Skip to main content
COSMICBYTEZLABS
NewsSecurityHOWTOsToolsStudyTraining
ProjectsChecklistsAI RankingsNewsletterStatusTagsAbout
Subscribe

Press Enter to search or Esc to close

News
Security
HOWTOs
Tools
Study
Training
Projects
Checklists
AI Rankings
Newsletter
Status
Tags
About
RSS Feed
Reading List
Subscribe

Stay in the Loop

Get the latest security alerts, tutorials, and tech insights delivered to your inbox.

Subscribe NowFree forever. No spam.
COSMICBYTEZLABS

Your trusted source for IT intelligence, cybersecurity insights, and hands-on technical guides.

735+ Articles
120+ Guides

CONTENT

  • Latest News
  • Security Alerts
  • HOWTOs
  • Projects
  • Exam Prep

RESOURCES

  • Search
  • Browse Tags
  • Newsletter Archive
  • Reading List
  • RSS Feed

COMPANY

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CosmicBytez Labs. All rights reserved.

System Status: Operational
  1. Home
  2. News
  3. New Microsoft Defender 'RedSun' Zero-Day PoC Grants SYSTEM Privileges
New Microsoft Defender 'RedSun' Zero-Day PoC Grants SYSTEM Privileges
NEWS

New Microsoft Defender 'RedSun' Zero-Day PoC Grants SYSTEM Privileges

A researcher known as 'Chaotic Eclipse' has published a second Microsoft Defender zero-day exploit in two weeks, dubbed 'RedSun,' in protest of Microsoft's handling of security researcher disclosures.

Dylan H.

News Desk

April 16, 2026
4 min read

Second Microsoft Defender Zero-Day in Two Weeks

A security researcher using the handle "Chaotic Eclipse" has published a proof-of-concept (PoC) exploit for a new Microsoft Defender zero-day vulnerability dubbed "RedSun" — the second Defender zero-day released by the same researcher in the past two weeks. The vulnerability allows a local attacker to escalate privileges to SYSTEM on affected Windows systems.

The researcher published the PoC exploit publicly without coordinated disclosure, citing frustration with how Microsoft interacts with independent security researchers. The previous zero-day published by Chaotic Eclipse, "BlueHammer," was similarly released without Microsoft having a patch ready, and security teams are now tracking both unpatched attack paths.

What the RedSun Vulnerability Does

According to the published PoC and researcher writeup, RedSun exploits a flaw in how Microsoft Defender's core antivirus service handles certain operations at elevated privilege levels. By triggering a specific code path within the Defender service — which runs as SYSTEM — an attacker with limited local access can:

  1. Cause the vulnerable Defender service code path to execute attacker-controlled code
  2. Inherit the SYSTEM security context of the Defender service process
  3. Achieve full operating system control — adding accounts, disabling security controls, or installing persistence mechanisms

The attack requires local access to the target machine but does not require any existing administrative privileges. This makes it particularly attractive as a second-stage payload after an initial low-privilege compromise.

Researcher's Protest Motivation

Chaotic Eclipse has been vocal about the motivations behind the public releases. In a statement accompanying the RedSun disclosure, the researcher indicated that Microsoft's vulnerability reward program and researcher communication process were the target of the protest, citing:

  • Delayed acknowledgment of submitted vulnerabilities
  • Inadequate compensation for high-severity research
  • Dismissive treatment of researchers who identify systemic security issues

This type of protest disclosure — sometimes called a "full drop" — bypasses coordinated vulnerability disclosure (CVD) norms and immediately creates risk for the Windows ecosystem. Security researchers and vendors broadly disagree on whether this practice is ethical, even in cases of genuine researcher mistreatment.

Risk Assessment

FactorAssessment
Exploit TypePrivilege Escalation to SYSTEM
Access RequiredLocal (authenticated, low-privilege)
PoC AvailableYes — publicly released
Patch AvailableNo — zero-day, no patch from Microsoft
ComplexityLow — PoC is functional and documented
Windows Versions AffectedUnder investigation — presumed broad Windows 10/11 impact

Because a working PoC is now publicly available, threat actors and automated exploit frameworks are likely to incorporate RedSun in post-exploitation toolkits in the near term.

Microsoft Response

At the time of publication, Microsoft had not released a patch for the RedSun vulnerability. The company is presumed to be investigating both RedSun and the previously disclosed BlueHammer. Security teams should treat both as active unpatched risks until Microsoft issues guidance or out-of-band patches.

Microsoft's Security Response Center (MSRC) has generally indicated that it investigates all disclosed vulnerabilities regardless of disclosure method, but the public availability of working PoC code accelerates the window before active exploitation begins.

Recommended Mitigations

Until Microsoft releases an official patch, defenders should consider:

  1. Limit local access to sensitive systems — reduce the population of users who can log in locally or via RDP on high-value targets
  2. Monitor for SYSTEM process creation from unusual parent processes (Defender-related process spawning unexpected children)
  3. Implement Privileged Access Workstations (PAWs) for administrative functions, reducing attacker ability to pivot through compromised low-privilege sessions
  4. Deploy EDR behavioral detections for privilege escalation patterns, particularly those involving Windows Defender service processes
  5. Block execution of publicly known PoC hashes where endpoint protection allows custom blocklist rules

Context: The BlueHammer Connection

This is the second zero-day from Chaotic Eclipse in rapid succession. The original BlueHammer zero-day, also targeting Windows and previously reported on CosmicBytez Labs, set the pattern for this protest campaign. Security teams that have been tracking BlueHammer should now also add RedSun indicators to their monitoring posture.

References

  • BleepingComputer: New Microsoft Defender "RedSun" Zero-Day PoC Grants SYSTEM Privileges
  • Microsoft Security Response Center (MSRC)
  • CosmicBytez Labs: BlueHammer Zero-Day Coverage

Published by CosmicBytez Labs — labs.cosmicbytez.ca

#Zero-Day#Microsoft#Windows Defender#Privilege Escalation#PoC#BleepingComputer

Related Articles

Recently Leaked Windows Zero-Days Now Exploited in Active Attacks

Three Windows security vulnerabilities disclosed through a researcher leak are now being actively exploited in attacks targeting SYSTEM-level privilege escalation on Windows 10, Windows 11, and Windows Server environments.

5 min read

Disgruntled Researcher Leaks BlueHammer Windows Zero-Day Exploit

A security researcher operating under the aliases 'Chaotic Eclipse' and 'Nightmare-Eclipse' has publicly released exploit code for an unpatched Windows...

5 min read

Three Microsoft Defender Zero-Days Actively Exploited; Two Still Unpatched

Huntress is warning that threat actors are actively exploiting three Microsoft Defender privilege escalation zero-days — BlueHammer, RedSun, and a third flaw — with two of the three remaining unpatched as of April 17, 2026.

5 min read
Back to all News