Overview
Microsoft's April 2026 Patch Tuesday was a record-breaker in volume — delivering fixes for 169 CVEs, making it the second-largest monthly security update in the company's history. The release included one actively exploited zero-day in Microsoft SharePoint, a critical RCE vulnerability, and a broad sweep of high-severity flaws across the Windows ecosystem, Office, Azure, and developer tooling.
Security teams managing Windows environments should treat this update cycle with urgency given the confirmed active exploitation and the sheer volume of addressed vulnerabilities.
By the Numbers
| Category | Count |
|---|---|
| Total CVEs patched | 169 |
| Critical severity | 1 |
| High severity | ~168 |
| Actively exploited zero-days | 1 |
| Publicly disclosed (no exploitation confirmed) | Multiple |
| Products affected | Windows, Office, SharePoint, Azure, Edge, .NET, SQL Server, Exchange |
Actively Exploited Zero-Day: SharePoint
The headline vulnerability in this month's release is a zero-day in Microsoft Office SharePoint that has been confirmed as actively exploited in attacks prior to patching.
| Attribute | Detail |
|---|---|
| Affected Product | Microsoft SharePoint Server |
| Impact | Information disclosure & content manipulation |
| Attack Type | Allows attackers to view sensitive information and make unauthorized changes |
| Authentication Required | Yes (authenticated attacker) |
| Active Exploitation | Confirmed |
| Patch | Included in April 2026 Patch Tuesday |
The SharePoint flaw allows an authenticated attacker to view information they should not have access to and potentially alter disclosed content — a significant risk in organizations using SharePoint for sensitive document management, project collaboration, or intranet services.
Security teams should prioritize this patch for all SharePoint Server deployments, particularly those accessible from the internet or holding sensitive business data.
Critical RCE Vulnerability
Beyond the actively exploited SharePoint zero-day, the April update addresses a Critical-rated remote code execution vulnerability. Critical designations from Microsoft indicate that successful exploitation could occur without user interaction in the most severe scenarios, or that the attack surface is particularly broad and impactful.
Organizations should treat Critical-rated CVEs with the same urgency as actively exploited flaws, as threat actors frequently weaponize these vulnerabilities within days of public disclosure.
Notable High-Severity Fixes
The 168+ High-severity fixes span a wide range of Microsoft products:
Windows Core Components
- Kernel and driver vulnerabilities enabling privilege escalation
- Remote Desktop Services flaws
- Windows networking stack issues
- Hyper-V escape vulnerabilities
Office and Productivity Suite
- Word, Excel, and Outlook RCE via malicious documents
- Preview pane vulnerabilities enabling code execution without file opening
- Macro and OLE-related security bypasses
Azure and Cloud Services
- Azure Active Directory and Entra ID authentication flaws
- Azure DevOps privilege escalation issues
- Azure Storage and networking security fixes
Developer Tooling
- Visual Studio and .NET runtime vulnerabilities
- NuGet and package management security issues
- SDK and compiler toolchain fixes
Historical Context: Volume Significance
The 169 CVE count places April 2026 as the second-largest monthly Patch Tuesday on record. This volume reflects:
- Increased attack surface as Microsoft's product portfolio expands into cloud, AI, and developer tooling
- More aggressive internal security research — Microsoft's Security Response Center has ramped up proactive vulnerability discovery
- Growing researcher community reporting issues through the Microsoft Security Response Center's bug bounty program
- Complexity accumulation in long-lived codebases across Windows and Office
For security operations teams, this volume represents a significant patch management challenge. Prioritization is essential.
Patch Prioritization Guide
Given the volume, use this prioritization framework:
Tier 1 — Patch Within 24 Hours
- Microsoft SharePoint (actively exploited zero-day)
- Any Critical-rated CVE affecting internet-facing or business-critical systems
- Remote Desktop Services flaws (high exposure risk)
Tier 2 — Patch Within 7 Days
- High-severity Office vulnerabilities (email-delivered exploitation risk)
- Windows Kernel privilege escalation flaws
- Hyper-V escape vulnerabilities (multi-tenant environments)
Tier 3 — Patch Within 30 Days
- Developer tooling (Visual Studio, .NET, SDK)
- Non-internet-facing Azure services
- Remaining High-severity patches by product criticality to your environment
Deployment Guidance
Windows Update / WSUS / Intune
# Check Windows Update status via PowerShell
Get-WindowsUpdateLog
# List pending updates
Get-WindowsUpdate -AcceptAll -AutoReboot
# Force immediate Windows Update check
UsoClient StartScanSharePoint Server — Priority Patch
# Verify current SharePoint build version
(Get-SPFarm).BuildVersion
# Apply cumulative update via PowerShell
# (after downloading from Microsoft Update Catalog)
Add-PSSnapin Microsoft.SharePoint.PowerShell -ErrorAction SilentlyContinue
.\ubersrv2019.exe
# Run SharePoint Products Configuration Wizard after patching
PSConfig.exe -cmd upgrade -inplace b2b -wait -cmd applicationcontent -install -cmd installfeaturesVerifying Patch Application
# Confirm all April 2026 patches applied
Get-HotFix | Where-Object { $_.InstalledOn -gt "2026-04-01" } | Sort-Object InstalledOn -Descending | Select-Object Description, HotFixID, InstalledOnDetection: SharePoint Zero-Day
While patches are applied, monitor for potential exploitation of the SharePoint zero-day:
Indicators to monitor in SharePoint ULS logs:
- Unexpected access to document libraries by authenticated but unauthorized users
- SharePoint REST API calls accessing content outside normal user permissions
- Bulk document access patterns inconsistent with user role
- Authentication tokens from unusual IP ranges accessing SharePoint contentKey Takeaways
| Takeaway | Action |
|---|---|
| Record patch volume demands prioritization | Use Tier 1/2/3 framework above |
| SharePoint zero-day is actively exploited | Patch SharePoint immediately |
| Critical RCE requires urgent attention | Prioritize Critical-rated fixes |
| Broad product surface area | Audit all Microsoft products in your environment |
| Test before broad deployment | Validate patches in staging for production SharePoint |