CTI Swarm
Zurück zu allen Deep Dives
RAPID7 CYBERSECURITY BLOG

Patch Tuesday - April 2026

Strategische Zusammenfassung

April 2026 patch cycle includes zero-day fixes for SharePoint spoofing, Defender elevation-of-privilege, and Windows IKE pre-auth RCE—all directly relevant to manufacturing operations relying on AD, Remote Desktop Gateway, and Defender for Endpoint.

Volltext

Title: Patch Tuesday - April 2026

URL Source: https://www.rapid7.com/blog/post/em-patch-tuesday-april-2026

Published Time: 2026-04-14T21:23:12.960Z

Markdown Content: # Patch Tuesday - April 2026

Rapid7’s 2026 Global Cybersecurity Summit returns May 12-13

* Platform * Services * Resources * Partners * Company

[Request Demo](https://www.rapid7.com/request-demo/)

[Back to Blog](https://www.rapid7.com/blog/)

Exposure Management # Patch Tuesday - April 2026

[ Adam Barnett](https://www.rapid7.com/blog/author/adam-barnett/)

Apr 14, 2026|Last updated on Apr 14, 2026|27 min read

## Table of contents

* Increasing volumes of vulnerabilities * SharePoint: zero-day spoofing * Defender: zero-day elevation of privilege * Windows [I don’t like] IKE: zero-day pre-auth RCE * Microsoft lifecycle update * Summary charts * Summary tables * Azure vulnerabilities * Developer Tools vulnerabilities * ESU vulnerabilities * Microsoft Dynamics vulnerabilities * Microsoft Office vulnerabilities * Open Source Software vulnerabilities * SQL Server vulnerabilities * System Center vulnerabilities * Windows vulnerabilities * Zero-Day Vulnerabilities: Known Exploited * Zero-Day Vulnerabilities: Publicly Disclosed (No known exploitation) * Critical RCEs and EoPs

Microsoft is publishing 167 vulnerabilities on [April 2026 Patch Tuesday](https://msrc.microsoft.com/update-guide/releaseNote/2026-Apr). Microsoft is aware of exploitation in the wild for one of today’s vulnerabilities, and public disclosure for one other. Microsoft evaluates 19 of the vulnerabilities published today as more likely to see future exploitation. So far this month, Microsoft has provided patches to address 80 browser vulnerabilities, which are not included in the Patch Tuesday count above.

### Increasing volumes of vulnerabilities

Regular Patch Tuesday watchers will know that these vulnerability totals are significantly higher than usual, especially the browser numbers. Late last week, Microsoft published patches to resolve more than 60 browser vulnerabilities in a single day, which is a new record in that very specific category.

It might be tempting to imagine that this sudden spike was tied to the buzz around the announcement a week ago today of [Project Glasswing](https://www.rapid7.com/blog/post/ai-what-project-glasswing-means-for-security-leaders/), but this is not the case.

[… 72,163 Zeichen — nächste Zone: keyword-dense paragraphs …]

| CVE | Title | Exploitation status | Publicly disclosed? | CVSS v3 base score | | --- | --- | --- | --- | --- | | [CVE-2026-32072](https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-32072) | Active Directory Spoofing Vulnerability | Exploitation Less Likely | No | 6.2 | | [CVE-2023-20585](https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2023-20585) | AMD: CVE-2023-20585 IOMMU Write Buffer Vulnerability | Exploitation Less Likely | No | 5.3 | | [CVE-2026-25184](https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-25184) | Applocker Filter Driver (applockerfltr.sys) Elevation of Privilege Vulnerability | Exploitation Less Likely | No | 7.0 | | [CVE-2026-32181](https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-32181) | Connected User Experiences and Telemetry Service Denial of Service Vulnerability | Exploitation Less Likely | No | 5.5 | | [CVE-2026-27924](https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-27924) | Desktop Window Manager Elevation of Privilege Vulnerability | Exploitation Less Likely | No | 7.8 | | [CVE-2026-32152](https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-32152) | Desktop Window Manager Elevation of Privilege Vulnerability | Exploitation More Likely | No | 7.8 | | [CVE-2026-32154](https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-32154) | Desktop Window Manager Elevation of Privilege Vulnerability | Exploitation More Likely | No | 7.8 | | [CVE-2026-27923](https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-27923) | Desktop Window Manager Elevation of Privilege Vulnerability | Exploitation Less Likely | No | 7.8 | | [CVE-2026-32155](https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-32155) | Desktop Window Manager Elevation of Privilege Vulnerability | Exploitation Less Likely | No | 7.8 | | [CVE-2026-33096](https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-33096) | HTTP.sys Denial of Service Vulnerability | Exploitation Less Likely | No | 7.5 | | [CVE-2026-26181](https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-26181) | Microsoft Brokering File System Elevation of Privilege Vulnerability | Exploitation Less Likely | No | 7.8 | | [CVE-2026-32219](https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-32219) | Microsoft Brokering File System Elevation of Privilege Vulnerability | […]

| CV […]

[… 71,395 Zeichen — nächste Zone: tail …]

Cookies Details

#### Targeting Cookies

- [x] Targeting Cookies

These cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising.

Cookies Details

#### Performance Cookies

- [x] Performance Cookies

These cookies allow us to count visits and traffic sources so we can measure and improve the performance of our site. They help us to know which pages are the most and least popular and see how visitors move around the site. All information these cookies collect is aggregated and therefore anonymous. If you do not allow these cookies we will not know when you have visited our site, and will not be able to monitor its performance.

Cookies Details

#### Functional Cookies

- [x] Functional Cookies

These cookies enable the website to provide enhanced functionality and personalisation. They may be set by us or by third party providers whose services we have added to our pages. If you do not allow these cookies then some or all of these services may not function properly.

Cookies Details

### Cookie List

Clear

* - [x] checkbox label label

Apply Cancel

Consent Leg.Interest

- [x] checkbox label label

- [x] checkbox label label

- [x] checkbox label label

Reject All Confirm My Choices