Microsoft’s April 2026 Patch Tuesday Addresses 163 CVEs (CVE-2026-32201)
好的,我现在需要帮用户总结一篇关于微软4月补丁星期二的文章,控制在100字以内。首先,我得通读整篇文章,抓住主要信息。 文章提到微软修复了163个CVE漏洞,其中两个是零日漏洞。这两个零日漏洞分别是CVE-2026-32201和CVE-2026-33825,分别影响SharePoint和Microsoft Defender。还有其他几个关键漏洞,比如Windows Active Directory的远程代码执行漏洞CVE-2026-33826,以及Windows IKE服务的高危漏洞CVE-2026-33824。 另外,文章还提到微软修复了多个组件的漏洞,包括.NET、Azure、Office等,并且这次补丁发布是第二大规模的。用户可能关心这些漏洞的影响和修复建议。 现在需要将这些信息浓缩到100字以内。要突出关键点:修复的漏洞数量、零日漏洞的存在、涉及的重要组件以及建议尽快更新。 可能的结构是:微软发布4月补丁,修复163个漏洞,包括两个零日和多个高危问题,涉及SharePoint、Defender等组件,并建议用户及时更新。 检查一下是否在字数限制内,并且信息准确无误。 </think> 微软在4月的补丁星期二更新中修复了163个安全漏洞,其中包括两个被利用的零日漏洞。此次更新涵盖多个关键组件如SharePoint、Microsoft Defender和Windows Active Directory等,并包含多个高危远程代码执行和权限提升漏洞。建议用户尽快安装更新以缓解风险。 2026-4-14 17:52:8 Author: www.tenable.com(查看原文) 阅读量:7 收藏


April 14, 2026

6 Min Read


Tenable Research Special Operations blog header for the April 2026 Microsoft Patch Tuesday release covering zero-day vulnerabilities. The image features the Tenable logo, a gold hexagonal bandage icon representing patching, and bold text reading "Microsoft Patch Tuesday Zero Day Vulnerabilities, April 2026" against a white background framed by colorful diagonal stripes.

  1. 8Critical
  2. 154Important
  3. 1Moderate
  4. 0Low

Microsoft addresses 163 CVEs in the April 2026 Patch Tuesday release, including two zero-day vulnerabilities, one of which was exploited in the wild.

Microsoft patched 163 CVEs in its April 2026 Patch Tuesday release, with eight rated critical, 154 rated as important and one rated as moderate. This is the second largest Patch Tuesday release, nearing the record set by the October 2025 Patch Tuesday release with 167 CVEs. Our counts omitted two non-Microsoft CVEs from this month's release.

A pie chart showing the severity distribution across the Patch Tuesday CVEs patched in April 2026.

This month’s update includes patches for:

  • .NET
  • .NET and Visual Studio
  • .NET Framework
  • .NET,.NET Framework, Visual Studio
  • Applocker Filter Driver (applockerfltr.sys)
  • Azure Logic Apps
  • Azure Monitor Agent
  • Desktop Window Manager
  • Function Discovery Service (fdwsd.dll)
  • GitHub Copilot and Visual Studio Code
  • Microsoft Brokering File System
  • Microsoft Defender
  • Microsoft Dynamics 365 (on-premises)
  • Microsoft Edge (Chromium-based)
  • Microsoft Graphics Component
  • Microsoft High Performance Compute Pack (HPC)
  • Microsoft Management Console
  • Microsoft Office
  • Microsoft Office Excel
  • Microsoft Office PowerPoint
  • Microsoft Office SharePoint
  • Microsoft Office Word
  • Microsoft Power Apps
  • Microsoft PowerShell
  • Microsoft Windows
  • Microsoft Windows Search Component
  • Microsoft Windows Speech
  • Remote Desktop Client
  • Role: Windows Hyper-V
  • SQL Server
  • Universal Plug and Play (upnp.dll)
  • Windows Active Directory
  • Windows Admin Center
  • Windows Advanced Rasterization Platform
  • Windows Ancillary Function Driver for WinSock
  • Windows Biometric Service
  • Windows BitLocker
  • Windows Boot Loader
  • Windows Boot Manager
  • Windows Client Side Caching driver (csc.sys)
  • Windows Cloud Files Mini Filter Driver
  • Windows COM
  • Windows Common Log File System Driver
  • Windows Container Isolation FS Filter Driver
  • Windows Cryptographic Services
  • Windows Encrypting File System (EFS)
  • Windows File Explorer
  • Windows GDI
  • Windows Hello
  • Windows HTTP.sys
  • Windows IKE Extension
  • Windows Installer
  • Windows Kerberos
  • Windows Kernel
  • Windows Kernel Memory
  • Windows Local Security Authority Subsystem Service (LSASS)
  • Windows LUAFV
  • Windows Management Services
  • Windows OLE
  • Windows Print Spooler Components
  • Windows Projected File System
  • Windows Push Notifications
  • Windows Recovery Environment Agent
  • Windows Redirected Drive Buffering
  • Windows Remote Desktop
  • Windows Remote Desktop Licensing Service
  • Windows Remote Procedure Call
  • Windows RPC API
  • Windows Sensor Data Service
  • Windows Server Update Service
  • Windows Shell
  • Windows Snipping Tool
  • Windows Speech Brokered Api
  • Windows SSDP Service
  • Windows Storage Spaces Controller
  • Windows TCP/IP
  • Windows TDI Translation Driver (tdx.sys)
  • Windows Universal Plug and Play (UPnP) Device Host
  • Windows USB Print Driver
  • Windows User Interface Core
  • Windows Virtualization-Based Security (VBS) Enclave
  • Windows WalletService
  • Windows WFP NDIS Lightweight Filter Driver (wfplwfs.sys)
  • Windows Win32K - GRFX
  • Windows Win32K - ICOMP

A bar chart showing the count by impact of CVEs patched in the April 2026 Patch Tuesday release.

Elevation of privilege (EoP) vulnerabilities accounted for 57.1% of the vulnerabilities patched this month, followed by information disclosure vulnerabilities and remote code execution (RCE) vulnerabilities at 12.3% each.

CVE-2026-20945 and CVE-2026-32201 | Microsoft SharePoint Server Spoofing Vulnerability

CVE-2026-20945 and CVE-2026-32201 are spoofing vulnerabilities affecting Microsoft SharePoint. CVE-2026-20945 received a CVSSv3 score of 4.6, while CVE-2026-32201 received a score of 6.5. According to Microsoft, CVE-2026-32201 was exploited in the wild as a zero-day. Microsoft has released updates for SharePoint 2016, 2019 and SharePoint Server Subscription Edition to address these flaws.

CVE-2026-33825 | Microsoft Defender Elevation of Privilege Vulnerability

CVE-2026-33825 is an EoP vulnerability in Microsoft Defender. It received a CVSSv3 score of 7.8 and was rated important. According to Microsoft, this flaw was publicly disclosed prior to a patch being made available. While Microsoft’s advisory made no mention of public exploit code, the description appears to match a zero-day exploit, known as BlueHammer, with code posted to GitHub on April 3rd. A researcher using the alias "Chaotic Eclipse" released the exploit and expressed concern about Microsoft’s handling of the vulnerability disclosure process.

CVE-2026-33826 | Windows Active Directory Remote Code Execution Vulnerability

CVE-2026-33826 is a RCE vulnerability affecting Windows Active Directory. It received a CVSSv3 score of 8, was rated as critical and was assessed as “Exploitation More Likely” according to Microsoft’s Exploitability Index. Successful exploitation requires an authenticated attacker to send a specially crafted RPC call to a vulnerable RPC host, resulting in code execution with the same permissions as the RPC host. Despite the exploitation assessment and severity, the Microsoft advisory does note that an attacker would need to be in the “same restricted Active Directory domain as the target system” in order to exploit this flaw.

CVE-2026-33824 | Windows Internet Key Exchange (IKE) Service Extensions Remote Code Execution Vulnerability

CVE-2026-33824 is a RCE affecting Windows Internet Key Exchange (IKE) Service Extensions. It received a CVSSv3 score of 9.8 and was rated as critical. This vulnerability can be exploited by an unauthenticated attacker by sending crafted packets to a target with IKE version 2 enabled. Microsoft’s advisory includes some mitigations that can be applied in the event immediate patching cannot be performed. This includes firewall rules for UDP ports 500 and 4500.

CVE-2026-27913 | Windows BitLocker Security Feature Bypass Vulnerability

CVE-2026-27913 is a security feature bypass vulnerability affecting Windows BitLocker. It received a CVSSv3 score of 7.7 and was rated as important. Successful exploitation could allow an attacker to bypass Secure Boot, a UEFI firmware security feature used to allow only trusted and properly signed software runs during the startup process. While there’s no known exploitation of this vulnerability as of the time this blog was published, Microsoft assesses this vulnerability as “Exploitation More Likely.”

CVE-2026-26151 | Remote Desktop Spoofing Vulnerability

CVE-2026-26151 is a spoofing vulnerability in Remote Desktop. It was assigned a CVSS v3 score of 7.1 and rated important. Microsoft assesses this vulnerability as more likely to be exploited. An attacker could exploit this vulnerability by convincing a target to open a crafted file. This vulnerability was credited to the United Kingdom's National Cyber Security Centre (NCSC).

Previously, users would not receive any warning when attempting to open a Remote Desktop Protocol (RDP) file. However, starting with the April 2026 Security Update, users will now receive more sufficient warning dialogues when interacting with potentially malicious RDP files. For more information, visit this link.

Tenable Solutions

A list of all the plugins released for Microsoft’s April 2026 Patch Tuesday update can be found here. As always, we recommend patching systems as soon as possible and regularly scanning your environment to identify those systems yet to be patched.

For more specific guidance on best practices for vulnerability assessments, please refer to our blog post on How to Perform Efficient Vulnerability Assessments with Tenable.

Get more information

Join Tenable's Research Special Operations (RSO) Team on Tenable Connect for further discussions on the latest cyber threats.

Learn more about Tenable One, the Exposure Management Platform for the modern attack surface.


Research Special Operations

Research Special Operations

The Research Special Operations (RSO) team serves as Tenable’s Forward Logistics Element in the threat landscape, providing customers with the analyses and contextualized exposure intelligence required to manage risks to critical business assets. With over 150 years of collective expertise, this hand-picked group of world-class security researchers is united with one mission: to cut through the noise and deliver critical intelligence about the most dangerous cyber threats emerging right now. Uniting the missions of the Tenable Security Response, Zero-Day Research, and Decision Science Operations teams, RSO disseminates timely, accurate, and actionable information about the latest threats and exposures.

  • Exposure Management
  • Vulnerability Scanning

Cybersecurity news you can use

Enter your email and never miss timely alerts and security guidance from the experts at Tenable.

Tenable Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy.

Your Tenable Vulnerability Management trial also includes Tenable Web App Scanning.

Tenable Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

100 assets

Choose your subscription option:

Thank You

Thank you for your interest in Tenable Vulnerability Management. A representative will be in touch soon.

Tenable Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy.

Your Tenable Vulnerability Management trial also includes Tenable Web App Scanning.

Tenable Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

100 assets

Choose your subscription option:

Thank you

Thank you for your interest in Tenable Vulnerability Management. A representative will be in touch soon.

Tenable Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy.

Your Tenable Vulnerability Management trial also includes Tenable Web App Scanning.

Tenable Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

100 assets

Choose your subscription option:

Thank you

Thank you for your interest in Tenable Vulnerability Management. A representative will be in touch soon.

Try Tenable Web App Scanning

Enjoy full access to our latest web application scanning offering designed for modern applications as part of the Tenable One Exposure Management platform. Safely scan your entire online portfolio for vulnerabilities with a high degree of accuracy without heavy manual effort or disruption to critical web applications. Sign up now.

Your Tenable Web App Scanning trial also includes Tenable Vulnerability Management.

Buy Tenable Web App Scanning

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

Request a demo

Tenable Security Center


Identify and prioritize vulnerabilities based on risk to your business. Managed on premises.

Thank You

Thank you for your interest in Tenable Security Center. A representative will be in touch soon.

Request a demo

Tenable OT Security


Close OT exposure with the unified security solution for converged OT/IT environments.

Thank You

Thank you for your interest in Tenable OT Security. A representative will be in touch soon.

Request a demo

Tenable Identity Exposure


Close identity exposure with the essential solution for the identity-intelligent enterprise.

Thank You

Thank you for your interest in Tenable Identity Exposure. A representative will be in touch soon.

Request a demo

Tenable Cloud Security


Close cloud exposure with the actionable cloud security platform.

Thank You

Thank you for your interest in Tenable Cloud Security. A representative will be in touch soon.

Request a demo

Tenable One


The world’s leading AI-powered exposure management platform.

Thank You

Thank you for your interest in Tenable One. A representative will be in touch soon.

Request a demo

Tenable AI Exposure


See, secure, and manage how your teams use AI platforms.

Thank You

Thank you for your interest in Tenable AI Exposure. A representative will be in touch soon.

Request a demo

Tenable Attack Surface Management


Gain visibility into your internet-connected assets to eliminate blind spots and unknown sources of risk.

Thank You

Thank you for your interest in Tenable Attack Surface Management. A representative will be in touch soon.

Request a demo

Tenable Enclave Security


Know, expose and close IT and container vulnerabilities.

Thank You

Thank you for your interest in Tenable Enclave Security. A representative will be in touch soon.

Try Tenable Nessus Professional free

Tenable Nessus is the most comprehensive vulnerability scanner on the market today.

Fill out the form below to continue with a Nessus Pro trial.

Buy Tenable Nessus Professional

Tenable Nessus is the most comprehensive vulnerability scanner on the market today. Tenable Nessus Professional will help automate the vulnerability scanning process, save time in your compliance cycles and allow you to engage your IT team.

Buy a multi-year license and save. Add Advanced Support for access to phone, community and chat support 24 hours a day, 365 days a year.

Try Tenable Nessus Professional free

Tenable Nessus is the most comprehensive vulnerability scanner on the market today.

Fill out the form below to continue with a Nessus Pro trial.

Buy Nessus Pro

Adopt the gold standard in vulnerability assessment to find and fix security gaps across your IT environment.



Renew a license Find a reseller or distributor

  • Real-time vulnerability updates
  • Unlimited vulnerability scanning
  • Pre-built policies for configuration & compliance audits
  • Vulnerability scoring for prioritization
  • Configurable reports
  • Flexible deployment
Choose multi-year license and save

Save
with 2 years


$9,330.95*


Buy now

Save
with 3 years


$13,637.54*


Buy now

With Advanced Support for Nessus Pro, your teams will have access to phone, Community, and chat support 24 hours a day, 365 days a year. This advanced level of technical support helps to ensure faster response times and resolution to your questions and issues.

Advanced Support Plan Features

Phone Support

Phone support 24 hours a day, 365 days a year, available for up to ten (10) named support contacts.

Chat Support

Chat support available to named support contacts, accessible via the Tenable Community is available 24 hours a day, 365 days a year.

Tenable Community Support Portal

All named support contacts can open support cases within the Tenable Community. Users can also access the Knowledge Base, documentation, license information, technical support numbers, etc.; utilize live chat, ask questions to the Community, and learn about tips and tricks from other Community members.

Initial Response Time

P1-Critical: < 2 hr
P2-High: < 4 hr
P3-Medium: < 12 hr
P4-Informational: < 24 hr

Support Contacts

Support contacts must be reasonably proficient in the use of information technology, the software they have purchased from Tenable, and familiar with the customer resources that are monitored by means of the software. Support contacts must speak English and conduct support requests in English. Support contacts must provide information reasonably requested by Tenable for the purpose of reproducing any Error or otherwise resolving a support request.

Try Tenable Nessus Expert free

Built for the modern attack surface, Nessus Expert enables you to see more and protect your organization from vulnerabilities from IT to the cloud.

Already have Tenable Nessus Professional?
Upgrade to Nessus Expert free for 7 days.

Buy Tenable Nessus Expert

Built for the modern attack surface, Nessus Expert enables you to see more and protect your organization from vulnerabilities from IT to the cloud.

Try Tenable Nessus Expert free

Built for the modern attack surface, Nessus Expert enables you to see more and protect your organization from vulnerabilities from IT to the cloud.

Already have Tenable Nessus Professional?
Upgrade to Nessus Expert free for 7 days.

Buy Nessus Expert

Expand your vulnerability assessment with advanced functionality that includes web app scanning and external attack surface discovery scanning.



Renew a license Find a reseller or distributor

  • Real-time vulnerability updates
  • Unlimited vulnerability scanning
  • Web app scanning (5 FQDNs)
  • External attack surface discovery scanning (5 domains)
  • Pre-built policies for configuration & compliance audits
  • Vulnerability scoring for prioritization
  • Configurable reports
  • Flexible deployment
Choose multi-year license and save

Save
with 2 years


$13,208.13*


Buy now

Save
with 3 years


$19,304.19*


Buy now

With Advanced Support for Nessus Pro, your teams will have access to phone, Community, and chat support 24 hours a day, 365 days a year. This advanced level of technical support helps to ensure faster response times and resolution to your questions and issues.

Advanced Support Plan Features

Phone Support

Phone support 24 hours a day, 365 days a year, available for up to ten (10) named support contacts.

Chat Support

Chat support available to named support contacts, accessible via the Tenable Community is available 24 hours a day, 365 days a year.

Tenable Community Support Portal

All named support contacts can open support cases within the Tenable Community. Users can also access the Knowledge Base, documentation, license information, technical support numbers, etc.; utilize live chat, ask questions to the Community, and learn about tips and tricks from other Community members.

Initial Response Time

P1-Critical: < 2 hr
P2-High: < 4 hr
P3-Medium: < 12 hr
P4-Informational: < 24 hr

Support Contacts

Support contacts must be reasonably proficient in the use of information technology, the software they have purchased from Tenable, and familiar with the customer resources that are monitored by means of the software. Support contacts must speak English and conduct support requests in English. Support contacts must provide information reasonably requested by Tenable for the purpose of reproducing any Error or otherwise resolving a support request.

Learn How Tenable Helps Achieve SLCGP Cybersecurity Plan Requirements

Tenable solutions help fulfill all SLCGP requirements. Connect with a Tenable representative to learn more.

Request a demo

Tenable Patch Management


Streamline security and IT collaboration and shorten the mean time to remediate with automation.

Thank You

Thank you for your interest in Tenable Patch Management. A representative will be in touch soon.


文章来源: https://www.tenable.com/blog/microsofts-april-2026-patch-tuesday-addresses-163-cves-cve-2026-32201
如有侵权请联系:admin#unsafe.sh