Canadian Cyber Security Journal
SOCIAL:
Filed under: Featured, TechTalk

Microsoft April 2026 Patch Tuesday: 167 Flaws, Two Zero-Days, and a CVSS 9.8 Windows IKE RCE Demand Immediate Action

What Happened

Microsoft released its April 2026 Patch Tuesday security updates on April 15, addressing 167 vulnerabilities across Windows, Office, SharePoint, Defender, and other products. The release includes two zero-days and eight Critical-rated flaws, making it one of the largest Patch Tuesday releases in Microsoft’s history.

The first zero-day, CVE-2026-32201 (CVSS 6.5), is an actively exploited spoofing flaw in Microsoft SharePoint Server. Improper input validation allows an unauthenticated attacker to perform spoofing over a network, with potential to view and alter sensitive information. CISA added CVE-2026-32201 to its Known Exploited Vulnerabilities catalog the same day, setting an April 28 remediation deadline for federal agencies. It is unclear who is exploiting the flaw or at what scale.

The second zero-day, CVE-2026-33825, is a Microsoft Defender elevation of privilege vulnerability. Microsoft mitigated this one automatically via the Antimalware Platform update version 4.18.26050.3011, delivered to supported systems without a manual patch step.

The most severe vulnerability in the release is CVE-2026-33824 (CVSS 9.8), a remote code execution flaw in Windows Internet Key Exchange (IKE) Service Extensions. An unauthenticated attacker can achieve arbitrary code execution by sending specially crafted packets to any Windows system with IKEv2 enabled. The attack requires no privileges and no user interaction. Microsoft rates exploitation likelihood as high.

Why This Matters for Canadian Organizations

Windows infrastructure is pervasive across every sector of the Canadian economy — from federal and provincial government ministries to financial institutions, healthcare networks, municipal systems, and enterprise environments. CVE-2026-33824 is particularly dangerous because no credentials or user action are required to trigger it. Any Windows system reachable over a network with IKEv2 enabled is exposed until patched. Given the breadth of Windows deployments in Canada, this vulnerability represents a broad attack surface that adversaries are expected to probe rapidly after public disclosure.

The actively exploited SharePoint zero-day, CVE-2026-32201, is equally relevant. SharePoint is a standard platform for document management and collaboration in Canadian government and enterprise environments. Exploitation is already occurring in the wild, and the CISA KEV deadline signals urgency for all organizations with internet-facing or internally accessible SharePoint deployments.

Canadian organizations subject to federal contracting requirements, PIPEDA, or sector-specific frameworks like OSFI B-13 or Bill C-26 (once in force) face both operational and compliance obligations to apply security patches without delay. Unpatched vulnerabilities in widely exploited products are a leading cause of reportable data breaches.

What to Do

Apply April 2026 Patch Tuesday updates across all Windows systems immediately — prioritize CVE-2026-33824 and CVE-2026-32201. For systems where immediate patching is not possible, block inbound UDP ports 500 and 4500 on CVE-2026-33824 as a temporary measure, or restrict those ports to known IKE peer addresses. Verify SharePoint Server is patched and confirm the Defender Antimalware Platform update has been applied. Review your asset inventory for any internet-facing Windows services and accelerate patching windows for those systems. CCCS guidance recommends treating CISA KEV additions as high-priority remediation targets for Canadian federal and critical infrastructure operators.

Source: BleepingComputer | Rapid7

Enjoy this article? Don’t forget to share.