Microsoft’s April Security Update of High-Risk Vulnerability Notice for Multiple Products

Overview

On April 15, NSFOCUS CERT detected that Microsoft released the April Security Update patch, fixing 165 security issues involving Windows, Microsoft Office, Microsoft SQL Server, Microsoft Visual Studio, Microsoft .NET Framework, Widely used products such as Azure, including high-risk vulnerability types such as privilege escalation and remote code execution.

Among the vulnerabilities fixed by Microsoft’s monthly update this month, there are 8 critical vulnerabilities, 154 important vulnerabilities, 2 moderate vulnerabilities, and 1 low-risk (Low) vulnerability. These include 1 vulnerability that has been detected for wild exploitation:

Microsoft SharePoint Server Spoofing Vulnerability (CVE-2026-32201)

Please update the patch as soon as possible for protection. For a complete list of vulnerabilities, please refer to the appendix.

Reference link: https://msrc.microsoft.com/update-guide/releaseNote/2026-Apr

Key Vulnerabilities

Based on the product popularity and vulnerability importance, this update contains vulnerabilities with greater impact. Relevant users are requested to pay special attention:

Microsoft SharePoint Server Spoofing Vulnerability (CVE-2026-32201):

There is a spoofing vulnerability in Microsoft SharePoint Server. Due to improper input validation of SharePoint Server, unauthenticated attackers can conduct spoofing attacks through the network to view some sensitive information and tamper with publicly available information. The vulnerability is exploited in the wild and has a CVSS score of 9.0.

Official announcement link: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32201

Windows Kerberos Privilege Escalation Vulnerability (CVE-2026-27912):

There is a privilege escalation vulnerability in Windows Kerberos. Due to improper authorization during the verification process of the Kerberos service ticket request, an authenticated attacker can bypass security checks by manipulating the Kerberos ticket field and elevate privileges on adjacent networks, possibly gaining domain administrator privileges. CVSS score 8.0.

Official announcement link: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27912

Remote Desktop Client remote code execution vulnerability (CVE-2026-32157):

A remote code execution vulnerability exists in the Remote Desktop Client. Due to the Use After Free problem when processing RDP connection parameters, an unauthenticated attacker can execute arbitrary code on the client host by tricking users into connecting to a malicious RDP server. CVSS score 8.8.

Official announcement link: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32157

Windows TCP/IP Remote Code Execution Vulnerability (CVE-2026-33827):

A remote code execution vulnerability exists in Windows TCP/IP. Due to improper synchronization mechanism when using shared resources in Windows TCP/IP, an unauthenticated attacker can exploit this vulnerability over the network to execute arbitrary code. CVSS score 8.1.

Official announcement link: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33827

Windows Shell Security Function Bypass Vulnerability (CVE-2026-32225):

There is a security feature bypass vulnerability in Windows Shell. Due to the failure of the protection mechanism in Windows Shell, an unauthenticated attacker can bypass SmartScreen security protection by tricking the victim into opening a specially crafted .lnk file, resulting in unauthorized operation or access. CVSS score 8.8.

Official announcement link: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32225

Windows Internet Key Exchange (IKE) Service Extensions Remote Code Execution Vulnerability (CVE-2026-33824):

A remote code execution vulnerability exists in Windows Internet Key Exchange (IKE) Service Extensions, which allows an unauthenticated attacker to send specially crafted packets to IKEv2 enabled Windows systems due to a Double Free issue in the Windows IKE extension. Thereby enabling remote code execution. CVSS score 9.8.

Official announcement link: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33824

Microsoft Defender Privilege Escalation Vulnerability (CVE-2026-33825):

There is a privilege escalation vulnerability in Microsoft Defender. Due to insufficient access control granularity in Microsoft Defender, an authenticated local attacker can elevate privileges to SYSTEM. CVSS score 7.8.

Official announcement link: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33825

Windows Active Directory Remote Code Execution Vulnerability (CVE-2026-33826):

A remote code execution vulnerability exists in Windows Active Directory. Due to improper input validation in Windows Active Directory, an authenticated attacker can send a specially crafted RPC call to the RPC host through an adjacent network to achieve remote code execution. CVSS score 8.0.

Official announcement link: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33826

Scope of Impact

The following are the affected product versions of some key vulnerabilities. For the scope of products affected by other vulnerabilities, please refer to the official announcement link.

Vulnerability NumberAffected product versions
CVE-2026-32201Microsoft SharePoint Server Subscription Edition
Microsoft SharePoint Enterprise Server 2016
Microsoft SharePoint Server 2019
CVE-2026-27912Windows Server 2012 R2 (Server Core installation)
Windows Server 2012 R2
Windows Server 2012 (Server Core installation) Windows Server 2012
Windows Server 2016 (Server Core installation)
Windows Server 2016
Windows Server 2025
Windows Server 2022, 23H2 Edition (Server Core installation)
Windows Server 2025 (Server Core installation)
Windows Server 2022 (Server Core installation)
Windows Server 2022
Windows Server 2019 (Server Core installation)
Windows Server 2019
CVE-2026-32157Windows Server 2012 R2 (Server Core installation)
Windows Server 2012 R2
Windows Server 2012 (Server Core installation)
Windows Server 2012
Windows Server 2016 (Server Core installation)
Windows Server 2016
Windows 10 Version 1607 for x64-based Systems
Windows 10 Version 1607 for 32-bit Systems
Windows Server 2025
Windows 11 Version 24H2 for x64-based Systems
Windows 11 Version 24H2 for ARM64-based Systems
Windows Server 2022, 23H2 Edition (Server Core installation)
Windows 11 Version 23H2 for x64-based Systems
Windows 11 Version 23H2 for ARM64-based Systems
Windows 11 Version 25H2 for x64-based Systems
Windows 11 Version 25H2 for ARM systems
Windows Server 2025 (Server Core installation)
Windows 10 Version 22H2 for 32-bit Systems
Windows 10 Version 22H2 for ARM64-based Systems
Windows 10 Version 22H2 for x64-based Systems
Windows 10 Version 21H2 for x64-based Systems
Windows 10 Version 21H2 for ARM64-based Systems
Windows 10 Version 21H2 for 32-bit Systems
Windows Server 2022 (Server Core installation)
Windows Server 2022 Remote Desktop client for Windows Desktop
Windows Server 2019 (Server Core installation)
Windows Server 2019
Windows 10 Version 1809 for x64-based Systems
Windows 10 Version 1809 for 32-bit Systems
Windows App Client for Windows Desktop
Windows 11 version 26H1 for x64-based Systems
Windows 11 Version 26H1 for ARM64-based Systems
CVE-2026-33827 CVE-2026-32225Windows 10 Version 22H2 for ARM64-based Systems
Windows 10 Version 22H2 for x64-based Systems
Windows 10 Version 21H2 for x64-based Systems
Windows 10 Version 21H2 for ARM64-based Systems
Windows 10 Version 21H2 for 32-bit Systems
Windows Server 2022 (Server Core installation)
Windows Server 2022
Windows Server 2019 (Server Core installation) Windows Server 2019
Windows 10 Version 1809 for x64-based Systems
Windows 10 Version 1809 for 32-bit Systems
Windows Server 2025 (Server Core installation)
Windows 10 Version 22H2 for 32-bit Systems
Windows Server 2012 R2 (Server Core installation)
Windows Server 2012 R2
Windows Server 2012 (Server Core installation)
Windows Server 2012
Windows Server 2016 (Server Core installation)
Windows Server 2016
Windows 10 Version 1607 for x64-based Systems
Windows 10 Version 1607 for 32-bit Systems
Windows 11 Version 26H1 for ARM64-based Systems
Windows 11 version 26H1 for x64-based Systems
Windows Server 2025
Windows 11 Version 24H2 for x64-based Systems
Windows 11 Version 24H2 for ARM64-based Systems
Windows Server 2022, 23H2 Edition (Server Core installation)
Windows 11 Version 23H2 for x64-based Systems
Windows 11 Version 23H2 for ARM64-based Systems
Windows 11 Version 25H2 for x64-based Systems
Windows 11 Version 25H2 for ARM systems
CVE-2026-33824Windows Server 2016 (Server Core installation)
Windows Server 2016
Windows 10 Version 1607 for x64-based Systems
Windows 10 Version 1607 for 32-bit Systems
Windows 11 Version 26H1 for ARM64-based Systems
Windows 11 version 26H1 for x64-based Systems
Windows Server 2025
Windows 11 Version 24H2 for x64-based Systems
Windows 11 Version 24H2 for ARM64-based Systems
Windows Server 2022, 23H2 Edition (Server Core installation)
Windows 11 Version 23H2 for x64-based Systems
Windows 11 Version 23H2 for ARM64-based Systems
Windows 11 Version 25H2 for x64-based Systems
Windows 11 Version 25H2 for ARM systems
Windows Server 2025 (Server Core installation)
Windows 10 Version 22H2 for 32-bit Systems
Windows 10 Version 22H2 for ARM64-based Systems
Windows 10 Version 22H2 for x64-based Systems
Windows 10 Version 21H2 for x64-based Systems
Windows 10 Version 21H2 for ARM64-based Systems
Windows 10 Version 21H2 for 32-bit Systems
Windows Server 2022 (Server Core installation)
Windows Server 2022
Windows Server 2019 (Server Core installation) Windows Server 2019
Windows 10 Version 1809 for x64-based Systems
Windows 10 Version 1809 for 32-bit Systems
CVE-2026-33825Microsoft Defender Antimalware Platform
CVE-2026-33826Windows Server 2012 R2 (Server Core installation)
Windows Server 2012 R2
Windows Server 2016 (Server Core installation)
Windows Server 2016
Windows Server 2025
Windows Server 2022, 23H2 Edition (Server Core installation)
Windows Server 2025 (Server Core installation)
Windows Server 2022 (Server Core installation)
Windows Server 2022
Windows Server 2019 (Server Core installation)
Windows Server 2019

Mitigation

At present, Microsoft has officially released security patches to fix the above vulnerabilities for supported product versions. It is strongly recommended that affected users install patches as soon as possible for protection. The official download link: https://msrc.microsoft.com/update-guide/releaseNote/2026-Apr

Note: Patch updates for Windows Update may fail due to network problems, computer environment problems, etc. After installing the patch, users should check whether the patch has been successfully updated in time.

Right-click the Windows icon, select “Settings (N)”, select “Update and Security”-“Windows Update”, view the prompt information on this page, or click “View Update History” to view the historical update status.

For updates that have not been successfully installed, you can click the update name to jump to the Microsoft official download page. It is recommended that users click the link on this page and go to the “Microsoft Update Catalog” website to download the independent program package and install it.

Appendix: Vulnerability List

Affected productsCVE No.Vulnerability TitleSeverity
WindowsCVE-2026-32157Remote Desktop Client remote code execution vulnerabilityCritical
WindowsCVE-2026-33826Windows Active Directory Remote Code Execution VulnerabilityCritical
Microsoft .NET FrameworkCVE-2026-23666.NET Framework Denial of Service VulnerabilityCritical
Microsoft OfficeCVE-2026-32190Microsoft Office Remote Code Execution VulnerabilityCritical
Microsoft OfficeCVE-2026-33114Microsoft Word remote code execution vulnerabilityCritical
Microsoft OfficeCVE-2026-33115Microsoft Word remote code execution vulnerabilityCritical
WindowsCVE-2026-33827Windows TCP/IP Remote Code Execution VulnerabilityCritical
WindowsCVE-2026-33824Windows Internet Key Exchange (IKE) Service Extensions Remote Code Execution VulnerabilityCritical
WindowsCVE-2026-20930Windows Management Services Privilege Escalation VulnerabilityImportant
Microsoft Visual Studio Code CoPilot Chat ExtensionCVE-2026-23653GitHub Copilot and Visual Studio Code Information Disclosure VulnerabilityImportant
WindowsCVE-2026-25184Applocker Filter Driver (applockerfltr.sys) Privilege Escalation VulnerabilityImportant
Microsoft OfficeCVE-2026-20945Microsoft SharePoint Server Spoofing VulnerabilityImportant
WindowsCVE-2026-23670Windows Virtualization-Based Security (VBS) security feature bypass vulnerabilityImportant
Microsoft DynamicsCVE-2026-26149Microsoft Power Apps Security Feature BypassImportant
WindowsCVE-2026-26151Remote Desktop spoofing vulnerabilityImportant
WindowsCVE-2026-26154Windows Server Update Service (WSUS) Tampering VulnerabilityImportant
WindowsCVE-2026-26155Microsoft Local Security Authority Subsystem Service information disclosure vulnerabilityImportant
WindowsCVE-2026-26160Remote Desktop Licensing Service privilege escalation vulnerabilityImportant
WindowsCVE-2026-26161Windows Sensor Data Service privilege escalation vulnerabilityImportant
WindowsCVE-2026-26162Windows OLE privilege escalation vulnerabilityImportant
WindowsCVE-2026-26165Windows Shell Privilege Escalation VulnerabilityImportant
WindowsCVE-2026-26166Windows Shell Privilege Escalation VulnerabilityImportant
WindowsCVE-2026-26167Windows Push Notifications privilege escalation vulnerabilityImportant
WindowsCVE-2026-26174Windows Server Update Service (WSUS) Privilege Escalation VulnerabilityImportant
WindowsCVE-2026-26175Windows Boot Manager security feature bypass vulnerabilityImportant
WindowsCVE-2026-26179Windows Kernel privilege escalation vulnerabilityImportant
WindowsCVE-2026-26180Windows Kernel privilege escalation vulnerabilityImportant
WindowsCVE-2026-26181Microsoft Brokering File System Privilege Escalation VulnerabilityImportant
WindowsCVE-2026-26183Remote Access Management service/API (RPC server) privilege escalation vulnerabilityImportant
WindowsCVE-2026-27906Windows Hello security feature bypass vulnerabilityImportant
WindowsCVE-2026-27907Windows Storage Spaces Controller privilege escalation vulnerabilityImportant
WindowsCVE-2026-27908Windows TDI Translation Driver (tdx.sys) Privilege Escalation VulnerabilityImportant
WindowsCVE-2026-27915Windows UPnP Device Host privilege escalation vulnerabilityImportant
WindowsCVE-2026-27917Windows WFP NDIS Lightweight Filter Driver (wfplwfs.sys) Privilege Escalation VulnerabilityImportant
WindowsCVE-2026-27918Windows Shell Privilege Escalation VulnerabilityImportant
WindowsCVE-2026-27919Windows UPnP Device Host privilege escalation vulnerabilityImportant
WindowsCVE-2026-27921Windows TDI Translation Driver (tdx.sys) Privilege Escalation VulnerabilityImportant
WindowsCVE-2026-27924Desktop Window Manager Privilege Escalation VulnerabilityImportant
WindowsCVE-2026-27926Windows Cloud Files Mini Filter Driver privilege escalation vulnerabilityImportant
WindowsCVE-2026-27927Windows Projected File System Privilege Escalation VulnerabilityImportant
WindowsCVE-2026-27929Windows LUA File Virtualization Filter Driver Escalation VulnerabilityImportant
WindowsCVE-2026-27931Windows GDI Information Disclosure VulnerabilityImportant
WindowsCVE-2026-32071Windows Local Security Authority Subsystem Service (LSASS) Denial of Service VulnerabilityImportant
WindowsCVE-2026-32073Windows Ancillary Function Driver for WinSock Privilege Escalation VulnerabilityImportant
WindowsCVE-2026-32075Windows UPnP Device Host privilege escalation vulnerabilityImportant
WindowsCVE-2026-32081Package Catalog information leakage vulnerabilityImportant
WindowsCVE-2026-32082Windows Simple Search and Discovery Protocol (SSDP) Service privilege escalation vulnerabilityImportant
WindowsCVE-2026-32083Windows Simple Search and Discovery Protocol (SSDP) Service privilege escalation vulnerabilityImportant
WindowsCVE-2026-32085Remote Procedure Call information leakage vulnerabilityImportant
WindowsCVE-2026-32087Windows Function Discovery Service (fdwsd.dll) Privilege Escalation VulnerabilityImportant
WindowsCVE-2026-32089Windows Speech Brokered Api Privilege Escalation VulnerabilityImportant
WindowsCVE-2026-32090Windows Speech Brokered Api Privilege Escalation VulnerabilityImportant
WindowsCVE-2026-32093Windows Function Discovery Service (fdwsd.dll) Privilege Escalation VulnerabilityImportant
WindowsCVE-2026-32152Desktop Window Manager Privilege Escalation VulnerabilityImportant
WindowsCVE-2026-32154Desktop Window Manager Privilege Escalation VulnerabilityImportant
WindowsCVE-2026-32156Windows UPnP Device Host Remote Code Execution VulnerabilityImportant
WindowsCVE-2026-32158Windows Push Notifications privilege escalation vulnerabilityImportant
WindowsCVE-2026-32159Windows Push Notifications privilege escalation vulnerabilityImportant
WindowsCVE-2026-32160Windows Push Notifications privilege escalation vulnerabilityImportant
WindowsCVE-2026-0390UEFI Secure Boot security feature bypass vulnerabilityImportant
WindowsCVE-2026-32165Windows User Interface Core Privilege Escalation VulnerabilityImportant
Microsoft SQL ServerCVE-2026-32167SQL Server Privilege Escalation VulnerabilityImportant
AzureCVE-2026-32168Azure Monitor Agent privilege escalation vulnerabilityImportant
.NET 9.0 installed on Mac OS,
.NET 9.0 installed on Windows,
.NET 10.0 installed on Mac OS,
.NET 9.0 installed on Linux,
.NET,Microsoft Visual Studio,
.NET 10.0 installed on Windows,
.NET 8.0 installed on Windows,
.NET 8.0 installed on Mac OS,
.NET 10.0 installed on Linux,
.NET 8.0 installed on Linux
CVE-2026-32178.NET Spoofing VulnerabilityImportant
WindowsCVE-2026-32181Connected User Experiences and Telemetry Service Denial of Service VulnerabilityImportant
WindowsCVE-2026-32183Windows Snipping Tool Remote Code Execution VulnerabilityImportant
AzureCVE-2026-32184Microsoft High Performance Compute (HPC) Pack privilege escalation vulnerabilityImportant
Microsoft OfficeCVE-2026-32188Microsoft Excel Information Disclosure VulnerabilityImportant
Microsoft OfficeCVE-2026-32189Microsoft Excel Remote Code Execution VulnerabilityImportant
AzureCVE-2026-32192Azure Monitor Agent privilege escalation vulnerabilityImportant
WindowsCVE-2026-32195Windows Kernel privilege escalation vulnerabilityImportant
WindowsCVE-2026-32202Windows Shell Spoofing VulnerabilityImportant
WindowsCVE-2026-32215Windows Kernel Information Disclosure VulnerabilityImportant
WindowsCVE-2026-32216Windows Redirected Drive Buffering System Denial of Service VulnerabilityImportant
WindowsCVE-2026-32217Windows Kernel Information Disclosure VulnerabilityImportant
WindowsCVE-2026-32218Windows Kernel Information Disclosure VulnerabilityImportant
WindowsCVE-2026-32219Microsoft Brokering File System Privilege Escalation VulnerabilityImportant
WindowsCVE-2026-32220UEFI Secure Boot security feature bypass vulnerabilityImportant
WindowsCVE-2026-32221Windows Graphics Component Remote Code Execution VulnerabilityImportant
WindowsCVE-2026-32222Windows Win32k Privilege Escalation VulnerabilityImportant
WindowsCVE-2026-32223Windows USB Printing Stack (usbprint.sys) Privilege Escalation VulnerabilityImportant
WindowsCVE-2026-32224Windows Server Update Service (WSUS) Privilege Escalation VulnerabilityImportant
Microsoft .NET FrameworkCVE-2026-32226.NET Framework Denial of Service VulnerabilityImportant
Microsoft OfficeCVE-2026-33095Microsoft Word remote code execution vulnerabilityImportant
WindowsCVE-2026-33096HTTP.sys denial of service vulnerabilityImportant
WindowsCVE-2026-33098Windows Container Isolation FS Filter Driver Escalation VulnerabilityImportant
.NET 9.0 installed on Mac OS,
.NET 9.0 installed on Windows,
Microsoft .NET Framework,
.NET 10.0 installed on Mac OS,
.NET 9.0 installed on Linux,
.NET,.NET 8.0 installed on Windows,
.NET 8.0 installed on Mac OS,
.NET 10.0 installed on Linux,
.NET 8.0 installed on Linux
CVE-2026-33116.NET, .NET Framework, and Visual Studio Denial of Service VulnerabilityImportant
Microsoft SQL ServerCVE-2026-33120Microsoft SQL Server Remote Code Execution VulnerabilityImportant
Microsoft OfficeCVE-2026-33822Microsoft Word Information Disclosure VulnerabilityImportant
WindowsCVE-2026-32212Universal Plug and Play (upnp.dll) information disclosure vulnerabilityImportant
WindowsCVE-2026-20928Windows Recovery Environment Security Function Bypass VulnerabilityImportant
WindowsCVE-2026-20806Windows COM Server Information Disclosure VulnerabilityImportant
Microsoft OfficeCVE-2026-23657Microsoft Word remote code execution vulnerabilityImportant
PowerShellCVE-2026-26143Microsoft PowerShell security feature bypass vulnerabilityImportant
WindowsCVE-2026-26152Microsoft Cryptographic Services privilege escalation vulnerabilityImportant
WindowsCVE-2026-26153Windows Encrypted File System (EFS) Privilege Escalation VulnerabilityImportant
WindowsCVE-2026-26156Windows Hyper-V remote code execution vulnerabilityImportant
WindowsCVE-2026-26159Remote Desktop Licensing Service privilege escalation vulnerabilityImportant
WindowsCVE-2026-26163Windows Kernel privilege escalation vulnerabilityImportant
WindowsCVE-2026-26168Windows Ancillary Function Driver for WinSock Privilege Escalation VulnerabilityImportant
WindowsCVE-2026-26169Windows Kernel Memory Information Disclosure VulnerabilityImportant
WindowsCVE-2026-26170PowerShell privilege escalation vulnerabilityImportant
WindowsCVE-2026-26172Windows Push Notifications privilege escalation vulnerabilityImportant
WindowsCVE-2026-26173Windows Ancillary Function Driver for WinSock Privilege Escalation VulnerabilityImportant
WindowsCVE-2026-26176Windows Client Side Caching driver (csc.sys) Privilege Escalation VulnerabilityImportant
WindowsCVE-2026-26177Windows Ancillary Function Driver for WinSock Privilege Escalation VulnerabilityImportant
WindowsCVE-2026-26178Windows Advanced Rasterization Platform Privilege Escalation VulnerabilityImportant
WindowsCVE-2026-26182Windows Ancillary Function Driver for WinSock Privilege Escalation VulnerabilityImportant
WindowsCVE-2026-26184Windows Projected File System Privilege Escalation VulnerabilityImportant
WindowsCVE-2026-27909Windows Search Service privilege escalation vulnerabilityImportant
WindowsCVE-2026-27910Windows Installer privilege escalation vulnerabilityImportant
WindowsCVE-2026-27911Windows User Interface Core Privilege Escalation VulnerabilityImportant
WindowsCVE-2026-27912Windows Kerberos privilege escalation vulnerabilityImportant
WindowsCVE-2026-27913Windows BitLocker security feature bypass vulnerabilityImportant
WindowsCVE-2026-27914Microsoft Management Console Privilege Escalation VulnerabilityImportant
WindowsCVE-2026-27916Windows UPnP Device Host privilege escalation vulnerabilityImportant
WindowsCVE-2026-27920Windows UPnP Device Host privilege escalation vulnerabilityImportant
WindowsCVE-2026-27922Windows Ancillary Function Driver for WinSock Privilege Escalation VulnerabilityImportant
WindowsCVE-2026-27923Desktop Window Manager Privilege Escalation VulnerabilityImportant
WindowsCVE-2026-27925Windows UPnP Device Host information disclosure vulnerabilityImportant
WindowsCVE-2026-27928Windows Hello security feature bypass vulnerabilityImportant
WindowsCVE-2026-27930Windows GDI Information Disclosure VulnerabilityImportant
WindowsCVE-2026-32068Windows Simple Search and Discovery Protocol (SSDP) Service privilege escalation vulnerabilityImportant
WindowsCVE-2026-32069Windows Projected File System Privilege Escalation VulnerabilityImportant
WindowsCVE-2026-32070Windows Common Log File System Driver Escalation VulnerabilityImportant
WindowsCVE-2026-32072Active Directory Spoofing VulnerabilityImportant
WindowsCVE-2026-32074Windows Projected File System Privilege Escalation VulnerabilityImportant
WindowsCVE-2026-32076Windows Storage Spaces Controller privilege escalation vulnerabilityImportant
WindowsCVE-2026-32077Windows UPnP Device Host privilege escalation vulnerabilityImportant
WindowsCVE-2026-32078Windows Projected File System Privilege Escalation VulnerabilityImportant
WindowsCVE-2026-32079Web Account Manager Information Disclosure VulnerabilityImportant
WindowsCVE-2026-32080Windows WalletService privilege escalation vulnerabilityImportant
WindowsCVE-2026-32084Windows Print Spooler Information Disclosure VulnerabilityImportant
WindowsCVE-2026-32086Windows Function Discovery Service (fdwsd.dll) Privilege Escalation VulnerabilityImportant
WindowsCVE-2026-32088Windows Biometric Service security feature bypass vulnerabilityImportant
WindowsCVE-2026-32091Microsoft Brokering File System Privilege Escalation VulnerabilityImportant
WindowsCVE-2026-32149Windows Hyper-V remote code execution vulnerabilityImportant
WindowsCVE-2026-32150Windows Function Discovery Service (fdwsd.dll) Privilege Escalation VulnerabilityImportant
WindowsCVE-2026-32151Windows Shell Information Disclosure VulnerabilityImportant
WindowsCVE-2026-32153Windows Speech Runtime privilege escalation vulnerabilityImportant
WindowsCVE-2026-32155Desktop Window Manager Privilege Escalation VulnerabilityImportant
WindowsCVE-2026-32162Windows COM Privilege Escalation VulnerabilityImportant
WindowsCVE-2026-32163Windows User Interface Core Privilege Escalation VulnerabilityImportant
WindowsCVE-2026-32164Windows User Interface Core Privilege Escalation VulnerabilityImportant
AzureCVE-2026-32171Azure Logic Apps privilege escalation vulnerabilityImportant
Microsoft SQL ServerCVE-2026-32176SQL Server Privilege Escalation VulnerabilityImportant
WindowsCVE-2026-32196Windows Admin Center Spoofing VulnerabilityImportant
Microsoft OfficeCVE-2026-32197Microsoft Excel Remote Code Execution VulnerabilityImportant
Microsoft OfficeCVE-2026-32198Microsoft Excel Remote Code Execution VulnerabilityImportant
Microsoft OfficeCVE-2026-32199Microsoft Excel Remote Code Execution VulnerabilityImportant
Microsoft OfficeCVE-2026-32200Microsoft PowerPoint remote code execution vulnerabilityImportant
Microsoft OfficeCVE-2026-32201Microsoft SharePoint Server Spoofing VulnerabilityImportant
.NET 9.0 installed on Mac OS,
.NET 9.0 installed on Windows,
.NET 10.0 installed on Mac OS,
.NET 9.0 installed on Linux,
.NET 10.0 installed on Windows,
.NET 8.0 installed on Windows,
.NET 8.0 installed on Mac OS,
.NET 10.0 installed on Linux,
.NET 8.0 installed on Linux
CVE-2026-26171.NET Denial of Service VulnerabilityImportant
.NET 9.0 installed on Mac OS,
.NET 9.0 installed on Windows,
.NET 10.0 installed on Mac OS,
.NET 9.0 installed on Linux,
Microsoft Visual Studio,
.NET 10.0 installed on Windows,
.NET 8.0 installed on Windows,
.NET 8.0 installed on Mac OS,
.NET 10.0 installed on Linux,
.NET 8.0 installed on Linux
CVE-2026-32203.NET and Visual Studio Denial of Service VulnerabilityImportant
WindowsCVE-2026-32225Windows Shell security feature bypass vulnerabilityImportant
WindowsCVE-2026-33099Windows Ancillary Function Driver for WinSock Privilege Escalation VulnerabilityImportant
WindowsCVE-2026-33100Windows Ancillary Function Driver for WinSock Privilege Escalation VulnerabilityImportant
WindowsCVE-2026-33101Windows Print Spooler privilege escalation vulnerabilityImportant
Microsoft DynamicsCVE-2026-33103Microsoft Dynamics 365 (On-Premises) information disclosure vulnerabilityImportant
WindowsCVE-2026-33104Win32k Privilege Escalation VulnerabilityImportant
WindowsCVE-2026-32214Universal Plug and Play (upnp.dll) information disclosure vulnerabilityImportant
System CenterCVE-2026-33825Microsoft Defender privilege escalation vulnerabilityImportant
WindowsCVE-2026-33829Windows Snipping Tool spoofing vulnerabilityModerate
Microsoft Edge for AndroidCVE-2026-33119Microsoft Edge (Chromium-based) for Android spoofing vulnerabilityModerate
Microsoft Edge (Chromium-based)CVE-2026-33118Microsoft Edge (Chromium-based) spoofing vulnerabilityLow

Statement

This advisory is only used to describe a potential risk. NSFOCUS does not provide any commitment or promise on this advisory. NSFOCUS and the author will not bear any liability for any direct and/or indirect consequences and losses caused by transmitting and/or using this advisory. NSFOCUS reserves all the rights to modify and interpret this advisory. Please include this statement paragraph when reproducing or transferring this advisory. Do not modify this advisory, add/delete any information to/from it, or use this advisory for commercial purposes without permission from NSFOCUS.

About NSFOCUS

NSFOCUS, a pioneering leader in cybersecurity, is dedicated to safeguarding telecommunications, Internet service providers, hosting providers, and enterprises from sophisticated cyberattacks.

Founded in 2000, NSFOCUS operates globally with over 3000 employees at two headquarters in Beijing, China, and Santa Clara, CA, USA, and over 50 offices worldwide. It has a proven track record of protecting over 25% of the Fortune Global 500 companies, including four of the five largest banks and six of the world’s top ten telecommunications companies.

Leveraging technical prowess and innovation, NSFOCUS delivers a comprehensive suite of security solutions, including the Intelligent Security Operations Platform (ISOP) for modern SOC, DDoS Protection, Continuous Threat Exposure Management (CTEM) Service and Web Application and API Protection (WAAP). All the solutions and services are augmented by the Security Large Language Model (SecLLM), ML, patented algorithms and other cutting-edge research achievements developed by NSFOCUS.

Deixe um comentário

O seu endereço de e-mail não será publicado. Campos obrigatórios são marcados com *

NSFOCUS
Privacy Overview

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.