Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Microsoft Patches SharePoint Zero-Day and 168 Security Flaws

Microsoft Patches SharePoint Zero-Day and 168 Security Flaws

Posted on April 15, 2026 By CWS

Microsoft has rolled out updates to resolve a total of 169 security vulnerabilities across its software offerings, including an actively exploited zero-day flaw in SharePoint Server. This release is part of the company’s latest Patch Tuesday initiative, aiming to enhance the security posture of its products.

Overview of the Security Patches

Among the addressed vulnerabilities, 157 are marked as Important, eight as Critical, three as Moderate, and one as Low in severity. The majority, 93 flaws, are related to privilege escalation, with 21 tied to information disclosure, 21 to remote code execution, 14 to security feature bypass, 10 to spoofing, and nine to denial-of-service attacks.

Significantly, four Common Vulnerabilities and Exposures (CVEs) from non-Microsoft sources have been mitigated, impacting AMD, Node.js, Windows Secure Boot, and Git for Windows. These updates accompany previous patches for 78 vulnerabilities in the Chromium-based Edge browser since last month’s update.

Details on the SharePoint Vulnerability

The actively exploited vulnerability, identified as CVE-2026-32201, affects Microsoft SharePoint Server. This spoofing vulnerability arises from improper input validation, allowing attackers to manipulate network communications. While it can expose sensitive information and alter data, it does not restrict access to resources.

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added this vulnerability to its Known Exploited Vulnerabilities catalog, mandating remediation by April 28, 2026, for federal agencies. The precise method of exploitation remains unclear, highlighting the need for immediate action to mitigate potential risks.

Other Noteworthy Vulnerabilities

Another significant vulnerability is a privilege escalation flaw in Microsoft Defender, tracked as CVE-2026-33825. With a CVSS score of 7.8, this flaw allows attackers to elevate privileges locally due to inadequate access controls. Fortunately, Microsoft’s frequent updates to Defender mean no user action is needed for this fix.

Additionally, a severe remote code execution vulnerability, CVE-2026-33824, impacts the Windows Internet Key Exchange (IKE) Service Extensions. With a CVSS score of 9.8, it poses a high risk to systems with IKE v2 enabled, making them susceptible to crafted packet attacks from untrusted networks.

Implications and Future Outlook

These security flaws underscore the critical need for timely updates in enterprise environments, particularly for systems relying on VPNs or IPsec. The potential for exploitation highlights the importance of proactive cybersecurity measures.

As the number of vulnerabilities increases, experts predict that annual CVEs will exceed 1,000, necessitating ongoing vigilance from organizations. Ensuring that systems are up-to-date remains vital in defending against evolving cyber threats.

The Hacker News Tags:CISA, CVE, cyber attacks, Cybersecurity, IT security, Microsoft, Patch Tuesday, privilege escalation, remote code execution, security patch, SharePoint, software updates, tech news, Vulnerabilities, zero-day

Post navigation

Previous Post: Microsoft Patches Critical Defender Vulnerability
Next Post: Triad Nexus Returns with Advanced Scam Infrastructure

Related Posts

Critical Metro4Shell Vulnerability Exploited in React Native Critical Metro4Shell Vulnerability Exploited in React Native The Hacker News
North Korean Hackers Exploit npm Packages for Malware North Korean Hackers Exploit npm Packages for Malware The Hacker News
Scanning Activity on Palo Alto Networks Portals Jump 500% in One Day Scanning Activity on Palo Alto Networks Portals Jump 500% in One Day The Hacker News
Securing the Mid-Market Across the Complete Threat Lifecycle Securing the Mid-Market Across the Complete Threat Lifecycle The Hacker News
LastPass Warns of Fake Maintenance Messages Targeting Users’ Master Passwords LastPass Warns of Fake Maintenance Messages Targeting Users’ Master Passwords The Hacker News
APT36 and SideCopy Target Indian Defense with RATs APT36 and SideCopy Target Indian Defense with RATs The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • CISA Highlights New Vulnerabilities, Sets Federal Deadlines
  • Gardyn Smart Garden Flaws Risk Remote Control by Hackers
  • British Hacker Admits to Stealing Millions in Cryptocurrency
  • Critical iTerm2 SSH Flaw Found: Text to Code Execution
  • Exploit Targets Windows Snipping Tool Vulnerability

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • CISA Highlights New Vulnerabilities, Sets Federal Deadlines
  • Gardyn Smart Garden Flaws Risk Remote Control by Hackers
  • British Hacker Admits to Stealing Millions in Cryptocurrency
  • Critical iTerm2 SSH Flaw Found: Text to Code Execution
  • Exploit Targets Windows Snipping Tool Vulnerability

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark