Shared from twixb · securityweek.com

Recent Microsoft Defender Vulnerability Exploited as Zero-Day

securityweek.com·Apr 23, 2026

A recently disclosed privilege escalation vulnerability in Microsoft Defender, tracked as CVE-2026-33825 and named BlueHammer, has been exploited in the wild as a zero-day attack, allowing low-privilege users to gain System permissions. The vulnerability, which was publicly disclosed on April 2, has led to active attacks using publicly available proof-of-concept code, prompting the US cybersecurity agency CISA to add it to its Known Exploited Vulnerabilities catalog.

The key actionable insight for you is the urgency to patch the recently disclosed CVE-2026-33825 vulnerability in Microsoft Defender, which is being actively exploited as a zero-day. Given its high CVSS score of 7.8 and the fact that public proof-of-concept (PoC) code is available, it is crucial to ensure that your systems are updated to mitigate potential privilege escalation attacks. Additionally, be vigilant about monitoring user-writable directories for suspicious activities, as attackers have been leveraging these for exploit staging and execution.

Powered by twixb

Want more content like this?

twixb tracks your favorite blogs and social media, filters by keywords, and delivers personalized key learnings — straight to your inbox.