Microsoft Patches 165 Vulnerabilities Including 2 Actively Exploited Zero-Days
Summary
The Italian National Cybersecurity Agency (CSIRT-ITA) issued Alert AL02/260415/CSIRT-ITA reporting that Microsoft released its monthly security updates addressing 165 vulnerabilities, including two actively exploited zero-days. The first zero-day, CVE-2026-32201 in Microsoft SharePoint Server (CVSS 6.5, Spoofing), allows attackers to impersonate legitimate entities through improper input validation. The second, CVE-2026-33825 'BlueHammer' in Microsoft Defender Antimalware Platform (CVSS 7.8, Elevation of Privilege), exploits a TOCTOU race condition between file scanning and Volume Shadow Copy manipulation to achieve SYSTEM-level privileges. CSIRT-ITA recommends updating affected products via Windows Update.
About this source
GovPing monitors Italy CSIRT Advisories for new data privacy & cybersecurity regulatory changes. Every update since tracking began is archived, classified, and available as free RSS or email alerts — 15 changes logged to date.
What changed
Microsoft's April 2026 Patch Tuesday addressed 165 security vulnerabilities across its product portfolio, including two zero-days confirmed as actively exploited or with publicly available proof-of-concept exploits. CVE-2026-32201 (SharePoint Server) enables spoofing attacks via improper input validation, while CVE-2026-33825 'BlueHammer' (Microsoft Defender) allows local authenticated attackers to elevate privileges to SYSTEM through a race condition exploiting Volume Shadow Copy manipulation. Microsoft reinforced Access Control Lists on sensitive Defender paths and improved process validation mechanisms.
Organizations running Microsoft SharePoint Server or Microsoft Defender Antimalware Platform should prioritize patching given confirmed active exploitation of both vulnerabilities. The BlueHammer vulnerability specifically affects systems where access controls on Defender engine paths may be insufficient, potentially enabling malware to evade detection. All listed product families spanning Azure, Office, Windows OS components, and server infrastructure should be updated through standard Windows Update channels.
What to do next
- Update affected products through Windows Update
Archived snapshot
Apr 25, 2026GovPing captured this document from the original source. If the source has since changed or been removed, this is the text as it existed at that time.
Aggiornamenti Mensili Microsoft
**
Alert**
AL02/260415/CSIRT-ITA
Condividi
- Facebook
- Twitter
- LinkedIn
- Whatsapp
Sintesi
Microsoft ha rilasciato gli aggiornamenti di sicurezza mensili che risolvono un totale di 165 nuove vulnerabilità, di cui due di tipo 0-day.
Tipologia
- Denial of Service
- Elevation of Privilege
- Information Disclosure
- Remote Code Execution
- Security Feature Bypass
- Spoofing
- Tampering
Descrizione e potenziali impatti
Nel dettaglio le vulnerabilità sfruttate attivamente o per le quali risulta disponibile in rete anche un “proof of concept”, riguardano:
- Microsoft SharePoint Server: identificata tramite la CVE-2026-32201, di tipo “ Spoofing ” e con score CVSS v3.1 pari a 6.5, interessa le istanze Microsoft SharePoint Server ed è causata da un’inadeguata validazione dell’input (Improper Input Validation). Nel dettaglio, un attaccante potrebbe sfruttare tale vulnerabilità per impersonare un’entità legittima sui sistemi target.
- Microsoft Defender Antimalware Platform: questo CSIRT ha analizzato e testato la CVE-2026-33825, nota con il nome di “BlueHammer”, di tipo “ Elevation of Privilege ” e con score CVSS v3.1 pari a 7.8, che interessa Microsoft Defender Antimalware Platform. In dettaglio, è stato verificato che la vulnerabilità è riconducibile a una condizione di tipo TOCTOU (Time Of Check Time Of Use) sfruttabile tramite una “ race condition ” tra il processo di scansione dei file di Microsoft Defender e la manipolazione del Volume Shadow Copy. Tale condizione può consentire l’elusione del rilevamento di payload malevoli senza alterare il comportamento percepito dall’utente. In presenza di un controllo insufficiente sui meccanismi di accesso ai percorsi e alle risorse utilizzate dal motore di Defender, un attaccante già autenticato localmente potrebbe sfruttare la vulnerabilità per elevare i propri privilegi fino al livello SYSTEM sui sistemi interessati. Gli aggiornamenti rilasciati da Microsoft hanno risolto la vulnerabilità rafforzando le ACL (Access Control Lists) sui percorsi sensibili utilizzati dalla piattaforma Antimalware, limitando l’interazione degli utenti non amministratori. Inoltre, sono stati migliorati i meccanismi di identificazione e validazione dei processi che richiedono l’interazione con i componenti principali di sicurezza.
Prodotti e versioni affette
- .NET
- .NET Framework
- .NET and Visual Studio
- .NET, .NET Framework, Visual Studio
- Applocker Filter Driver (applockerfltr.sys)
- Azure Logic Apps
- Azure Monitor Agent
- Desktop Window Manager
- Function Discovery Service (fdwsd.dll)
- GitHub Copilot and Visual Studio Code
- Microsoft Brokering File System
- Microsoft Defender
- Microsoft Dynamics 365 (on-premises)
- Microsoft Edge (Chromium-based)
- Microsoft Graphics Component
- Microsoft High Performance Compute Pack (HPC)
- Microsoft Management Console
- Microsoft Office
- Microsoft Office Excel
- Microsoft Office PowerPoint
- Microsoft Office SharePoint
- Microsoft Office Word
- Microsoft Power Apps
- Microsoft PowerShell
- Microsoft Windows
- Microsoft Windows Search Component
- Microsoft Windows Speech
- Remote Desktop Client
- Role: Windows Hyper-V
- SQL Server
- Universal Plug and Play (upnp.dll)
- Windows Active Directory
- Windows Admin Center
- Windows Advanced Rasterization Platform
- Windows Ancillary Function Driver for WinSock
- Windows Biometric Service
- Windows BitLocker
- Windows Boot Loader
- Windows Boot Manager
- Windows COM
- Windows Client Side Caching driver (csc.sys)
- Windows Cloud Files Mini Filter Driver
- Windows Common Log File System Driver
- Windows Container Isolation FS Filter Driver
- Windows Cryptographic Services
- Windows Encrypting File System (EFS)
- Windows File Explorer
- Windows GDI
- Windows HTTP.sys
- Windows Hello
- Windows IKE Extension
- Windows Installer
- Windows Kerberos
- Windows Kernel
- Windows Kernel Memory
- Windows LUAFV
- Windows Local Security Authority Subsystem Service (LSASS)
- Windows Management Services
- Windows OLE
- Windows Print Spooler Components
- Windows Projected File System
- Windows Push Notifications
- Windows RPC API
- Windows Recovery Environment Agent
- Windows Redirected Drive Buffering
- Windows Remote Desktop
- Windows Remote Desktop Licensing Service
- Windows Remote Procedure Call
- Windows SSDP Service
- Windows Sensor Data Service
- Windows Server Update Service
- Windows Shell
- Windows Snipping Tool
- Windows Speech Brokered Api
- Windows Storage Spaces Controller
- Windows TCP/IP
- Windows TDI Translation Driver (tdx.sys)
- Windows USB Print Driver
- Windows Universal Plug and Play (UPnP) Device Host
- Windows User Interface Core
- Windows Virtualization-Based Security (VBS) Enclave
- Windows WFP NDIS Lightweight Filter Driver (wfplwfs.sys)
- Windows WalletService
- Windows Win32K - GRFX
- Windows Win32K - ICOMP
Azioni di mitigazione
In linea con le dichiarazioni del vendor, si raccomanda di procedere all’aggiornamento dei prodotti impattati attraverso l’apposita funzione di Windows Update.
CVE (165)
Cerca:
| CVE | POC | EXPLOITATION |
| --- | --- | --- |
| CVE-2026-33104 | - | - |
| CVE-2026-33103 | - | - |
| CVE-2026-27907 | - | - |
| CVE-2026-27906 | - | - |
| CVE-2026-27909 | - | - |
| CVE-2026-33100 | - | - |
| CVE-2026-27908 | - | - |
| CVE-2026-33101 | - | - |
| CVE-2026-20945 | - | - |
| CVE-2026-23657 | - | - |
| CVE-2026-23653 | - | - |
| CVE-2026-26143 | - | - |
| CVE-2026-27910 | - | - |
| CVE-2026-26149 | - | - |
| CVE-2026-27912 | - | - |
| CVE-2026-33119 | - | - |
| CVE-2026-27911 | - | - |
| CVE-2026-33118 | - | - |
| CVE-2026-27914 | - | - |
| CVE-2026-27913 | - | - |
| CVE-2026-27916 | - | - |
| CVE-2026-33115 | - | - |
| CVE-2026-27915 | - | - |
| CVE-2026-33114 | - | - |
| CVE-2026-27918 | - | - |
| CVE-2026-32149 | - | - |
| CVE-2026-27917 | - | - |
| CVE-2026-33116 | - | - |
| CVE-2026-27919 | - | - |
| CVE-2026-32150 | - | - |
| CVE-2026-32152 | - | - |
| CVE-2026-33120 | - | - |
| CVE-2026-32151 | - | - |
| CVE-2026-20930 | - | - |
| CVE-2026-26151 | - | - |
| CVE-2026-25184 | - | - |
| CVE-2026-26153 | - | - |
| CVE-2026-26152 | - | - |
| CVE-2026-26155 | - | - |
| CVE-2026-26154 | - | - |
| CVE-2026-26156 | - | - |
| CVE-2026-26159 | - | - |
| CVE-2026-27921 | - | - |
| CVE-2026-27920 | - | - |
| CVE-2026-27923 | - | - |
| CVE-2026-27922 | - | - |
| CVE-2026-27925 | - | - |
| CVE-2026-27924 | - | - |
| CVE-2026-27927 | - | - |
| CVE-2026-32158 | - | - |
| CVE-2026-27926 | - | - |
| CVE-2026-32157 | - | - |
| CVE-2026-27929 | - | - |
| CVE-2026-32159 | - | - |
| CVE-2026-27928 | - | - |
| CVE-2026-32154 | - | - |
| CVE-2026-32153 | - | - |
| CVE-2026-32156 | - | - |
| CVE-2026-20806 | - | - |
| CVE-2026-20928 | - | - |
| CVE-2026-32155 | - | - |
| CVE-2026-33096 | - | - |
| CVE-2026-32160 | - | - |
| CVE-2026-33095 | - | - |
| CVE-2026-33098 | - | - |
| CVE-2026-32163 | - | - |
| CVE-2026-32162 | - | - |
| CVE-2026-26160 | - | - |
| CVE-2026-26162 | - | - |
| CVE-2026-26161 | - | - |
| CVE-2026-26163 | - | - |
| CVE-2026-26166 | - | - |
| CVE-2026-26165 | - | - |
| CVE-2026-26168 | - | - |
| CVE-2026-26167 | - | - |
| CVE-2026-27930 | - | - |
| CVE-2026-26169 | - | - |
| CVE-2026-27931 | - | - |
| CVE-2026-32202 | - | - |
| CVE-2026-32168 | - | - |
| CVE-2026-32201 | - | Presente |
| CVE-2026-32203 | - | - |
| CVE-2026-32165 | - | - |
| CVE-2026-32164 | - | - |
| CVE-2026-33099 | - | - |
| CVE-2026-32167 | - | - |
| CVE-2026-32200 | - | - |
| CVE-2026-32171 | - | - |
| CVE-2026-26171 | - | - |
| CVE-2026-26170 | - | - |
| CVE-2026-26173 | - | - |
| CVE-2026-26172 | - | - |
| CVE-2026-26175 | - | - |
| CVE-2026-26174 | - | - |
| CVE-2026-26177 | - | - |
| CVE-2026-26176 | - | - |
| CVE-2026-26179 | - | - |
| CVE-2026-26178 | - | - |
| CVE-2026-33827 | - | - |
| CVE-2026-33826 | - | - |
| CVE-2026-33829 | - | - |
| CVE-2026-32217 | - | - |
| CVE-2026-32216 | - | - |
| CVE-2026-33822 | - | - |
| CVE-2026-32219 | - | - |
| CVE-2026-33825 | Presente | Presente |
| CVE-2026-32218 | - | - |
| CVE-2026-33824 | - | - |
| CVE-2026-32212 | - | - |
| CVE-2026-32215 | - | - |
| CVE-2026-32214 | - | - |
| CVE-2026-32176 | - | - |
| CVE-2026-32178 | - | - |
| CVE-2026-32183 | - | - |
| CVE-2026-32184 | - | - |
| CVE-2026-26180 | - | - |
| CVE-2026-32181 | - | - |
| CVE-2026-26182 | - | - |
| CVE-2026-26181 | - | - |
| CVE-2026-26184 | - | - |
| CVE-2026-26183 | - | - |
| CVE-2026-0390 | - | - |
| CVE-2026-32224 | - | - |
| CVE-2026-32223 | - | - |
| CVE-2026-32069 | - | - |
| CVE-2026-32226 | - | - |
| CVE-2026-32225 | - | - |
| CVE-2026-32220 | - | - |
| CVE-2026-32189 | - | - |
| CVE-2026-32222 | - | - |
| CVE-2026-32068 | - | - |
| CVE-2026-32188 | - | - |
| CVE-2026-32221 | - | - |
| CVE-2026-32073 | - | - |
| CVE-2026-32072 | - | - |
| CVE-2026-32075 | - | - |
| CVE-2026-32196 | Presente | - |
| CVE-2026-32195 | - | - |
| CVE-2026-32074 | - | - |
| CVE-2026-32190 | - | - |
| CVE-2026-32071 | - | - |
| CVE-2026-32192 | - | - |
| CVE-2026-32070 | - | - |
| CVE-2026-32077 | - | - |
| CVE-2026-32198 | - | - |
| CVE-2026-32076 | - | - |
| CVE-2026-32197 | - | - |
| CVE-2026-32079 | - | - |
| CVE-2026-32078 | - | - |
| CVE-2026-32199 | - | - |
| CVE-2026-32084 | - | - |
| CVE-2026-32083 | - | - |
| CVE-2026-32086 | - | - |
| CVE-2026-32085 | - | - |
| CVE-2026-32080 | - | - |
| CVE-2026-32082 | - | - |
| CVE-2026-32081 | - | - |
| CVE-2026-23670 | - | - |
| CVE-2026-32088 | - | - |
| CVE-2026-32087 | - | - |
| CVE-2026-32089 | - | - |
| CVE-2026-32091 | - | - |
| CVE-2026-32090 | - | - |
| CVE-2026-32093 | - | - |
| CVE-2026-23666 | - | - |
Riferimenti (2)
- https://msrc.microsoft.com/update-guide/releaseNote/2026-apr
- https://msrc.microsoft.com/update-guide
Change log
| Versione | Note | Data |
|---|---|---|
| 1.0 | Pubblicato il 15-04-2026 | 15/04/2026 |
| 1.1 | Aggiornata la sezione "CVE" con presenza PoC per la CVE-2026-32196 | 17/04/2026 |
| 1.2 | Aggiornata la sezione "CVE" per rilevato sfruttamento della CVE-2026-33825 | 23/04/2026 |
Impatto sistemico
Critico (76.66)
Argomenti
Data pubblicazione
15/04/26 ore 11:38
Data Ultimo Aggiornamento
23/04/26 ore 15:55
Related changes
Get daily alerts for Italy CSIRT Advisories
Daily digest delivered to your inbox.
Free. Unsubscribe anytime.
About this page
Every important government, regulator, and court update from around the world. One place. Real-time. Free. Our mission
Source document text, dates, docket IDs, and authority are extracted directly from CSIRT-ITA.
The summary, classification, recommended actions, deadlines, and penalty information are AI-generated from the original text and may contain errors. Always verify against the source document.
Classification
Who this affects
Taxonomy
Browse Categories
Get alerts for this source
We'll email you when Italy CSIRT Advisories publishes new changes.
Subscribed!
Optional. Filters your digest to exactly the updates that matter to you.