Vulnerabilities & CVEs

Microsoft April 2026 Patch Tuesday: 167 Flaws, 2 Zero-Days

Another Patch Tuesday, another avalanche of holes in Windows. Microsoft's April 2026 drop fixes 167 flaws—including two zero-days—but who's surprised? Same old story.

Microsoft Patch Tuesday April 2026 security update bulletin with vulnerability counts

Key Takeaways

  • 167 vulnerabilities patched, including 8 Criticals and 2 zero-days (SharePoint exploited spoofing, Defender privilege escalation).
  • Office RCE bugs demand immediate updates for preview-pane and document risks.
  • Echoes past disasters like EternalBlue; expect underground exploits soon.

I’m staring at my coffee-stained security bulletin printout, the one from Microsoft dated April 2026, wondering if we’ll ever stop playing whack-a-mole with these Patch Tuesday headaches.

Look, 167 vulnerabilities patched in one go. That’s the headline number for Microsoft’s April 2026 security update blitz. Eight marked “Critical,” mostly remote code execution nightmares that could let some script kiddie turn your server into their playground. But here’s the kicker—two zero-days slipped through the cracks until now, one actively exploited, the other just outed publicly. SharePoint spoofing and a Defender privilege escalation to SYSTEM level. Fun times.

Why Is Microsoft Still Shipping Zero-Days in 2026?

And. This isn’t new. Remember the bad old days of EternalBlue in 2017? That Shadow Brokers dump lit the ransomware world on fire, and Microsoft was scrambling just like today. Fast-forward nearly a decade, and we’re still here: zero-days in core products like SharePoint, where attackers spoof their way to sensitive data tweaks. Microsoft’s own words nail it:

“Improper input validation in Microsoft Office SharePoint allows an unauthorized attacker to perform spoofing over a network,” explains Microsoft. “An attacker who successfully exploited the vulnerability could view some sensitive information (Confidentiality), make changes to disclosed information (Integrity), but cannot limit access to the resource (Availability).”

They won’t say who exploited it or how—classic stonewalling. My unique take? This reeks of the same complacency that birthed WannaCry. Back then, unpatched systems got wrecked; today, it’s SharePoint servers in enterprises too cheap or lazy to patch monthly. Bold prediction: we’ll see exploit kits for these Office RCEs on underground forums by summer, preying on preview-pane clickers.

Elevation of privilege bugs dominate—93 of ‘em. Then 20 remote code executions, 21 info leaks. It’s a buffet for bad actors. Office gets hit hard too: Word and Excel flaws triggerable via preview or malicious docs. If you’re forwarding attachments without a care, you’re the problem.

One paragraph wonder: Prioritize Office updates. Now.

But wait—Microsoft Defender’s zero-day? That’s the publicly disclosed one, bumped to SYSTEM privileges. Credited to Zen Dodd and Yuanpei XU from HUST with Diffract. Patch rolls out automatically via version 4.18.26050.3011, or hunt it in Windows Security settings. Good on them for crediting researchers, but why does antivirus need fixing for privilege escalation? Isn’t that the whole point?

Who Actually Profits from All These Patches?

Here’s the thing. Who’s making bank here? Not you, the harried sysadmin rebooting servers at 3 a.m. Microsoft? Sure, they sell the fixes as a subscription perk via whatever Windows Enterprise tier you’re on. But dig deeper—third-party patch managers like Ivanti or Automox rake in fees automating this mess. And don’t get me started on the exploit brokers: zero-days fetch six figures before patches drop. Remember Apache’s 13-year-old ActiveMQ RCE this month? Undetected that long? Embarrassing.

The broader April patch parade’s a circus. Adobe squashes an exploited Reader zero-day across Acrobat, Photoshop, the works. Cisco’s IMC auth bypass hands admin keys to attackers. Fortinet’s EMS critical vuln? Actively exploited. Google’s Chrome zero-day, Android bulletin, even a new GPUBreach rowhammer for privilege escalation. Apple props up old iOS 18 phones against DarkSword. It’s endless.

So, yeah, Patch Tuesday feels routine. But skepticism demands we ask: with AI hype everywhere, why hasn’t Microsoft baked in real auto-hardening? Their PR spins “proactive security,” yet zero-days persist. Cynical me says it’s by design—perpetual vulnerability equals perpetual revenue.

Breakdown time. Criticals: seven RCEs, one DoS. ElevPrivs everywhere because Windows loves layering privileges like a bad lasagna. Security feature bypasses (13) mean sandbox evasions galore. Spoofing (9) for phishing pros. Info disclosures (21) leaking your crown jewels.

No Mariner, Azure, or Bing fixes here—those dropped earlier. Edge’s 80 Chromium bugs? Google’s tab. Focus on the meat: apply these pronto, especially if you’re on SharePoint or Office-heavy workflows.

Does This Patch Tuesday Change Anything for Enterprises?

Nah. Not really. Enterprises still delay patches fearing breakage—remember CrowdStrike’s 2024 outage? That ghost haunts IT closets. But skipping? Invite breaches. My insight: this cycle mirrors 2014’s SSL heartbeat bug; mass exploitation followed slow patches. History doesn’t repeat, but it rhymes, as they say.

Patch notes tease .NET DoS (CVE-2026-26171, Important), .NET spoof (CVE-2026-32178), and a Critical .NET Framework DoS (CVE-2026-23666). Full list runs long—check Microsoft’s bulletin for the nitty-gritty.

Wander a bit: I once covered a firm that ignored Patch Tuesday for ‘stability.’ Six months later, ransomware via an unpatched Exchange flaw. Bankrupt. Lesson? Patch or perish.

Final nudge. Update. Test in staging. Roll out. Repeat monthly. It’s 2026—act like it.


🧬 Related Insights

Frequently Asked Questions

What is Microsoft’s April 2026 Patch Tuesday?

It’s the monthly security update batch fixing 167 vulnerabilities, including two zero-days in SharePoint and Defender.

Are the zero-days in April 2026 Patch Tuesday exploited?

Yes—one SharePoint spoofing flaw was actively exploited; the other Defender bug was publicly known.

Should I update Microsoft Office right now?

Absolutely—multiple RCE flaws hit Word and Excel via previews or docs; prioritize if you handle attachments.

Maya Thompson
Written by

Threat intelligence reporter. Tracks CVEs, ransomware groups, and major breach investigations.

Frequently asked questions

What is Microsoft's April 2026 Patch Tuesday?
It's the monthly security update batch fixing 167 vulnerabilities, including two zero-days in SharePoint and Defender.
Are the zero-days in April 2026 Patch Tuesday exploited?
Yes—one SharePoint spoofing flaw was actively exploited; the other Defender bug was publicly known.
Should I update Microsoft Office right now?
Absolutely—multiple RCE flaws hit Word and Excel via previews or docs; prioritize if you handle attachments.

Worth sharing?

Get the best Cybersecurity stories of the week in your inbox — no noise, no spam.

Originally reported by Bleeping Computer

Stay in the loop

The week's most important stories from Threat Digest, delivered once a week.