Skip to main content
COSMICBYTEZLABS
NewsSecurityHOWTOsToolsStudyTraining
ProjectsChecklistsAI RankingsNewsletterStatusTagsAbout
Subscribe

Press Enter to search or Esc to close

News
Security
HOWTOs
Tools
Study
Training
Projects
Checklists
AI Rankings
Newsletter
Status
Tags
About
RSS Feed
Reading List
Subscribe

Stay in the Loop

Get the latest security alerts, tutorials, and tech insights delivered to your inbox.

Subscribe NowFree forever. No spam.
COSMICBYTEZLABS

Your trusted source for IT intelligence, cybersecurity insights, and hands-on technical guides.

735+ Articles
120+ Guides

CONTENT

  • Latest News
  • Security Alerts
  • HOWTOs
  • Projects
  • Exam Prep

RESOURCES

  • Search
  • Browse Tags
  • Newsletter Archive
  • Reading List
  • RSS Feed

COMPANY

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CosmicBytez Labs. All rights reserved.

System Status: Operational
  1. Home
  2. News
  3. Recently Leaked Windows Zero-Days Now Exploited in Active Attacks
Recently Leaked Windows Zero-Days Now Exploited in Active Attacks
NEWS

Recently Leaked Windows Zero-Days Now Exploited in Active Attacks

Three Windows security vulnerabilities disclosed through a researcher leak are now being actively exploited in attacks targeting SYSTEM-level privilege escalation on Windows 10, Windows 11, and Windows Server environments.

Dylan H.

News Desk

April 17, 2026
5 min read

Three Windows security vulnerabilities that entered public circulation through a researcher-published exploit leak are now being actively exploited in the wild, with threat actors leveraging them to gain SYSTEM-level or elevated administrator privileges on compromised Windows machines.

The flaws represent a troubling pattern: vulnerabilities that originated from a disgruntled security researcher's unauthorized public disclosure are being rapidly weaponized before all mitigations are fully deployed across affected enterprise environments.

What Was Leaked

The vulnerabilities trace back to the BlueHammer disclosure incident in early April 2026, in which a security researcher — reportedly frustrated with Microsoft's vulnerability handling — published working exploit code for a Windows privilege escalation flaw before Microsoft had issued a patch.

The BlueHammer leak (CVE-2026-33825) was subsequently followed by disclosure of two additional related flaws. Together, the three vulnerabilities allow local attackers — or malware already running on a system with standard user privileges — to escalate to SYSTEM, the highest privilege level in Windows, granting full control of the operating system.

Active Exploitation Confirmed

BleepingComputer reports that threat actors have incorporated at least one of the leaked exploits into active attack campaigns. The exploitation has been observed in post-initial-access scenarios: attackers who have already gained a foothold via phishing, supply chain compromise, or credential theft are now using the leaked privilege escalation exploits to elevate privileges and achieve full system control.

Key details confirmed:

  • Affected platforms: Windows 10, Windows 11, Windows Server 2019, and Windows Server 2022
  • Prerequisite: Some degree of local access (standard user account or limited malware execution)
  • Goal: SYSTEM-level privilege escalation enabling full OS control, credential dumping, and lateral movement
  • Patch status: April 2026 Patch Tuesday addressed some — but not all — of the disclosed variants

The RedSun Complication

A separate but related flaw, dubbed RedSun, affects systems where Windows Defender is active. Unlike the BlueHammer variants patched in April's Patch Tuesday, the RedSun privilege escalation flaw requires a separate Antimalware Platform update (version 4.18.26050.3011 or later) rather than the standard Windows security update.

Organizations that applied April Patch Tuesday updates but have not confirmed their Defender platform version remains vulnerable to RedSun exploitation. Microsoft has pushed this update through Windows Update and WSUS, but environments with delayed Defender definition updates or air-gapped systems may not have received it.

Why Researcher-Leaked Exploits Are Especially Dangerous

When vulnerabilities are disclosed through coordinated processes (CVE assignment, vendor notification, embargo period, patch release), defenders have a window to deploy patches before exploitation begins. Researcher leaks collapse that window entirely.

In this case, the exploit code was published publicly, meaning:

  1. No patch existed when exploitation began for the leaked variants
  2. Proof-of-concept code reduced the skill barrier to near zero — any attacker with the ability to download and run code can exploit it
  3. Detection signatures lagged behind exploitation because defenders had no pre-patch warning window to prepare
  4. Enterprise patch cycles (weekly, bi-weekly, or monthly) mean a significant portion of the Windows install base remains vulnerable weeks after patches are released

Security researchers and vendors widely criticize unauthorized exploit disclosure for precisely this reason — it benefits attackers disproportionately over defenders.

Patching Guidance

April Patch Tuesday Updates

Microsoft addressed the BlueHammer variants in the April 2026 Patch Tuesday release. Organizations should prioritize:

Windows 10 (all supported versions): KB5058379 or later
Windows 11 24H2:                      KB5058411 or later
Windows Server 2022:                  KB5058385 or later
Windows Server 2019:                  KB5058392 or later

Verify applied updates via:

# Check installed security updates
Get-HotFix | Where-Object { $_.InstalledOn -gt (Get-Date).AddDays(-30) } | Sort-Object InstalledOn -Descending
 
# Verify specific KB
Get-HotFix -Id KB5058379

Windows Defender Platform Update (RedSun)

# Check current Defender platform version
(Get-MpComputerStatus).AMProductVersion
 
# Force Defender signature and platform update
Update-MpSignature
Start-MpScan -ScanType QuickScan

The required Defender platform version is 4.18.26050.3011 or later.

Interim Mitigations

For systems that cannot be patched immediately:

  • Limit local user privileges: Enforce least-privilege principles — standard user accounts should not have local administrator rights
  • Deploy Credential Guard: Reduces the impact of SYSTEM-level compromise by protecting credential stores
  • Enable Windows Defender Attack Surface Reduction rules: Specific ASR rules can block common privilege escalation techniques
  • Monitor for unusual token manipulation: Detect calls to NtAdjustPrivilegesToken, SeDebugPrivilege abuse, and unexpected SYSTEM process spawning
  • Prioritize endpoint detection: Signature updates for the leaked exploits are now available from all major EDR vendors

Detection and Hunting

Security teams should hunt for indicators of exploitation:

# Look for processes spawning with SYSTEM privileges from user-level parents
Get-WinEvent -LogName Security -FilterXPath "*[System[EventID=4688]]" | 
  Where-Object { $_.Message -match "S-1-5-18" -and $_.Message -notmatch "SYSTEM" }
 
# Check for token impersonation events
Get-WinEvent -LogName Security -FilterXPath "*[System[EventID=4672]]" |
  Select-Object -First 50 | Format-List TimeCreated, Message

EDR solutions with behavioral detection (CrowdStrike, SentinelOne, Microsoft Defender for Endpoint) should have signatures covering the leaked exploit patterns. Confirm rule sets are current before relying solely on behavioral detection.


Sources: BleepingComputer, Microsoft Security Response Center

#Zero-Day#Windows#Privilege Escalation#Microsoft#Exploitation#BleepingComputer

Related Articles

Disgruntled Researcher Leaks BlueHammer Windows Zero-Day Exploit

A security researcher operating under the aliases 'Chaotic Eclipse' and 'Nightmare-Eclipse' has publicly released exploit code for an unpatched Windows...

5 min read

Three Microsoft Defender Zero-Days Actively Exploited; Two Still Unpatched

Huntress is warning that threat actors are actively exploiting three Microsoft Defender privilege escalation zero-days — BlueHammer, RedSun, and a third flaw — with two of the three remaining unpatched as of April 17, 2026.

5 min read

New Microsoft Defender 'RedSun' Zero-Day PoC Grants SYSTEM Privileges

A researcher known as 'Chaotic Eclipse' has published a second Microsoft Defender zero-day exploit in two weeks, dubbed 'RedSun,' in protest of Microsoft's handling of security researcher disclosures.

4 min read
Back to all News