Three Microsoft Defender Zero-Days Actively Exploited; Two Still Unpatched
好的,我现在需要帮用户总结这篇文章的内容,控制在100字以内。首先,我得仔细阅读文章,理解主要信息。 文章主要讲的是Huntress警告威胁行为者正在利用微软Defender的三个安全漏洞:BlueHammer、RedSun和UnDefend。这些漏洞都是零日漏洞,由一个叫做Chaotic Eclipse的研究人员披露的。BlueHammer已经被微软修复,但另外两个还没有补丁。Huntress观察到这些漏洞在野外被利用,特别是BlueHammer从4月10日开始被武器化使用。攻击者通过一些枚举命令进行手动操作,Huntress已经采取措施隔离受影响的组织。 接下来,我需要将这些信息浓缩到100字以内。重点包括:三个漏洞、微软Defender、零日漏洞、BlueHammer已修复、其他未修复、野外利用情况、攻击手法和应对措施。 然后,我要确保语言简洁明了,避免使用复杂的术语,同时保持信息的完整性。可能的结构是:威胁行为者利用三个漏洞攻击微软Defender,其中两个未修复,已在野外使用。 最后,检查字数是否符合要求,并确保没有遗漏关键信息。 </think> 威胁行为者正在利用微软 Defender 的三个安全漏洞(BlueHammer、RedSun 和 UnDefend)进行攻击。其中 BlueHammer 已被修复,另两个尚未有补丁。这些零日漏洞已被用于野外攻击,可能导致权限提升或服务中断。 2026-4-17 13:21:0 Author: thehackernews.com(查看原文) 阅读量:19 收藏

Vulnerability / Endpoint Security

Huntress is warning that threat actors are exploiting three recently disclosed security flaws in Microsoft Defender to gain elevated privileges in compromised systems.

The activity involves the exploitation of three vulnerabilities that are codenamed BlueHammer (requires GitHub sign-in), RedSun, and UnDefend, all of which were released as zero-days by a researcher known as Chaotic Eclipse (aka Nightmare-Eclipse) in response to Microsoft's handling of the vulnerability disclosure process.

While both BlueHammer and RedSun are local privilege escalation (LPE) flaws impacting Microsoft Defender, UnDefend can be used to trigger a denial-of-service (DoS) condition and effectively block definition updates.

Microsoft moved to address BlueHammer as part of its Patch Tuesday updates released earlier this week. The vulnerability is being tracked under the CVE identifier CVE-2026-33825. However, the other flaws do not have a fix as of writing.

In a series of posts shared on X, Huntress said it observed all three flaws being exploited in the wild, with BlueHammer being weaponized since April 10, 2026, followed by the use of RedSun and UnDefend proof-of-concept (PoC) exploits on April 16.

"These invocations followed after typical enumeration commands: whoami /priv, cmdkey /list, net group, and others that indicate hands-on-keyboard threat actor activity," it added.

The cybersecurity vendor said it has taken steps to isolate the affected organization to prevent further post-exploitation. The Hacker News has reached out to Microsoft for comment, and we will update the story if we hear back.

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


文章来源: https://thehackernews.com/2026/04/three-microsoft-defender-zero-days.html
如有侵权请联系:admin#unsafe.sh