Patch Tuesday, April 2026 Edition
好的,我现在需要帮用户总结一篇文章的内容,控制在100字以内。用户的要求是直接写文章描述,不需要开头。首先,我得通读整篇文章,抓住主要信息。 文章主要讲的是微软、谷歌和Adobe在4月的补丁星期二发布了安全更新。微软修复了167个漏洞,包括SharePoint Server的零日漏洞和Windows Defender的BlueHammer问题。攻击者已经在利用SharePoint的漏洞CVE-2026-32201进行网络钓鱼和数据操控。另外,SQL Server也有远程代码执行漏洞。谷歌修复了Chrome的第四个零日漏洞,Adobe紧急更新了Reader的一个高危漏洞。 接下来,我需要把这些信息浓缩到100字以内。要突出微软修复的漏洞数量、关键漏洞的影响、其他公司的更新情况以及安全建议。同时,语言要简洁明了,避免使用复杂的术语。 可能的结构是:微软修复了大量漏洞,包括零日和BlueHammer;攻击者正在利用SharePoint漏洞;谷歌和Adobe也发布了补丁;建议定期重启浏览器以应用更新。 这样组织起来应该符合用户的要求。 </think> 微软发布167个安全补丁修复Windows及软件漏洞,包括SharePoint Server零日漏洞CVE-2026-32201和Windows Defender的BlueHammer(CVE-2026-33825)。攻击者已利用SharePoint漏洞进行网络钓鱼和社会工程攻击。谷歌Chrome修复第四个零日漏洞,Adobe Reader紧急更新高危远程代码执行漏洞。专家称AI能力提升推动漏洞披露增加,建议定期重启浏览器以确保更新应用。 2026-4-14 21:47:59 Author: krebsonsecurity.com(查看原文) 阅读量:13 收藏

Microsoft today pushed software updates to fix a staggering 167 security vulnerabilities in its Windows operating systems and related software, including a SharePoint Server zero-day and a publicly disclosed weakness in Windows Defender dubbed “BlueHammer.” Separately, Google Chrome fixed its fourth zero-day of 2026, and an emergency update for Adobe Reader nixes an actively exploited flaw that can lead to remote code execution.

A picture of a windows laptop in its updating stage, saying do not turn off the computer.

Redmond warns that attackers are already targeting CVE-2026-32201, a vulnerability in Microsoft SharePoint Server that allows attackers to spoof trusted content or interfaces over a network.

Mike Walters, president and co-founder of Action1, said CVE-2026-32201 can be used to deceive employees, partners, or customers by presenting falsified information within trusted SharePoint environments.

“This CVE can enable phishing attacks, unauthorized data manipulation, or social engineering campaigns that lead to further compromise,” Walters said. “The presence of active exploitation significantly increases organizational risk.”

This flaw drops alongside a separate SQL Server remote code execution vulnerability (CVE-2026-33120), notes Ryan Braunstein, manager of Security and IT at Automox.

“One bug allows an attacker to get into your SQL instance from the network,” Braundstein said. “The other lets someone already inside promote themselves to full control.”

Microsoft also addressed BlueHammer (CVE-2026-33825), a privilege escalation bug in Windows Defender. According to BleepingComputer, the researcher who discovered the flaw published exploit code for it after notifying Microsoft and growing exasperated with their response. Will Dormann, senior principal vulnerability analyst at Tharros, says he confirmed that the public BlueHammer exploit code no longer works after installing today’s patches.

Satnam Narang, senior staff research engineer at Tenable, said April marks the second-biggest Patch Tuesday ever for Microsoft. Narang also said there are indications that a zero-day flaw Adobe patched in an emergency update on April 11 — CVE-2026-34621 — has seen active exploitation since at least November 2025.

Adam Barnett, lead software engineer at Rapid7, called the patch total from Microsoft today “a new record in that category” because it includes nearly 60 browser vulnerabilities. Barnett said it might be tempting to imagine that this sudden spike was tied to the buzz around the announcement a week ago today of Project Glasswing — a much-hyped but still unreleased new AI capability from Anthropic that is reportedly quite good at finding bugs in a vast array of software.

But he notes that Microsoft Edge is based on the Chromium engine, and the Chromium maintainers acknowledge a wide range of researchers for the vulnerabilities which Microsoft republished last Friday.

“A safe conclusion is that this increase in volume is driven by ever-expanding AI capabilities,” Barnett said. “We should expect to see further increases in vulnerability reporting volume as the impact of AI models extend further, both in terms of capability and availability.”

Finally, no matter what browser you use to surf the web, it’s important to completely close out and restart the browser periodically. This is really easy to put off (especially if you have a bajillion tabs open at any time) but it’s the only way to ensure that any available updates get installed. For example, a Google Chrome update released earlier this month fixed 21 security holes, including the high-severity zero-day flaw CVE-2026-5281.

For a clickable, per-patch breakdown, check out the SANS Internet Storm Center Patch Tuesday roundup. Running into problems applying any of these updates? Leave a note about it in the comments below and there’s a decent chance someone here will pipe in with a solution.


文章来源: https://krebsonsecurity.com/2026/04/patch-tuesday-april-2026-edition/
如有侵权请联系:admin#unsafe.sh