx.sys) Elevation of Privilege Vulnerability | Windows TCP/IP |
| CVE-2026-27920 | Windows UPnP Device Host Elevation of Privilege Vulnerability | Windows UPnP Device Host |
| CVE-2026-27919 | Windows UPnP Device Host Elevation of Privilege Vulnerability | Windows UPnP Device Host |
| CVE-2026-27918 | Windows Shell Elevation of Privilege Vulnerability | Windows Shell |
| CVE-2026-27917 | Windows WFP NDIS Lightweight Filter Driver Elevation of Privilege Vulnerability | Windows WFP NDIS LWF |
| CVE-2026-27916 | Windows UPnP Device Host Elevation of Privilege Vulnerability | Windows UPnP Device Host |
| CVE-2026-27915 | Windows UPnP Device Host Elevation of Privilege Vulnerability | Windows UPnP Device Host |
| CVE-2026-27914 | Microsoft Management Console Elevation of Privilege Vulnerability | Microsoft Management Console |
| CVE-2026-27913 | Windows BitLocker Security Feature Bypass Vulnerability | Windows BitLocker |
| CVE-2026-27912 | Windows Kerberos Elevation of Privilege Vulnerability | Windows Kerberos |
| CVE-2026-27911 | Windows User Interface Core Elevation of Privilege Vulnerability | Windows UI Core |
| CVE-2026-27910 | Windows Installer Elevation of Privilege Vulnerability | Windows Installer |
| CVE-2026-27909 | Windows Search Service Elevation of Privilege Vulnerability | Windows Search Component |
| CVE-2026-27908 | Windows TDI Translation Driver (tdx.sys) Elevation of Privilege Vulnerability | Windows TDI Translation Driver |
| CVE-2026-27907 | Windows Storage Spaces Controller Elevation of Privilege Vulnerability | Windows Storage Spaces Controller |
| CVE-2026-27906 | Windows Hello Security Feature Bypass Vulnerability | Windows Hello |
| CVE-2026-26184 | Windows Projected File System Elevation of Privilege Vulnerability | Windows Projected File System |
| CVE-2026-26183 | Remote Access Management Service/API (RPC Server) Elevation of Privilege Vulnerability | Windows RPC API |
| CVE-2026-26182 | Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability | Windows AFD for WinSock |
| CVE-2026-26181 | Microsoft Brokering File System Elevation of Privilege Vulnerability | Microsoft Brokering File System |
| CVE-2026-26180 | Windows Kernel Elevation of Privilege Vulnerability | Windows Kernel |
| CVE-2026-26179 | Windows Kernel Elevation of Privilege Vulnerability | Windows Kernel |
| CVE-2026-26178 | Windows Advanced Rasterization Platform Elevation of Privilege Vulnerability | Windows WARP |
| CVE-2026-26177 | Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability | Windows AFD for WinSock |
| CVE-2026-26176 | Windows Client Side Caching Driver (csc.sys) Elevation of Privilege Vulnerability | Windows CSC Driver |
| CVE-2026-26175 | Windows Boot Manager Security Feature Bypass Vulnerability | Windows Boot Manager |
| CVE-2026-26174 | Windows Server Update Service (WSUS) Elevation of Privilege Vulnerability | Windows WSUS |
| CVE-2026-26173 | Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability | Windows AFD for WinSock |
| CVE-2026-26172 | Windows Push Notifications Elevation of Privilege Vulnerability | Windows Push Notifications |
| CVE-2026-26171 | .NET Denial of Service Vulnerability | .NET |
| CVE-2026-26170 | PowerShell Elevation of Privilege Vulnerability | Microsoft PowerShell |
| CVE-2026-26169 | Windows Kernel Memory Information Disclosure Vulnerability | Windows Kernel Memory |
| CVE-2026-26168 | Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability | Windows AFD for WinSock |
| CVE-2026-26167 | Windows Push Notifications Elevation of Privilege Vulnerability | Windows Push Notifications |
| CVE-2026-26166 | Windows Shell Elevation of Privilege Vulnerability | Windows Shell |
| CVE-2026-26165 | Windows Shell Elevation of Privilege Vulnerability | Windows Shell |
| CVE-2026-26163 | Windows Kernel Elevation of Privilege Vulnerability | Windows Kernel |
| CVE-2026-26162 | Windows OLE Elevation of Privilege Vulnerability | Windows OLE |
| CVE-2026-26161 | Windows Sensor Data Service Elevation of Privilege Vulnerability | Windows Sensor Data Service |
| CVE-2026-26160 | Remote Desktop Licensing Service Elevation of Privilege Vulnerability | Windows RD Licensing Service |
| CVE-2026-26159 | Remote Desktop Licensing Service Elevation of Privilege Vulnerability | Windows RD Licensing Service |
| CVE-2026-26156 | Windows Hyper-V Remote Code Execution Vulnerability | Windows Hyper-V |
| CVE-2026-26155 | Microsoft LSASS Information Disclosure Vulnerability | Windows LSASS |
| CVE-2026-26154 | Windows Server Update Service (WSUS) Tampering Vulnerability | Windows WSUS |
| CVE-2026-26153 | Windows Encrypted File System (EFS) Elevation of Privilege Vulnerability | Windows EFS |
| CVE-2026-26152 | Microsoft Cryptographic Services Elevation of Privilege Vulnerability | Windows Cryptographic Services |
| CVE-2026-26151 | Remote Desktop Spoofing Vulnerability | Windows Remote Desktop |
| CVE-2026-26149 | Microsoft Power Apps Security Feature Bypass | Microsoft Power Apps |
| CVE-2026-26143 | Microsoft PowerShell Security Feature Bypass Vulnerability | Microsoft PowerShell |
| CVE-2026-25184 | AppLocker Filter Driver (applockerfltr.sys) Elevation of Privilege Vulnerability | AppLocker Filter Driver |
| CVE-2026-23670 | Windows Virtualization-Based Security (VBS) Security Feature Bypass Vulnerability | Windows VBS Enclave |
| CVE-2026-23666 | .NET Framework Denial of Service Vulnerability | .NET Framework |
| CVE-2026-23657 | Microsoft Word Remote Code Execution Vulnerability | Microsoft Office Word |
| CVE-2026-23653 | GitHub Copilot and Visual Studio Code Information Disclosure Vulnerability | GitHub Copilot / VS Code |
| CVE-2026-20945 | Microsoft SharePoint Server Spoofing Vulnerability | Microsoft SharePoint |
| CVE-2026-20930 | Windows Management Services Elevation of Privilege Vulnerability | Windows Management Services |
| CVE-2026-20928 | Windows Recovery Environment Security Feature Bypass Vulnerability | Windows Recovery Environment |
| CVE-2026-20806 | Windows COM Server Information Disclosure Vulnerability | Windows COM |
| CVE-2026-0390 | UEFI Secure Boot Security Feature Bypass Vulnerability | Windows Boot Loader |
Security teams are urged to deploy the April 2026 updates immediately, with top priority given to the actively exploited SharePoint zero-day and all Critical-rated remote code execution (RCE) flaws.
The Microsoft Security Response Center (MSRC) has flagged these vulnerabilities for urgent remediation, warning that unpatched systems remain directly exposed to ongoing threat actor activity.
No Comment! Be the first one.