Overview
On April 15, NSFOCUS CERT detected that Microsoft released the April Security Update patch, fixing 165 security issues involving Windows, Microsoft Office, Microsoft SQL Server, Microsoft Visual Studio, Microsoft .NET Framework, Widely used products such as Azure, including high-risk vulnerability types such as privilege escalation and remote code execution.
Among the vulnerabilities fixed by Microsoft’s monthly update this month, there are 8 critical vulnerabilities, 154 important vulnerabilities, 2 moderate vulnerabilities, and 1 low-risk (Low) vulnerability. These include 1 vulnerability that has been detected for wild exploitation:
Microsoft SharePoint Server Spoofing Vulnerability (CVE-2026-32201)
Please update the patch as soon as possible for protection. For a complete list of vulnerabilities, please refer to the appendix.
Reference link: https://msrc.microsoft.com/update-guide/releaseNote/2026-Apr
Key Vulnerabilities
Based on the product popularity and vulnerability importance, this update contains vulnerabilities with greater impact. Relevant users are requested to pay special attention:
Microsoft SharePoint Server Spoofing Vulnerability (CVE-2026-32201):
There is a spoofing vulnerability in Microsoft SharePoint Server. Due to improper input validation of SharePoint Server, unauthenticated attackers can conduct spoofing attacks through the network to view some sensitive information and tamper with publicly available information. The vulnerability is exploited in the wild and has a CVSS score of 9.0.
Official announcement link: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32201
Windows Kerberos Privilege Escalation Vulnerability (CVE-2026-27912):
There is a privilege escalation vulnerability in Windows Kerberos. Due to improper authorization during the verification process of the Kerberos service ticket request, an authenticated attacker can bypass security checks by manipulating the Kerberos ticket field and elevate privileges on adjacent networks, possibly gaining domain administrator privileges. CVSS score 8.0.
Official announcement link: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27912
Remote Desktop Client remote code execution vulnerability (CVE-2026-32157):
A remote code execution vulnerability exists in the Remote Desktop Client. Due to the Use After Free problem when processing RDP connection parameters, an unauthenticated attacker can execute arbitrary code on the client host by tricking users into connecting to a malicious RDP server. CVSS score 8.8.
Official announcement link: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32157
Windows TCP/IP Remote Code Execution Vulnerability (CVE-2026-33827):
A remote code execution vulnerability exists in Windows TCP/IP. Due to improper synchronization mechanism when using shared resources in Windows TCP/IP, an unauthenticated attacker can exploit this vulnerability over the network to execute arbitrary code. CVSS score 8.1.
Official announcement link: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33827
Windows Shell Security Function Bypass Vulnerability (CVE-2026-32225):
There is a security feature bypass vulnerability in Windows Shell. Due to the failure of the protection mechanism in Windows Shell, an unauthenticated attacker can bypass SmartScreen security protection by tricking the victim into opening a specially crafted .lnk file, resulting in unauthorized operation or access. CVSS score 8.8.
Official announcement link: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32225
Windows Internet Key Exchange (IKE) Service Extensions Remote Code Execution Vulnerability (CVE-2026-33824):
A remote code execution vulnerability exists in Windows Internet Key Exchange (IKE) Service Extensions, which allows an unauthenticated attacker to send specially crafted packets to IKEv2 enabled Windows systems due to a Double Free issue in the Windows IKE extension. Thereby enabling remote code execution. CVSS score 9.8.
Official announcement link: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33824
Microsoft Defender Privilege Escalation Vulnerability (CVE-2026-33825):
There is a privilege escalation vulnerability in Microsoft Defender. Due to insufficient access control granularity in Microsoft Defender, an authenticated local attacker can elevate privileges to SYSTEM. CVSS score 7.8.
Official announcement link: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33825
Windows Active Directory Remote Code Execution Vulnerability (CVE-2026-33826):
A remote code execution vulnerability exists in Windows Active Directory. Due to improper input validation in Windows Active Directory, an authenticated attacker can send a specially crafted RPC call to the RPC host through an adjacent network to achieve remote code execution. CVSS score 8.0.
Official announcement link: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33826
Scope of Impact
The following are the affected product versions of some key vulnerabilities. For the scope of products affected by other vulnerabilities, please refer to the official announcement link.
| Vulnerability Number | Affected product versions |
|---|---|
| CVE-2026-32201 | Microsoft SharePoint Server Subscription Edition Microsoft SharePoint Enterprise Server 2016 Microsoft SharePoint Server 2019 |
| CVE-2026-27912 | Windows Server 2012 R2 (Server Core installation) Windows Server 2012 R2 Windows Server 2012 (Server Core installation) Windows Server 2012 Windows Server 2016 (Server Core installation) Windows Server 2016 Windows Server 2025 Windows Server 2022, 23H2 Edition (Server Core installation) Windows Server 2025 (Server Core installation) Windows Server 2022 (Server Core installation) Windows Server 2022 Windows Server 2019 (Server Core installation) Windows Server 2019 |
| CVE-2026-32157 | Windows Server 2012 R2 (Server Core installation) Windows Server 2012 R2 Windows Server 2012 (Server Core installation) Windows Server 2012 Windows Server 2016 (Server Core installation) Windows Server 2016 Windows 10 Version 1607 for x64-based Systems Windows 10 Version 1607 for 32-bit Systems Windows Server 2025 Windows 11 Version 24H2 for x64-based Systems Windows 11 Version 24H2 for ARM64-based Systems Windows Server 2022, 23H2 Edition (Server Core installation) Windows 11 Version 23H2 for x64-based Systems Windows 11 Version 23H2 for ARM64-based Systems Windows 11 Version 25H2 for x64-based Systems Windows 11 Version 25H2 for ARM systems Windows Server 2025 (Server Core installation) Windows 10 Version 22H2 for 32-bit Systems Windows 10 Version 22H2 for ARM64-based Systems Windows 10 Version 22H2 for x64-based Systems Windows 10 Version 21H2 for x64-based Systems Windows 10 Version 21H2 for ARM64-based Systems Windows 10 Version 21H2 for 32-bit Systems Windows Server 2022 (Server Core installation) Windows Server 2022 Remote Desktop client for Windows Desktop Windows Server 2019 (Server Core installation) Windows Server 2019 Windows 10 Version 1809 for x64-based Systems Windows 10 Version 1809 for 32-bit Systems Windows App Client for Windows Desktop Windows 11 version 26H1 for x64-based Systems Windows 11 Version 26H1 for ARM64-based Systems |
| CVE-2026-33827 CVE-2026-32225 | Windows 10 Version 22H2 for ARM64-based Systems Windows 10 Version 22H2 for x64-based Systems Windows 10 Version 21H2 for x64-based Systems Windows 10 Version 21H2 for ARM64-based Systems Windows 10 Version 21H2 for 32-bit Systems Windows Server 2022 (Server Core installation) Windows Server 2022 Windows Server 2019 (Server Core installation) Windows Server 2019 Windows 10 Version 1809 for x64-based Systems Windows 10 Version 1809 for 32-bit Systems Windows Server 2025 (Server Core installation) Windows 10 Version 22H2 for 32-bit Systems Windows Server 2012 R2 (Server Core installation) Windows Server 2012 R2 Windows Server 2012 (Server Core installation) Windows Server 2012 Windows Server 2016 (Server Core installation) Windows Server 2016 Windows 10 Version 1607 for x64-based Systems Windows 10 Version 1607 for 32-bit Systems Windows 11 Version 26H1 for ARM64-based Systems Windows 11 version 26H1 for x64-based Systems Windows Server 2025 Windows 11 Version 24H2 for x64-based Systems Windows 11 Version 24H2 for ARM64-based Systems Windows Server 2022, 23H2 Edition (Server Core installation) Windows 11 Version 23H2 for x64-based Systems Windows 11 Version 23H2 for ARM64-based Systems Windows 11 Version 25H2 for x64-based Systems Windows 11 Version 25H2 for ARM systems |
| CVE-2026-33824 | Windows Server 2016 (Server Core installation) Windows Server 2016 Windows 10 Version 1607 for x64-based Systems Windows 10 Version 1607 for 32-bit Systems Windows 11 Version 26H1 for ARM64-based Systems Windows 11 version 26H1 for x64-based Systems Windows Server 2025 Windows 11 Version 24H2 for x64-based Systems Windows 11 Version 24H2 for ARM64-based Systems Windows Server 2022, 23H2 Edition (Server Core installation) Windows 11 Version 23H2 for x64-based Systems Windows 11 Version 23H2 for ARM64-based Systems Windows 11 Version 25H2 for x64-based Systems Windows 11 Version 25H2 for ARM systems Windows Server 2025 (Server Core installation) Windows 10 Version 22H2 for 32-bit Systems Windows 10 Version 22H2 for ARM64-based Systems Windows 10 Version 22H2 for x64-based Systems Windows 10 Version 21H2 for x64-based Systems Windows 10 Version 21H2 for ARM64-based Systems Windows 10 Version 21H2 for 32-bit Systems Windows Server 2022 (Server Core installation) Windows Server 2022 Windows Server 2019 (Server Core installation) Windows Server 2019 Windows 10 Version 1809 for x64-based Systems Windows 10 Version 1809 for 32-bit Systems |
| CVE-2026-33825 | Microsoft Defender Antimalware Platform |
| CVE-2026-33826 | Windows Server 2012 R2 (Server Core installation) Windows Server 2012 R2 Windows Server 2016 (Server Core installation) Windows Server 2016 Windows Server 2025 Windows Server 2022, 23H2 Edition (Server Core installation) Windows Server 2025 (Server Core installation) Windows Server 2022 (Server Core installation) Windows Server 2022 Windows Server 2019 (Server Core installation) Windows Server 2019 |
Mitigation
At present, Microsoft has officially released security patches to fix the above vulnerabilities for supported product versions. It is strongly recommended that affected users install patches as soon as possible for protection. The official download link: https://msrc.microsoft.com/update-guide/releaseNote/2026-Apr
Note: Patch updates for Windows Update may fail due to network problems, computer environment problems, etc. After installing the patch, users should check whether the patch has been successfully updated in time.
Right-click the Windows icon, select “Settings (N)”, select “Update and Security”-“Windows Update”, view the prompt information on this page, or click “View Update History” to view the historical update status.
For updates that have not been successfully installed, you can click the update name to jump to the Microsoft official download page. It is recommended that users click the link on this page and go to the “Microsoft Update Catalog” website to download the independent program package and install it.
Appendix: Vulnerability List
| Affected products | CVE No. | Vulnerability Title | Severity |
|---|---|---|---|
| Windows | CVE-2026-32157 | Remote Desktop Client remote code execution vulnerability | Critical |
| Windows | CVE-2026-33826 | Windows Active Directory Remote Code Execution Vulnerability | Critical |
| Microsoft .NET Framework | CVE-2026-23666 | .NET Framework Denial of Service Vulnerability | Critical |
| Microsoft Office | CVE-2026-32190 | Microsoft Office Remote Code Execution Vulnerability | Critical |
| Microsoft Office | CVE-2026-33114 | Microsoft Word remote code execution vulnerability | Critical |
| Microsoft Office | CVE-2026-33115 | Microsoft Word remote code execution vulnerability | Critical |
| Windows | CVE-2026-33827 | Windows TCP/IP Remote Code Execution Vulnerability | Critical |
| Windows | CVE-2026-33824 | Windows Internet Key Exchange (IKE) Service Extensions Remote Code Execution Vulnerability | Critical |
| Windows | CVE-2026-20930 | Windows Management Services Privilege Escalation Vulnerability | Important |
| Microsoft Visual Studio Code CoPilot Chat Extension | CVE-2026-23653 | GitHub Copilot and Visual Studio Code Information Disclosure Vulnerability | Important |
| Windows | CVE-2026-25184 | Applocker Filter Driver (applockerfltr.sys) Privilege Escalation Vulnerability | Important |
| Microsoft Office | CVE-2026-20945 | Microsoft SharePoint Server Spoofing Vulnerability | Important |
| Windows | CVE-2026-23670 | Windows Virtualization-Based Security (VBS) security feature bypass vulnerability | Important |
| Microsoft Dynamics | CVE-2026-26149 | Microsoft Power Apps Security Feature Bypass | Important |
| Windows | CVE-2026-26151 | Remote Desktop spoofing vulnerability | Important |
| Windows | CVE-2026-26154 | Windows Server Update Service (WSUS) Tampering Vulnerability | Important |
| Windows | CVE-2026-26155 | Microsoft Local Security Authority Subsystem Service information disclosure vulnerability | Important |
| Windows | CVE-2026-26160 | Remote Desktop Licensing Service privilege escalation vulnerability | Important |
| Windows | CVE-2026-26161 | Windows Sensor Data Service privilege escalation vulnerability | Important |
| Windows | CVE-2026-26162 | Windows OLE privilege escalation vulnerability | Important |
| Windows | CVE-2026-26165 | Windows Shell Privilege Escalation Vulnerability | Important |
| Windows | CVE-2026-26166 | Windows Shell Privilege Escalation Vulnerability | Important |
| Windows | CVE-2026-26167 | Windows Push Notifications privilege escalation vulnerability | Important |
| Windows | CVE-2026-26174 | Windows Server Update Service (WSUS) Privilege Escalation Vulnerability | Important |
| Windows | CVE-2026-26175 | Windows Boot Manager security feature bypass vulnerability | Important |
| Windows | CVE-2026-26179 | Windows Kernel privilege escalation vulnerability | Important |
| Windows | CVE-2026-26180 | Windows Kernel privilege escalation vulnerability | Important |
| Windows | CVE-2026-26181 | Microsoft Brokering File System Privilege Escalation Vulnerability | Important |
| Windows | CVE-2026-26183 | Remote Access Management service/API (RPC server) privilege escalation vulnerability | Important |
| Windows | CVE-2026-27906 | Windows Hello security feature bypass vulnerability | Important |
| Windows | CVE-2026-27907 | Windows Storage Spaces Controller privilege escalation vulnerability | Important |
| Windows | CVE-2026-27908 | Windows TDI Translation Driver (tdx.sys) Privilege Escalation Vulnerability | Important |
| Windows | CVE-2026-27915 | Windows UPnP Device Host privilege escalation vulnerability | Important |
| Windows | CVE-2026-27917 | Windows WFP NDIS Lightweight Filter Driver (wfplwfs.sys) Privilege Escalation Vulnerability | Important |
| Windows | CVE-2026-27918 | Windows Shell Privilege Escalation Vulnerability | Important |
| Windows | CVE-2026-27919 | Windows UPnP Device Host privilege escalation vulnerability | Important |
| Windows | CVE-2026-27921 | Windows TDI Translation Driver (tdx.sys) Privilege Escalation Vulnerability | Important |
| Windows | CVE-2026-27924 | Desktop Window Manager Privilege Escalation Vulnerability | Important |
| Windows | CVE-2026-27926 | Windows Cloud Files Mini Filter Driver privilege escalation vulnerability | Important |
| Windows | CVE-2026-27927 | Windows Projected File System Privilege Escalation Vulnerability | Important |
| Windows | CVE-2026-27929 | Windows LUA File Virtualization Filter Driver Escalation Vulnerability | Important |
| Windows | CVE-2026-27931 | Windows GDI Information Disclosure Vulnerability | Important |
| Windows | CVE-2026-32071 | Windows Local Security Authority Subsystem Service (LSASS) Denial of Service Vulnerability | Important |
| Windows | CVE-2026-32073 | Windows Ancillary Function Driver for WinSock Privilege Escalation Vulnerability | Important |
| Windows | CVE-2026-32075 | Windows UPnP Device Host privilege escalation vulnerability | Important |
| Windows | CVE-2026-32081 | Package Catalog information leakage vulnerability | Important |
| Windows | CVE-2026-32082 | Windows Simple Search and Discovery Protocol (SSDP) Service privilege escalation vulnerability | Important |
| Windows | CVE-2026-32083 | Windows Simple Search and Discovery Protocol (SSDP) Service privilege escalation vulnerability | Important |
| Windows | CVE-2026-32085 | Remote Procedure Call information leakage vulnerability | Important |
| Windows | CVE-2026-32087 | Windows Function Discovery Service (fdwsd.dll) Privilege Escalation Vulnerability | Important |
| Windows | CVE-2026-32089 | Windows Speech Brokered Api Privilege Escalation Vulnerability | Important |
| Windows | CVE-2026-32090 | Windows Speech Brokered Api Privilege Escalation Vulnerability | Important |
| Windows | CVE-2026-32093 | Windows Function Discovery Service (fdwsd.dll) Privilege Escalation Vulnerability | Important |
| Windows | CVE-2026-32152 | Desktop Window Manager Privilege Escalation Vulnerability | Important |
| Windows | CVE-2026-32154 | Desktop Window Manager Privilege Escalation Vulnerability | Important |
| Windows | CVE-2026-32156 | Windows UPnP Device Host Remote Code Execution Vulnerability | Important |
| Windows | CVE-2026-32158 | Windows Push Notifications privilege escalation vulnerability | Important |
| Windows | CVE-2026-32159 | Windows Push Notifications privilege escalation vulnerability | Important |
| Windows | CVE-2026-32160 | Windows Push Notifications privilege escalation vulnerability | Important |
| Windows | CVE-2026-0390 | UEFI Secure Boot security feature bypass vulnerability | Important |
| Windows | CVE-2026-32165 | Windows User Interface Core Privilege Escalation Vulnerability | Important |
| Microsoft SQL Server | CVE-2026-32167 | SQL Server Privilege Escalation Vulnerability | Important |
| Azure | CVE-2026-32168 | Azure Monitor Agent privilege escalation vulnerability | Important |
| .NET 9.0 installed on Mac OS, .NET 9.0 installed on Windows, .NET 10.0 installed on Mac OS, .NET 9.0 installed on Linux, .NET,Microsoft Visual Studio, .NET 10.0 installed on Windows, .NET 8.0 installed on Windows, .NET 8.0 installed on Mac OS, .NET 10.0 installed on Linux, .NET 8.0 installed on Linux | CVE-2026-32178 | .NET Spoofing Vulnerability | Important |
| Windows | CVE-2026-32181 | Connected User Experiences and Telemetry Service Denial of Service Vulnerability | Important |
| Windows | CVE-2026-32183 | Windows Snipping Tool Remote Code Execution Vulnerability | Important |
| Azure | CVE-2026-32184 | Microsoft High Performance Compute (HPC) Pack privilege escalation vulnerability | Important |
| Microsoft Office | CVE-2026-32188 | Microsoft Excel Information Disclosure Vulnerability | Important |
| Microsoft Office | CVE-2026-32189 | Microsoft Excel Remote Code Execution Vulnerability | Important |
| Azure | CVE-2026-32192 | Azure Monitor Agent privilege escalation vulnerability | Important |
| Windows | CVE-2026-32195 | Windows Kernel privilege escalation vulnerability | Important |
| Windows | CVE-2026-32202 | Windows Shell Spoofing Vulnerability | Important |
| Windows | CVE-2026-32215 | Windows Kernel Information Disclosure Vulnerability | Important |
| Windows | CVE-2026-32216 | Windows Redirected Drive Buffering System Denial of Service Vulnerability | Important |
| Windows | CVE-2026-32217 | Windows Kernel Information Disclosure Vulnerability | Important |
| Windows | CVE-2026-32218 | Windows Kernel Information Disclosure Vulnerability | Important |
| Windows | CVE-2026-32219 | Microsoft Brokering File System Privilege Escalation Vulnerability | Important |
| Windows | CVE-2026-32220 | UEFI Secure Boot security feature bypass vulnerability | Important |
| Windows | CVE-2026-32221 | Windows Graphics Component Remote Code Execution Vulnerability | Important |
| Windows | CVE-2026-32222 | Windows Win32k Privilege Escalation Vulnerability | Important |
| Windows | CVE-2026-32223 | Windows USB Printing Stack (usbprint.sys) Privilege Escalation Vulnerability | Important |
| Windows | CVE-2026-32224 | Windows Server Update Service (WSUS) Privilege Escalation Vulnerability | Important |
| Microsoft .NET Framework | CVE-2026-32226 | .NET Framework Denial of Service Vulnerability | Important |
| Microsoft Office | CVE-2026-33095 | Microsoft Word remote code execution vulnerability | Important |
| Windows | CVE-2026-33096 | HTTP.sys denial of service vulnerability | Important |
| Windows | CVE-2026-33098 | Windows Container Isolation FS Filter Driver Escalation Vulnerability | Important |
| .NET 9.0 installed on Mac OS, .NET 9.0 installed on Windows, Microsoft .NET Framework, .NET 10.0 installed on Mac OS, .NET 9.0 installed on Linux, .NET,.NET 8.0 installed on Windows, .NET 8.0 installed on Mac OS, .NET 10.0 installed on Linux, .NET 8.0 installed on Linux | CVE-2026-33116 | .NET, .NET Framework, and Visual Studio Denial of Service Vulnerability | Important |
| Microsoft SQL Server | CVE-2026-33120 | Microsoft SQL Server Remote Code Execution Vulnerability | Important |
| Microsoft Office | CVE-2026-33822 | Microsoft Word Information Disclosure Vulnerability | Important |
| Windows | CVE-2026-32212 | Universal Plug and Play (upnp.dll) information disclosure vulnerability | Important |
| Windows | CVE-2026-20928 | Windows Recovery Environment Security Function Bypass Vulnerability | Important |
| Windows | CVE-2026-20806 | Windows COM Server Information Disclosure Vulnerability | Important |
| Microsoft Office | CVE-2026-23657 | Microsoft Word remote code execution vulnerability | Important |
| PowerShell | CVE-2026-26143 | Microsoft PowerShell security feature bypass vulnerability | Important |
| Windows | CVE-2026-26152 | Microsoft Cryptographic Services privilege escalation vulnerability | Important |
| Windows | CVE-2026-26153 | Windows Encrypted File System (EFS) Privilege Escalation Vulnerability | Important |
| Windows | CVE-2026-26156 | Windows Hyper-V remote code execution vulnerability | Important |
| Windows | CVE-2026-26159 | Remote Desktop Licensing Service privilege escalation vulnerability | Important |
| Windows | CVE-2026-26163 | Windows Kernel privilege escalation vulnerability | Important |
| Windows | CVE-2026-26168 | Windows Ancillary Function Driver for WinSock Privilege Escalation Vulnerability | Important |
| Windows | CVE-2026-26169 | Windows Kernel Memory Information Disclosure Vulnerability | Important |
| Windows | CVE-2026-26170 | PowerShell privilege escalation vulnerability | Important |
| Windows | CVE-2026-26172 | Windows Push Notifications privilege escalation vulnerability | Important |
| Windows | CVE-2026-26173 | Windows Ancillary Function Driver for WinSock Privilege Escalation Vulnerability | Important |
| Windows | CVE-2026-26176 | Windows Client Side Caching driver (csc.sys) Privilege Escalation Vulnerability | Important |
| Windows | CVE-2026-26177 | Windows Ancillary Function Driver for WinSock Privilege Escalation Vulnerability | Important |
| Windows | CVE-2026-26178 | Windows Advanced Rasterization Platform Privilege Escalation Vulnerability | Important |
| Windows | CVE-2026-26182 | Windows Ancillary Function Driver for WinSock Privilege Escalation Vulnerability | Important |
| Windows | CVE-2026-26184 | Windows Projected File System Privilege Escalation Vulnerability | Important |
| Windows | CVE-2026-27909 | Windows Search Service privilege escalation vulnerability | Important |
| Windows | CVE-2026-27910 | Windows Installer privilege escalation vulnerability | Important |
| Windows | CVE-2026-27911 | Windows User Interface Core Privilege Escalation Vulnerability | Important |
| Windows | CVE-2026-27912 | Windows Kerberos privilege escalation vulnerability | Important |
| Windows | CVE-2026-27913 | Windows BitLocker security feature bypass vulnerability | Important |
| Windows | CVE-2026-27914 | Microsoft Management Console Privilege Escalation Vulnerability | Important |
| Windows | CVE-2026-27916 | Windows UPnP Device Host privilege escalation vulnerability | Important |
| Windows | CVE-2026-27920 | Windows UPnP Device Host privilege escalation vulnerability | Important |
| Windows | CVE-2026-27922 | Windows Ancillary Function Driver for WinSock Privilege Escalation Vulnerability | Important |
| Windows | CVE-2026-27923 | Desktop Window Manager Privilege Escalation Vulnerability | Important |
| Windows | CVE-2026-27925 | Windows UPnP Device Host information disclosure vulnerability | Important |
| Windows | CVE-2026-27928 | Windows Hello security feature bypass vulnerability | Important |
| Windows | CVE-2026-27930 | Windows GDI Information Disclosure Vulnerability | Important |
| Windows | CVE-2026-32068 | Windows Simple Search and Discovery Protocol (SSDP) Service privilege escalation vulnerability | Important |
| Windows | CVE-2026-32069 | Windows Projected File System Privilege Escalation Vulnerability | Important |
| Windows | CVE-2026-32070 | Windows Common Log File System Driver Escalation Vulnerability | Important |
| Windows | CVE-2026-32072 | Active Directory Spoofing Vulnerability | Important |
| Windows | CVE-2026-32074 | Windows Projected File System Privilege Escalation Vulnerability | Important |
| Windows | CVE-2026-32076 | Windows Storage Spaces Controller privilege escalation vulnerability | Important |
| Windows | CVE-2026-32077 | Windows UPnP Device Host privilege escalation vulnerability | Important |
| Windows | CVE-2026-32078 | Windows Projected File System Privilege Escalation Vulnerability | Important |
| Windows | CVE-2026-32079 | Web Account Manager Information Disclosure Vulnerability | Important |
| Windows | CVE-2026-32080 | Windows WalletService privilege escalation vulnerability | Important |
| Windows | CVE-2026-32084 | Windows Print Spooler Information Disclosure Vulnerability | Important |
| Windows | CVE-2026-32086 | Windows Function Discovery Service (fdwsd.dll) Privilege Escalation Vulnerability | Important |
| Windows | CVE-2026-32088 | Windows Biometric Service security feature bypass vulnerability | Important |
| Windows | CVE-2026-32091 | Microsoft Brokering File System Privilege Escalation Vulnerability | Important |
| Windows | CVE-2026-32149 | Windows Hyper-V remote code execution vulnerability | Important |
| Windows | CVE-2026-32150 | Windows Function Discovery Service (fdwsd.dll) Privilege Escalation Vulnerability | Important |
| Windows | CVE-2026-32151 | Windows Shell Information Disclosure Vulnerability | Important |
| Windows | CVE-2026-32153 | Windows Speech Runtime privilege escalation vulnerability | Important |
| Windows | CVE-2026-32155 | Desktop Window Manager Privilege Escalation Vulnerability | Important |
| Windows | CVE-2026-32162 | Windows COM Privilege Escalation Vulnerability | Important |
| Windows | CVE-2026-32163 | Windows User Interface Core Privilege Escalation Vulnerability | Important |
| Windows | CVE-2026-32164 | Windows User Interface Core Privilege Escalation Vulnerability | Important |
| Azure | CVE-2026-32171 | Azure Logic Apps privilege escalation vulnerability | Important |
| Microsoft SQL Server | CVE-2026-32176 | SQL Server Privilege Escalation Vulnerability | Important |
| Windows | CVE-2026-32196 | Windows Admin Center Spoofing Vulnerability | Important |
| Microsoft Office | CVE-2026-32197 | Microsoft Excel Remote Code Execution Vulnerability | Important |
| Microsoft Office | CVE-2026-32198 | Microsoft Excel Remote Code Execution Vulnerability | Important |
| Microsoft Office | CVE-2026-32199 | Microsoft Excel Remote Code Execution Vulnerability | Important |
| Microsoft Office | CVE-2026-32200 | Microsoft PowerPoint remote code execution vulnerability | Important |
| Microsoft Office | CVE-2026-32201 | Microsoft SharePoint Server Spoofing Vulnerability | Important |
| .NET 9.0 installed on Mac OS, .NET 9.0 installed on Windows, .NET 10.0 installed on Mac OS, .NET 9.0 installed on Linux, .NET 10.0 installed on Windows, .NET 8.0 installed on Windows, .NET 8.0 installed on Mac OS, .NET 10.0 installed on Linux, .NET 8.0 installed on Linux | CVE-2026-26171 | .NET Denial of Service Vulnerability | Important |
| .NET 9.0 installed on Mac OS, .NET 9.0 installed on Windows, .NET 10.0 installed on Mac OS, .NET 9.0 installed on Linux, Microsoft Visual Studio, .NET 10.0 installed on Windows, .NET 8.0 installed on Windows, .NET 8.0 installed on Mac OS, .NET 10.0 installed on Linux, .NET 8.0 installed on Linux | CVE-2026-32203 | .NET and Visual Studio Denial of Service Vulnerability | Important |
| Windows | CVE-2026-32225 | Windows Shell security feature bypass vulnerability | Important |
| Windows | CVE-2026-33099 | Windows Ancillary Function Driver for WinSock Privilege Escalation Vulnerability | Important |
| Windows | CVE-2026-33100 | Windows Ancillary Function Driver for WinSock Privilege Escalation Vulnerability | Important |
| Windows | CVE-2026-33101 | Windows Print Spooler privilege escalation vulnerability | Important |
| Microsoft Dynamics | CVE-2026-33103 | Microsoft Dynamics 365 (On-Premises) information disclosure vulnerability | Important |
| Windows | CVE-2026-33104 | Win32k Privilege Escalation Vulnerability | Important |
| Windows | CVE-2026-32214 | Universal Plug and Play (upnp.dll) information disclosure vulnerability | Important |
| System Center | CVE-2026-33825 | Microsoft Defender privilege escalation vulnerability | Important |
| Windows | CVE-2026-33829 | Windows Snipping Tool spoofing vulnerability | Moderate |
| Microsoft Edge for Android | CVE-2026-33119 | Microsoft Edge (Chromium-based) for Android spoofing vulnerability | Moderate |
| Microsoft Edge (Chromium-based) | CVE-2026-33118 | Microsoft Edge (Chromium-based) spoofing vulnerability | Low |
Statement
This advisory is only used to describe a potential risk. NSFOCUS does not provide any commitment or promise on this advisory. NSFOCUS and the author will not bear any liability for any direct and/or indirect consequences and losses caused by transmitting and/or using this advisory. NSFOCUS reserves all the rights to modify and interpret this advisory. Please include this statement paragraph when reproducing or transferring this advisory. Do not modify this advisory, add/delete any information to/from it, or use this advisory for commercial purposes without permission from NSFOCUS.
About NSFOCUS
NSFOCUS, a pioneering leader in cybersecurity, is dedicated to safeguarding telecommunications, Internet service providers, hosting providers, and enterprises from sophisticated cyberattacks.
Founded in 2000, NSFOCUS operates globally with over 3000 employees at two headquarters in Beijing, China, and Santa Clara, CA, USA, and over 50 offices worldwide. It has a proven track record of protecting over 25% of the Fortune Global 500 companies, including four of the five largest banks and six of the world’s top ten telecommunications companies.
Leveraging technical prowess and innovation, NSFOCUS delivers a comprehensive suite of security solutions, including the Intelligent Security Operations Platform (ISOP) for modern SOC, DDoS Protection, Continuous Threat Exposure Management (CTEM) Service and Web Application and API Protection (WAAP). All the solutions and services are augmented by the Security Large Language Model (SecLLM), ML, patented algorithms and other cutting-edge research achievements developed by NSFOCUS.