Microsoft’s April Security Update of High-Risk Vulnerability Notice for Multiple Products
嗯,用户让我帮忙总结一篇文章的内容,控制在100个字以内,而且不需要用“文章内容总结”之类的开头。首先,我需要理解这篇文章的主要内容。 看起来这篇文章是关于微软4月份的安全更新,修复了165个安全问题,涉及多个产品,包括Windows、Office、SQL Server等等。其中有8个关键漏洞和一些已经被利用的漏洞。微软发布了补丁,建议用户尽快安装。 接下来,我需要将这些信息浓缩到100字以内。要抓住重点:微软发布4月安全更新,修复165个漏洞,包括高危类型如权限提升和远程代码执行。其中有8个关键漏洞和一些已被利用的情况。建议用户及时安装补丁。 然后检查字数是否在限制内,并且确保语言简洁明了。可能还需要调整句子结构以节省字数。 最后,确保没有使用任何开头语句,直接描述文章内容。 </think> 微软4月安全更新修复了165个漏洞,涉及Windows、Office等产品,包含8个关键漏洞及部分已被利用的高危漏洞。建议用户尽快安装补丁以降低风险。 2026-4-24 08:33:43 Author: securityboulevard.com(查看原文) 阅读量:15 收藏

Overview

On April 15, NSFOCUS CERT detected that Microsoft released the April Security Update patch, fixing 165 security issues involving Windows, Microsoft Office, Microsoft SQL Server, Microsoft Visual Studio, Microsoft .NET Framework, Widely used products such as Azure, including high-risk vulnerability types such as privilege escalation and remote code execution.

Among the vulnerabilities fixed by Microsoft’s monthly update this month, there are 8 critical vulnerabilities, 154 important vulnerabilities, 2 moderate vulnerabilities, and 1 low-risk (Low) vulnerability. These include 1 vulnerability that has been detected for wild exploitation:

Microsoft SharePoint Server Spoofing Vulnerability (CVE-2026-32201)

Please update the patch as soon as possible for protection. For a complete list of vulnerabilities, please refer to the appendix.

Reference link: https://msrc.microsoft.com/update-guide/releaseNote/2026-Apr

Key Vulnerabilities

Based on the product popularity and vulnerability importance, this update contains vulnerabilities with greater impact. Relevant users are requested to pay special attention:

Microsoft SharePoint Server Spoofing Vulnerability (CVE-2026-32201):

There is a spoofing vulnerability in Microsoft SharePoint Server. Due to improper input validation of SharePoint Server, unauthenticated attackers can conduct spoofing attacks through the network to view some sensitive information and tamper with publicly available information. The vulnerability is exploited in the wild and has a CVSS score of 9.0.

Official announcement link: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32201

Windows Kerberos Privilege Escalation Vulnerability (CVE-2026-27912):

There is a privilege escalation vulnerability in Windows Kerberos. Due to improper authorization during the verification process of the Kerberos service ticket request, an authenticated attacker can bypass security checks by manipulating the Kerberos ticket field and elevate privileges on adjacent networks, possibly gaining domain administrator privileges. CVSS score 8.0.

Official announcement link: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27912

Remote Desktop Client remote code execution vulnerability (CVE-2026-32157):

A remote code execution vulnerability exists in the Remote Desktop Client. Due to the Use After Free problem when processing RDP connection parameters, an unauthenticated attacker can execute arbitrary code on the client host by tricking users into connecting to a malicious RDP server. CVSS score 8.8.

Official announcement link: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32157

Windows TCP/IP Remote Code Execution Vulnerability (CVE-2026-33827):

A remote code execution vulnerability exists in Windows TCP/IP. Due to improper synchronization mechanism when using shared resources in Windows TCP/IP, an unauthenticated attacker can exploit this vulnerability over the network to execute arbitrary code. CVSS score 8.1.

Official announcement link: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33827

Windows Shell Security Function Bypass Vulnerability (CVE-2026-32225):

There is a security feature bypass vulnerability in Windows Shell. Due to the failure of the protection mechanism in Windows Shell, an unauthenticated attacker can bypass SmartScreen security protection by tricking the victim into opening a specially crafted .lnk file, resulting in unauthorized operation or access. CVSS score 8.8.

Official announcement link: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32225

Windows Internet Key Exchange (IKE) Service Extensions Remote Code Execution Vulnerability (CVE-2026-33824):

A remote code execution vulnerability exists in Windows Internet Key Exchange (IKE) Service Extensions, which allows an unauthenticated attacker to send specially crafted packets to IKEv2 enabled Windows systems due to a Double Free issue in the Windows IKE extension. Thereby enabling remote code execution. CVSS score 9.8.

Official announcement link: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33824

Microsoft Defender Privilege Escalation Vulnerability (CVE-2026-33825):

There is a privilege escalation vulnerability in Microsoft Defender. Due to insufficient access control granularity in Microsoft Defender, an authenticated local attacker can elevate privileges to SYSTEM. CVSS score 7.8.

Official announcement link: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33825

Windows Active Directory Remote Code Execution Vulnerability (CVE-2026-33826):

A remote code execution vulnerability exists in Windows Active Directory. Due to improper input validation in Windows Active Directory, an authenticated attacker can send a specially crafted RPC call to the RPC host through an adjacent network to achieve remote code execution. CVSS score 8.0.

Official announcement link: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33826

Scope of Impact

The following are the affected product versions of some key vulnerabilities. For the scope of products affected by other vulnerabilities, please refer to the official announcement link.

Vulnerability Number Affected product versions
CVE-2026-32201 Microsoft SharePoint Server Subscription Edition
Microsoft SharePoint Enterprise Server 2016
Microsoft SharePoint Server 2019
CVE-2026-27912 Windows Server 2012 R2 (Server Core installation)
Windows Server 2012 R2
Windows Server 2012 (Server Core installation) Windows Server 2012
Windows Server 2016 (Server Core installation)
Windows Server 2016
Windows Server 2025
Windows Server 2022, 23H2 Edition (Server Core installation)
Windows Server 2025 (Server Core installation)
Windows Server 2022 (Server Core installation)
Windows Server 2022
Windows Server 2019 (Server Core installation)
Windows Server 2019
CVE-2026-32157 Windows Server 2012 R2 (Server Core installation)
Windows Server 2012 R2
Windows Server 2012 (Server Core installation)
Windows Server 2012
Windows Server 2016 (Server Core installation)
Windows Server 2016
Windows 10 Version 1607 for x64-based Systems
Windows 10 Version 1607 for 32-bit Systems
Windows Server 2025
Windows 11 Version 24H2 for x64-based Systems
Windows 11 Version 24H2 for ARM64-based Systems
Windows Server 2022, 23H2 Edition (Server Core installation)
Windows 11 Version 23H2 for x64-based Systems
Windows 11 Version 23H2 for ARM64-based Systems
Windows 11 Version 25H2 for x64-based Systems
Windows 11 Version 25H2 for ARM systems
Windows Server 2025 (Server Core installation)
Windows 10 Version 22H2 for 32-bit Systems
Windows 10 Version 22H2 for ARM64-based Systems
Windows 10 Version 22H2 for x64-based Systems
Windows 10 Version 21H2 for x64-based Systems
Windows 10 Version 21H2 for ARM64-based Systems
Windows 10 Version 21H2 for 32-bit Systems
Windows Server 2022 (Server Core installation)
Windows Server 2022 Remote Desktop client for Windows Desktop
Windows Server 2019 (Server Core installation)
Windows Server 2019
Windows 10 Version 1809 for x64-based Systems
Windows 10 Version 1809 for 32-bit Systems
Windows App Client for Windows Desktop
Windows 11 version 26H1 for x64-based Systems
Windows 11 Version 26H1 for ARM64-based Systems
CVE-2026-33827 CVE-2026-32225 Windows 10 Version 22H2 for ARM64-based Systems
Windows 10 Version 22H2 for x64-based Systems
Windows 10 Version 21H2 for x64-based Systems
Windows 10 Version 21H2 for ARM64-based Systems
Windows 10 Version 21H2 for 32-bit Systems
Windows Server 2022 (Server Core installation)
Windows Server 2022
Windows Server 2019 (Server Core installation) Windows Server 2019
Windows 10 Version 1809 for x64-based Systems
Windows 10 Version 1809 for 32-bit Systems
Windows Server 2025 (Server Core installation)
Windows 10 Version 22H2 for 32-bit Systems
Windows Server 2012 R2 (Server Core installation)
Windows Server 2012 R2
Windows Server 2012 (Server Core installation)
Windows Server 2012
Windows Server 2016 (Server Core installation)
Windows Server 2016
Windows 10 Version 1607 for x64-based Systems
Windows 10 Version 1607 for 32-bit Systems
Windows 11 Version 26H1 for ARM64-based Systems
Windows 11 version 26H1 for x64-based Systems
Windows Server 2025
Windows 11 Version 24H2 for x64-based Systems
Windows 11 Version 24H2 for ARM64-based Systems
Windows Server 2022, 23H2 Edition (Server Core installation)
Windows 11 Version 23H2 for x64-based Systems
Windows 11 Version 23H2 for ARM64-based Systems
Windows 11 Version 25H2 for x64-based Systems
Windows 11 Version 25H2 for ARM systems
CVE-2026-33824 Windows Server 2016 (Server Core installation)
Windows Server 2016
Windows 10 Version 1607 for x64-based Systems
Windows 10 Version 1607 for 32-bit Systems
Windows 11 Version 26H1 for ARM64-based Systems
Windows 11 version 26H1 for x64-based Systems
Windows Server 2025
Windows 11 Version 24H2 for x64-based Systems
Windows 11 Version 24H2 for ARM64-based Systems
Windows Server 2022, 23H2 Edition (Server Core installation)
Windows 11 Version 23H2 for x64-based Systems
Windows 11 Version 23H2 for ARM64-based Systems
Windows 11 Version 25H2 for x64-based Systems
Windows 11 Version 25H2 for ARM systems
Windows Server 2025 (Server Core installation)
Windows 10 Version 22H2 for 32-bit Systems
Windows 10 Version 22H2 for ARM64-based Systems
Windows 10 Version 22H2 for x64-based Systems
Windows 10 Version 21H2 for x64-based Systems
Windows 10 Version 21H2 for ARM64-based Systems
Windows 10 Version 21H2 for 32-bit Systems
Windows Server 2022 (Server Core installation)
Windows Server 2022
Windows Server 2019 (Server Core installation) Windows Server 2019
Windows 10 Version 1809 for x64-based Systems
Windows 10 Version 1809 for 32-bit Systems
CVE-2026-33825 Microsoft Defender Antimalware Platform
CVE-2026-33826 Windows Server 2012 R2 (Server Core installation)
Windows Server 2012 R2
Windows Server 2016 (Server Core installation)
Windows Server 2016
Windows Server 2025
Windows Server 2022, 23H2 Edition (Server Core installation)
Windows Server 2025 (Server Core installation)
Windows Server 2022 (Server Core installation)
Windows Server 2022
Windows Server 2019 (Server Core installation)
Windows Server 2019

Mitigation

At present, Microsoft has officially released security patches to fix the above vulnerabilities for supported product versions. It is strongly recommended that affected users install patches as soon as possible for protection. The official download link: https://msrc.microsoft.com/update-guide/releaseNote/2026-Apr

Note: Patch updates for Windows Update may fail due to network problems, computer environment problems, etc. After installing the patch, users should check whether the patch has been successfully updated in time.

Right-click the Windows icon, select “Settings (N)”, select “Update and Security”-“Windows Update”, view the prompt information on this page, or click “View Update History” to view the historical update status.

For updates that have not been successfully installed, you can click the update name to jump to the Microsoft official download page. It is recommended that users click the link on this page and go to the “Microsoft Update Catalog” website to download the independent program package and install it.

Appendix: Vulnerability List

Affected products CVE No. Vulnerability Title Severity
Windows CVE-2026-32157 Remote Desktop Client remote code execution vulnerability Critical
Windows CVE-2026-33826 Windows Active Directory Remote Code Execution Vulnerability Critical
Microsoft .NET Framework CVE-2026-23666 .NET Framework Denial of Service Vulnerability Critical
Microsoft Office CVE-2026-32190 Microsoft Office Remote Code Execution Vulnerability Critical
Microsoft Office CVE-2026-33114 Microsoft Word remote code execution vulnerability Critical
Microsoft Office CVE-2026-33115 Microsoft Word remote code execution vulnerability Critical
Windows CVE-2026-33827 Windows TCP/IP Remote Code Execution Vulnerability Critical
Windows CVE-2026-33824 Windows Internet Key Exchange (IKE) Service Extensions Remote Code Execution Vulnerability Critical
Windows CVE-2026-20930 Windows Management Services Privilege Escalation Vulnerability Important
Microsoft Visual Studio Code CoPilot Chat Extension CVE-2026-23653 GitHub Copilot and Visual Studio Code Information Disclosure Vulnerability Important
Windows CVE-2026-25184 Applocker Filter Driver (applockerfltr.sys) Privilege Escalation Vulnerability Important
Microsoft Office CVE-2026-20945 Microsoft SharePoint Server Spoofing Vulnerability Important
Windows CVE-2026-23670 Windows Virtualization-Based Security (VBS) security feature bypass vulnerability Important
Microsoft Dynamics CVE-2026-26149 Microsoft Power Apps Security Feature Bypass Important
Windows CVE-2026-26151 Remote Desktop spoofing vulnerability Important
Windows CVE-2026-26154 Windows Server Update Service (WSUS) Tampering Vulnerability Important
Windows CVE-2026-26155 Microsoft Local Security Authority Subsystem Service information disclosure vulnerability Important
Windows CVE-2026-26160 Remote Desktop Licensing Service privilege escalation vulnerability Important
Windows CVE-2026-26161 Windows Sensor Data Service privilege escalation vulnerability Important
Windows CVE-2026-26162 Windows OLE privilege escalation vulnerability Important
Windows CVE-2026-26165 Windows Shell Privilege Escalation Vulnerability Important
Windows CVE-2026-26166 Windows Shell Privilege Escalation Vulnerability Important
Windows CVE-2026-26167 Windows Push Notifications privilege escalation vulnerability Important
Windows CVE-2026-26174 Windows Server Update Service (WSUS) Privilege Escalation Vulnerability Important
Windows CVE-2026-26175 Windows Boot Manager security feature bypass vulnerability Important
Windows CVE-2026-26179 Windows Kernel privilege escalation vulnerability Important
Windows CVE-2026-26180 Windows Kernel privilege escalation vulnerability Important
Windows CVE-2026-26181 Microsoft Brokering File System Privilege Escalation Vulnerability Important
Windows CVE-2026-26183 Remote Access Management service/API (RPC server) privilege escalation vulnerability Important
Windows CVE-2026-27906 Windows Hello security feature bypass vulnerability Important
Windows CVE-2026-27907 Windows Storage Spaces Controller privilege escalation vulnerability Important
Windows CVE-2026-27908 Windows TDI Translation Driver (tdx.sys) Privilege Escalation Vulnerability Important
Windows CVE-2026-27915 Windows UPnP Device Host privilege escalation vulnerability Important
Windows CVE-2026-27917 Windows WFP NDIS Lightweight Filter Driver (wfplwfs.sys) Privilege Escalation Vulnerability Important
Windows CVE-2026-27918 Windows Shell Privilege Escalation Vulnerability Important
Windows CVE-2026-27919 Windows UPnP Device Host privilege escalation vulnerability Important
Windows CVE-2026-27921 Windows TDI Translation Driver (tdx.sys) Privilege Escalation Vulnerability Important
Windows CVE-2026-27924 Desktop Window Manager Privilege Escalation Vulnerability Important
Windows CVE-2026-27926 Windows Cloud Files Mini Filter Driver privilege escalation vulnerability Important
Windows CVE-2026-27927 Windows Projected File System Privilege Escalation Vulnerability Important
Windows CVE-2026-27929 Windows LUA File Virtualization Filter Driver Escalation Vulnerability Important
Windows CVE-2026-27931 Windows GDI Information Disclosure Vulnerability Important
Windows CVE-2026-32071 Windows Local Security Authority Subsystem Service (LSASS) Denial of Service Vulnerability Important
Windows CVE-2026-32073 Windows Ancillary Function Driver for WinSock Privilege Escalation Vulnerability Important
Windows CVE-2026-32075 Windows UPnP Device Host privilege escalation vulnerability Important
Windows CVE-2026-32081 Package Catalog information leakage vulnerability Important
Windows CVE-2026-32082 Windows Simple Search and Discovery Protocol (SSDP) Service privilege escalation vulnerability Important
Windows CVE-2026-32083 Windows Simple Search and Discovery Protocol (SSDP) Service privilege escalation vulnerability Important
Windows CVE-2026-32085 Remote Procedure Call information leakage vulnerability Important
Windows CVE-2026-32087 Windows Function Discovery Service (fdwsd.dll) Privilege Escalation Vulnerability Important
Windows CVE-2026-32089 Windows Speech Brokered Api Privilege Escalation Vulnerability Important
Windows CVE-2026-32090 Windows Speech Brokered Api Privilege Escalation Vulnerability Important
Windows CVE-2026-32093 Windows Function Discovery Service (fdwsd.dll) Privilege Escalation Vulnerability Important
Windows CVE-2026-32152 Desktop Window Manager Privilege Escalation Vulnerability Important
Windows CVE-2026-32154 Desktop Window Manager Privilege Escalation Vulnerability Important
Windows CVE-2026-32156 Windows UPnP Device Host Remote Code Execution Vulnerability Important
Windows CVE-2026-32158 Windows Push Notifications privilege escalation vulnerability Important
Windows CVE-2026-32159 Windows Push Notifications privilege escalation vulnerability Important
Windows CVE-2026-32160 Windows Push Notifications privilege escalation vulnerability Important
Windows CVE-2026-0390 UEFI Secure Boot security feature bypass vulnerability Important
Windows CVE-2026-32165 Windows User Interface Core Privilege Escalation Vulnerability Important
Microsoft SQL Server CVE-2026-32167 SQL Server Privilege Escalation Vulnerability Important
Azure CVE-2026-32168 Azure Monitor Agent privilege escalation vulnerability Important
.NET 9.0 installed on Mac OS,
.NET 9.0 installed on Windows,
.NET 10.0 installed on Mac OS,
.NET 9.0 installed on Linux,
.NET,Microsoft Visual Studio,
.NET 10.0 installed on Windows,
.NET 8.0 installed on Windows,
.NET 8.0 installed on Mac OS,
.NET 10.0 installed on Linux,
.NET 8.0 installed on Linux
CVE-2026-32178 .NET Spoofing Vulnerability Important
Windows CVE-2026-32181 Connected User Experiences and Telemetry Service Denial of Service Vulnerability Important
Windows CVE-2026-32183 Windows Snipping Tool Remote Code Execution Vulnerability Important
Azure CVE-2026-32184 Microsoft High Performance Compute (HPC) Pack privilege escalation vulnerability Important
Microsoft Office CVE-2026-32188 Microsoft Excel Information Disclosure Vulnerability Important
Microsoft Office CVE-2026-32189 Microsoft Excel Remote Code Execution Vulnerability Important
Azure CVE-2026-32192 Azure Monitor Agent privilege escalation vulnerability Important
Windows CVE-2026-32195 Windows Kernel privilege escalation vulnerability Important
Windows CVE-2026-32202 Windows Shell Spoofing Vulnerability Important
Windows CVE-2026-32215 Windows Kernel Information Disclosure Vulnerability Important
Windows CVE-2026-32216 Windows Redirected Drive Buffering System Denial of Service Vulnerability Important
Windows CVE-2026-32217 Windows Kernel Information Disclosure Vulnerability Important
Windows CVE-2026-32218 Windows Kernel Information Disclosure Vulnerability Important
Windows CVE-2026-32219 Microsoft Brokering File System Privilege Escalation Vulnerability Important
Windows CVE-2026-32220 UEFI Secure Boot security feature bypass vulnerability Important
Windows CVE-2026-32221 Windows Graphics Component Remote Code Execution Vulnerability Important
Windows CVE-2026-32222 Windows Win32k Privilege Escalation Vulnerability Important
Windows CVE-2026-32223 Windows USB Printing Stack (usbprint.sys) Privilege Escalation Vulnerability Important
Windows CVE-2026-32224 Windows Server Update Service (WSUS) Privilege Escalation Vulnerability Important
Microsoft .NET Framework CVE-2026-32226 .NET Framework Denial of Service Vulnerability Important
Microsoft Office CVE-2026-33095 Microsoft Word remote code execution vulnerability Important
Windows CVE-2026-33096 HTTP.sys denial of service vulnerability Important
Windows CVE-2026-33098 Windows Container Isolation FS Filter Driver Escalation Vulnerability Important
.NET 9.0 installed on Mac OS,
.NET 9.0 installed on Windows,
Microsoft .NET Framework,
.NET 10.0 installed on Mac OS,
.NET 9.0 installed on Linux,
.NET,.NET 8.0 installed on Windows,
.NET 8.0 installed on Mac OS,
.NET 10.0 installed on Linux,
.NET 8.0 installed on Linux
CVE-2026-33116 .NET, .NET Framework, and Visual Studio Denial of Service Vulnerability Important
Microsoft SQL Server CVE-2026-33120 Microsoft SQL Server Remote Code Execution Vulnerability Important
Microsoft Office CVE-2026-33822 Microsoft Word Information Disclosure Vulnerability Important
Windows CVE-2026-32212 Universal Plug and Play (upnp.dll) information disclosure vulnerability Important
Windows CVE-2026-20928 Windows Recovery Environment Security Function Bypass Vulnerability Important
Windows CVE-2026-20806 Windows COM Server Information Disclosure Vulnerability Important
Microsoft Office CVE-2026-23657 Microsoft Word remote code execution vulnerability Important
PowerShell CVE-2026-26143 Microsoft PowerShell security feature bypass vulnerability Important
Windows CVE-2026-26152 Microsoft Cryptographic Services privilege escalation vulnerability Important
Windows CVE-2026-26153 Windows Encrypted File System (EFS) Privilege Escalation Vulnerability Important
Windows CVE-2026-26156 Windows Hyper-V remote code execution vulnerability Important
Windows CVE-2026-26159 Remote Desktop Licensing Service privilege escalation vulnerability Important
Windows CVE-2026-26163 Windows Kernel privilege escalation vulnerability Important
Windows CVE-2026-26168 Windows Ancillary Function Driver for WinSock Privilege Escalation Vulnerability Important
Windows CVE-2026-26169 Windows Kernel Memory Information Disclosure Vulnerability Important
Windows CVE-2026-26170 PowerShell privilege escalation vulnerability Important
Windows CVE-2026-26172 Windows Push Notifications privilege escalation vulnerability Important
Windows CVE-2026-26173 Windows Ancillary Function Driver for WinSock Privilege Escalation Vulnerability Important
Windows CVE-2026-26176 Windows Client Side Caching driver (csc.sys) Privilege Escalation Vulnerability Important
Windows CVE-2026-26177 Windows Ancillary Function Driver for WinSock Privilege Escalation Vulnerability Important
Windows CVE-2026-26178 Windows Advanced Rasterization Platform Privilege Escalation Vulnerability Important
Windows CVE-2026-26182 Windows Ancillary Function Driver for WinSock Privilege Escalation Vulnerability Important
Windows CVE-2026-26184 Windows Projected File System Privilege Escalation Vulnerability Important
Windows CVE-2026-27909 Windows Search Service privilege escalation vulnerability Important
Windows CVE-2026-27910 Windows Installer privilege escalation vulnerability Important
Windows CVE-2026-27911 Windows User Interface Core Privilege Escalation Vulnerability Important
Windows CVE-2026-27912 Windows Kerberos privilege escalation vulnerability Important
Windows CVE-2026-27913 Windows BitLocker security feature bypass vulnerability Important
Windows CVE-2026-27914 Microsoft Management Console Privilege Escalation Vulnerability Important
Windows CVE-2026-27916 Windows UPnP Device Host privilege escalation vulnerability Important
Windows CVE-2026-27920 Windows UPnP Device Host privilege escalation vulnerability Important
Windows CVE-2026-27922 Windows Ancillary Function Driver for WinSock Privilege Escalation Vulnerability Important
Windows CVE-2026-27923 Desktop Window Manager Privilege Escalation Vulnerability Important
Windows CVE-2026-27925 Windows UPnP Device Host information disclosure vulnerability Important
Windows CVE-2026-27928 Windows Hello security feature bypass vulnerability Important
Windows CVE-2026-27930 Windows GDI Information Disclosure Vulnerability Important
Windows CVE-2026-32068 Windows Simple Search and Discovery Protocol (SSDP) Service privilege escalation vulnerability Important
Windows CVE-2026-32069 Windows Projected File System Privilege Escalation Vulnerability Important
Windows CVE-2026-32070 Windows Common Log File System Driver Escalation Vulnerability Important
Windows CVE-2026-32072 Active Directory Spoofing Vulnerability Important
Windows CVE-2026-32074 Windows Projected File System Privilege Escalation Vulnerability Important
Windows CVE-2026-32076 Windows Storage Spaces Controller privilege escalation vulnerability Important
Windows CVE-2026-32077 Windows UPnP Device Host privilege escalation vulnerability Important
Windows CVE-2026-32078 Windows Projected File System Privilege Escalation Vulnerability Important
Windows CVE-2026-32079 Web Account Manager Information Disclosure Vulnerability Important
Windows CVE-2026-32080 Windows WalletService privilege escalation vulnerability Important
Windows CVE-2026-32084 Windows Print Spooler Information Disclosure Vulnerability Important
Windows CVE-2026-32086 Windows Function Discovery Service (fdwsd.dll) Privilege Escalation Vulnerability Important
Windows CVE-2026-32088 Windows Biometric Service security feature bypass vulnerability Important
Windows CVE-2026-32091 Microsoft Brokering File System Privilege Escalation Vulnerability Important
Windows CVE-2026-32149 Windows Hyper-V remote code execution vulnerability Important
Windows CVE-2026-32150 Windows Function Discovery Service (fdwsd.dll) Privilege Escalation Vulnerability Important
Windows CVE-2026-32151 Windows Shell Information Disclosure Vulnerability Important
Windows CVE-2026-32153 Windows Speech Runtime privilege escalation vulnerability Important
Windows CVE-2026-32155 Desktop Window Manager Privilege Escalation Vulnerability Important
Windows CVE-2026-32162 Windows COM Privilege Escalation Vulnerability Important
Windows CVE-2026-32163 Windows User Interface Core Privilege Escalation Vulnerability Important
Windows CVE-2026-32164 Windows User Interface Core Privilege Escalation Vulnerability Important
Azure CVE-2026-32171 Azure Logic Apps privilege escalation vulnerability Important
Microsoft SQL Server CVE-2026-32176 SQL Server Privilege Escalation Vulnerability Important
Windows CVE-2026-32196 Windows Admin Center Spoofing Vulnerability Important
Microsoft Office CVE-2026-32197 Microsoft Excel Remote Code Execution Vulnerability Important
Microsoft Office CVE-2026-32198 Microsoft Excel Remote Code Execution Vulnerability Important
Microsoft Office CVE-2026-32199 Microsoft Excel Remote Code Execution Vulnerability Important
Microsoft Office CVE-2026-32200 Microsoft PowerPoint remote code execution vulnerability Important
Microsoft Office CVE-2026-32201 Microsoft SharePoint Server Spoofing Vulnerability Important
.NET 9.0 installed on Mac OS,
.NET 9.0 installed on Windows,
.NET 10.0 installed on Mac OS,
.NET 9.0 installed on Linux,
.NET 10.0 installed on Windows,
.NET 8.0 installed on Windows,
.NET 8.0 installed on Mac OS,
.NET 10.0 installed on Linux,
.NET 8.0 installed on Linux
CVE-2026-26171 .NET Denial of Service Vulnerability Important
.NET 9.0 installed on Mac OS,
.NET 9.0 installed on Windows,
.NET 10.0 installed on Mac OS,
.NET 9.0 installed on Linux,
Microsoft Visual Studio,
.NET 10.0 installed on Windows,
.NET 8.0 installed on Windows,
.NET 8.0 installed on Mac OS,
.NET 10.0 installed on Linux,
.NET 8.0 installed on Linux
CVE-2026-32203 .NET and Visual Studio Denial of Service Vulnerability Important
Windows CVE-2026-32225 Windows Shell security feature bypass vulnerability Important
Windows CVE-2026-33099 Windows Ancillary Function Driver for WinSock Privilege Escalation Vulnerability Important
Windows CVE-2026-33100 Windows Ancillary Function Driver for WinSock Privilege Escalation Vulnerability Important
Windows CVE-2026-33101 Windows Print Spooler privilege escalation vulnerability Important
Microsoft Dynamics CVE-2026-33103 Microsoft Dynamics 365 (On-Premises) information disclosure vulnerability Important
Windows CVE-2026-33104 Win32k Privilege Escalation Vulnerability Important
Windows CVE-2026-32214 Universal Plug and Play (upnp.dll) information disclosure vulnerability Important
System Center CVE-2026-33825 Microsoft Defender privilege escalation vulnerability Important
Windows CVE-2026-33829 Windows Snipping Tool spoofing vulnerability Moderate
Microsoft Edge for Android CVE-2026-33119 Microsoft Edge (Chromium-based) for Android spoofing vulnerability Moderate
Microsoft Edge (Chromium-based) CVE-2026-33118 Microsoft Edge (Chromium-based) spoofing vulnerability Low

Statement

This advisory is only used to describe a potential risk. NSFOCUS does not provide any commitment or promise on this advisory. NSFOCUS and the author will not bear any liability for any direct and/or indirect consequences and losses caused by transmitting and/or using this advisory. NSFOCUS reserves all the rights to modify and interpret this advisory. Please include this statement paragraph when reproducing or transferring this advisory. Do not modify this advisory, add/delete any information to/from it, or use this advisory for commercial purposes without permission from NSFOCUS.

About NSFOCUS

NSFOCUS, a pioneering leader in cybersecurity, is dedicated to safeguarding telecommunications, Internet service providers, hosting providers, and enterprises from sophisticated cyberattacks.

Founded in 2000, NSFOCUS operates globally with over 3000 employees at two headquarters in Beijing, China, and Santa Clara, CA, USA, and over 50 offices worldwide. It has a proven track record of protecting over 25% of the Fortune Global 500 companies, including four of the five largest banks and six of the world’s top ten telecommunications companies.

Leveraging technical prowess and innovation, NSFOCUS delivers a comprehensive suite of security solutions, including the Intelligent Security Operations Platform (ISOP) for modern SOC, DDoS Protection, Continuous Threat Exposure Management (CTEM) Service and Web Application and API Protection (WAAP). All the solutions and services are augmented by the Security Large Language Model (SecLLM), ML, patented algorithms and other cutting-edge research achievements developed by NSFOCUS.

The post Microsoft’s April Security Update of High-Risk Vulnerability Notice for Multiple Products appeared first on NSFOCUS.

*** This is a Security Bloggers Network syndicated blog from NSFOCUS authored by NSFOCUS. Read the original post at: https://nsfocusglobal.com/microsofts-april-security-update-of-high-risk-vulnerability-notice-for-multiple-products/


文章来源: https://securityboulevard.com/2026/04/microsofts-april-security-update-of-high-risk-vulnerability-notice-for-multiple-products/
如有侵权请联系:admin#unsafe.sh