Changeflow GovPing Data Privacy & Cybersecurity Microsoft Defender CVE-2026-33825 Local Privile...
Priority review Notice Added Final

Microsoft Defender CVE-2026-33825 Local Privilege Escalation

Favicon for www.cisa.gov CISA Known Exploited Vulnerabilities (KEV)
Published
Detected
Email

Summary

CISA added CVE-2026-33825 to the Known Exploited Vulnerabilities catalog on April 22, 2026. The vulnerability is an insufficient granularity of access control flaw in Microsoft Defender versions 4.0.0.0 through versions before 4.18.26030.3011 that allows a local authorized attacker to elevate privileges. The CVSS 3.1 score is 7.8 (HIGH), exploitation is listed as active with total technical impact, and a vendor patch is available via Microsoft Update Guide.

“Insufficient granularity of access control in Microsoft Defender allows an authorized attacker to elevate privileges locally.”

CISA , verbatim from source
Published by CISA on cve.org . Detected, standardized, and enriched by GovPing. Review our methodology and editorial standards .

About this source

GovPing monitors CISA Known Exploited Vulnerabilities (KEV) for new data privacy & cybersecurity regulatory changes. Every update since tracking began is archived, classified, and available as free RSS or email alerts — 36 changes logged to date.

What changed

CISA added CVE-2026-33825 to the Known Exploited Vulnerabilities catalog. The vulnerability is an insufficient granularity of access control in Microsoft Defender that allows a local authorized attacker to elevate privileges to SYSTEM level. Affected versions are 4.0.0.0 before 4.18.26030.3011. The CVSS 3.1 base score is 7.8 (HIGH) with vector CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C. Exploitation status is listed as active, not automatable, with total technical impact.

Federal civilian agencies subject to BOD 22-01 must remediate this vulnerability under the KEV remediation requirements. All organizations using Microsoft Defender should verify their deployment version and apply the Microsoft patch via the vendor advisory on msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33825. IT security teams should prioritize patching endpoints given the active exploitation status and local privilege escalation risk.

Archived snapshot

Apr 23, 2026

GovPing captured this document from the original source. If the source has since changed or been removed, this is the text as it existed at that time.

Required CVE Record Information

CNA: Microsoft Corporation

Updated:

2026-04-22

Description

Insufficient granularity of access control in Microsoft Defender allows an authorized attacker to elevate privileges locally.

CWE 1 Total

Learn more
- CWE-1220: CWE-1220: Insufficient Granularity of Access Control

CVSS 1 Total

Learn more
| Score | Severity | Version | Vector String |
| --- | --- | --- | --- |
| 7.8 | HIGH | 3.1 | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |

Product Status

Learn more Versions 1 Total

Default Status: unknown

affected

  • affected from 4.0.0.0 before 4.18.26030.3011

References 1 Total

Authorized Data Publishers

Learn more

CISA-ADP

SSVC and KEV, plus CVSS and CWE if not provided by the CNA.

SSVC 1 Total

Learn more
| Exploitation | Automatable | Technical Impact | Version | Date Accessed |
| --- | --- | --- | --- | --- |
| active | no | total | 2.0.3 | 2026-04-13 |

KEV 1 Total

Learn more
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2026-33825 (2026-04-22)

Get daily alerts for CISA Known Exploited Vulnerabilities (KEV)

Daily digest delivered to your inbox.

Free. Unsubscribe anytime.

About this page

What is GovPing?

Every important government, regulator, and court update from around the world. One place. Real-time. Free. Our mission

What's from the agency?

Source document text, dates, docket IDs, and authority are extracted directly from CISA.

What's AI-generated?

The summary, classification, recommended actions, deadlines, and penalty information are AI-generated from the original text and may contain errors. Always verify against the source document.

Last updated

Classification

Agency
CISA
Published
April 22nd, 2026
Instrument
Notice
Branch
Executive
Legal weight
Non-binding
Stage
Final
Change scope
Substantive

Who this affects

Applies to
Government agencies Technology companies Healthcare providers
Industry sector
5112 Software & Technology
Activity scope
Vulnerability remediation Endpoint security patching Local privilege escalation mitigation
Geographic scope
United States US

Taxonomy

Primary area
Cybersecurity
Operational domain
IT Security
Compliance frameworks
NIST CSF
Topics
Data Privacy Software & Technology Government IT

Get alerts for this source

We'll email you when CISA Known Exploited Vulnerabilities (KEV) publishes new changes.

Free. Unsubscribe anytime.

You're subscribed!