April 14, 2026

Microsoft today pushed software updates to fix a staggering 167 security vulnerabilities in its Windows operating systems and related software, including a SharePoint Server zero-day and a publicly disclosed weakness in Windows Defender dubbed “BlueHammer.” Separately, Google Chrome fixed its fourth zero-day of 2026, and an emergency update for Adobe Reader nixes an actively exploited flaw that can lead to remote code execution.

A picture of a windows laptop in its updating stage, saying do not turn off the computer.

Redmond warns that attackers are already targeting CVE-2026-32201, a vulnerability in Microsoft SharePoint Server that allows attackers to spoof trusted content or interfaces over a network.

Mike Walters, president and co-founder of Action1, said CVE-2026-32201 can be used to deceive employees, partners, or customers by presenting falsified information within trusted SharePoint environments.

“This CVE can enable phishing attacks, unauthorized data manipulation, or social engineering campaigns that lead to further compromise,” Walters said. “The presence of active exploitation significantly increases organizational risk.”

Microsoft also addressed BlueHammer (CVE-2026-33825), a privilege escalation bug in Windows Defender. According to BleepingComputer, the researcher who discovered the flaw published exploit code for it after notifying Microsoft and growing exasperated with their response. Will Dormann, senior principal vulnerability analyst at Tharros, says he confirmed that the public BlueHammer exploit code no longer works after installing today’s patches.

Satnam Narang, senior staff research engineer at Tenable, said April marks the second-biggest Patch Tuesday ever for Microsoft. Narang also said there are indications that a zero-day flaw Adobe patched in an emergency update on April 11 — CVE-2026-34621 — has seen active exploitation since at least November 2025.

Adam Barnett, lead software engineer at Rapid7, called the patch total from Microsoft today “a new record in that category” because it includes nearly 60 browser vulnerabilities. Barnett said it might be tempting to imagine that this sudden spike was tied to the buzz around the announcement a week ago today of Project Glasswing — a much-hyped but still unreleased new AI capability from Anthropic that is reportedly quite good at finding bugs in a vast array of software.

But he notes that Microsoft Edge is based on the Chromium engine, and the Chromium maintainers acknowledge a wide range of researchers for the vulnerabilities which Microsoft republished last Friday.

“A safe conclusion is that this increase in volume is driven by ever-expanding AI capabilities,” Barnett said. “We should expect to see further increases in vulnerability reporting volume as the impact of AI models extend further, both in terms of capability and availability.”

Finally, no matter what browser you use to surf the web, it’s important to completely close out and restart the browser periodically. This is really easy to put off (especially if you have a bajillion tabs open at any time) but it’s the only way to ensure that any available updates get installed. For example, a Google Chrome update released earlier this month fixed 21 security holes, including the high-severity zero-day flaw CVE-2026-5281.

For a clickable, per-patch breakdown, check out the SANS Internet Storm Center Patch Tuesday roundup. Running into problems applying any of these updates? Leave a note about it in the comments below and there’s a decent chance someone here will pipe in with a solution.


12 thoughts on “Patch Tuesday, April 2026 Edition

  1. Andy Rosa

    Let’s get used to hundreds of patches per cycle. It’s going to get intense.

    Reply
    1. Catwhisperer

      In 2026, either you are forced to use this abomination by Corporate, by applications you Jones for, or are a person with possible masochistic inclinations, IMHO…

      Reply
  2. Stratocaster

    So Windows Defender didn’t prevent a bug in its own code?
    Verrry interesting…

    Reply
  3. Steve

    Regarding the browser vulnerabilities, I found it quite amusing that one of Edge’s newest features was something about having it manage your finances and help one make financial decisions (I clicked through it quickly).

    I think if I nailed my tax return to the nearest telephone pole my financial information would be more secure.

    Reply
  4. Eric

    Surprised Adobe Creative Cloud didn’t automatically update Acrobat for me. When I checked, it said there were no available updates. When I checked within Acrobat itself, it updated. Weird.

    Reply
  5. george johnson

    why dont you post the kb numbers with the cve numbers

    Reply
  6. fail2ban

    Only affected for Microsoft shared software users domestic and enterprise environments

    Reply
  7. polbel

    As M$ has access to claude mythos, if they used it to scan windows for vulnerabilities, that would explain the high number of patches. If all goes well, the next iteration of windows could be the most debugged ever…

    On the other hand, if NSA secretly has access to a more powerful version of mythos, since it is obeying rubio who’s slavishly obeying tRumpstein, the ensuing cyberwar could be disastrous…

    Reply
  8. Just Some Dude

    My guess is that the BlueHammer exploit code was leaked due to developments such as the AI exploit finding so eloquently described in the news a few days ago. I used to be an exploitation researcher, and realized the industry was heading in this direction in 2018-2019. The market in the upper crust is not what it used to be. Retired from it a few years ago. Not the only one. Not sure what any other people with advanced skills are going to do if they decided against doing LLM and AI (not quite the same mindset!). Tried that too.

    Good luck to my colleague, Chaotic Ellipse. Everyone gets disgusted at some point.

    Reply

Leave a Reply to Andy Rosa Cancel reply

Your email address will not be published. Required fields are marked *