Skip to main content
COSMICBYTEZLABS
NewsSecurityHOWTOsToolsStudyTraining
ProjectsChecklistsAI RankingsNewsletterStatusTagsAbout
Subscribe

Press Enter to search or Esc to close

News
Security
HOWTOs
Tools
Study
Training
Projects
Checklists
AI Rankings
Newsletter
Status
Tags
About
RSS Feed
Reading List
Subscribe

Stay in the Loop

Get the latest security alerts, tutorials, and tech insights delivered to your inbox.

Subscribe NowFree forever. No spam.
COSMICBYTEZLABS

Your trusted source for IT intelligence, cybersecurity insights, and hands-on technical guides.

690+ Articles
118+ Guides

CONTENT

  • Latest News
  • Security Alerts
  • HOWTOs
  • Projects
  • Exam Prep

RESOURCES

  • Search
  • Browse Tags
  • Newsletter Archive
  • Reading List
  • RSS Feed

COMPANY

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CosmicBytez Labs. All rights reserved.

System Status: Operational
  1. Home
  2. News
  3. Microsoft Issues Patches for SharePoint Zero-Day and 168 Other New Vulnerabilities
Microsoft Issues Patches for SharePoint Zero-Day and 168 Other New Vulnerabilities
NEWS

Microsoft Issues Patches for SharePoint Zero-Day and 168 Other New Vulnerabilities

Microsoft's April 2026 Patch Tuesday addresses a record 169 security vulnerabilities including a SharePoint zero-day actively exploited in the wild, 8 Critical-rated flaws, and dozens of remote code execution bugs across Windows, Office, and Azure.

Dylan H.

News Desk

April 19, 2026
4 min read

Microsoft's April 2026 Patch Tuesday is the company's largest single-month patch release in recent memory, dropping fixes for 169 security vulnerabilities across its product portfolio. The update includes a patch for a SharePoint zero-day that has been actively exploited in the wild, 8 Critical-severity flaws, and a broad sweep of remote code execution vulnerabilities spanning Windows, Office, Azure, and developer tooling.

Zero-Day: SharePoint Remote Code Execution

The actively exploited vulnerability is a remote code execution flaw in Microsoft SharePoint Server, assigned a Critical severity rating. Threat actors have been leveraging the flaw in targeted attacks prior to the patch release.

Microsoft has not disclosed the specific CVE identifier in this summary, but confirmed the following:

  • Attack vector: Network-accessible SharePoint sites (no authentication required in some configurations)
  • Impact: Full remote code execution with SharePoint service account privileges
  • Active exploitation: Confirmed, limited targeted attacks
  • Affected versions: SharePoint Server 2016, 2019, and SharePoint in Microsoft 365 (hybrid configurations)

CISA has added the SharePoint zero-day to the Known Exploited Vulnerabilities catalog and requires federal agencies to apply the patch within 21 days.

Patch Summary by Severity

SeverityCountNotable Products
Critical8SharePoint, Windows Hyper-V, Remote Desktop Services, Azure
Important157Windows, Office, Edge, .NET, SQL Server, Exchange
Moderate3Microsoft Teams, Bing, OneDrive
Low1Windows Defender

Critical Vulnerabilities Highlighted

Windows Hyper-V (Remote Code Execution)

A critical Hyper-V hypervisor flaw allows a malicious guest VM to escape the hypervisor and execute code on the host. This is particularly significant for cloud and virtualization environments.

Remote Desktop Services (RCE)

Two Critical RDS vulnerabilities allow unauthenticated code execution over RDP — attackers with network access to port 3389 can compromise systems without any user interaction or credentials.

Azure API Management (Privilege Escalation)

A Critical elevation of privilege flaw in Azure API Management enables an attacker with low-privilege API access to escalate to management-plane control, potentially accessing all APIs and backend integrations.

Microsoft Office (Multiple RCE)

Three Important-rated Office RCE vulnerabilities affect Word, Excel, and PowerPoint via malformed file parsing. These are expected to be weaponized in phishing campaigns as proof-of-concept code circulates.

Notable Important-Severity Issues

  • Windows DNS Server RCE — exploitable via crafted DNS responses on internal networks
  • SQL Server privilege escalation — allows db_reader to escalate to sysadmin in specific configurations
  • Exchange Server spoofing — enables forging of internal email sender addresses, bypassing EOP checks
  • Windows Kernel EoP — local privilege escalation via the NT kernel, useful in post-exploitation chains
  • .NET deserialization RCE — affects applications using BinaryFormatter (now flagged in security advisories)

Patch Prioritization Guidance

Given the volume of patches, security teams should prioritize in this order:

Deploy within 24 hours:

  1. SharePoint Server zero-day (actively exploited)
  2. Remote Desktop Services Critical RCE (wormable potential)
  3. Hyper-V guest escape (virtualization infrastructure)

Deploy within 7 days: 4. Azure API Management privilege escalation 5. Exchange Server spoofing fix 6. Windows DNS Server RCE

Deploy within 30 days: 7. Remaining Important-rated Office, Windows, and .NET patches

Windows Update & SharePoint Patching

For SharePoint administrators, note that the SharePoint patch is not delivered via Windows Update for on-premises installations. It must be manually downloaded from the Microsoft Update Catalog and applied via the SharePoint Products Configuration Wizard.

# SharePoint 2019: verify patch level after update
(Get-SPFarm).BuildVersion
# Should show 16.0.x.xxxx for April 2026 CU

SharePoint Online (Microsoft 365) instances are patched automatically by Microsoft — no admin action required.

Context: Record Patch Volume

The 169-vulnerability count surpasses Microsoft's previous record of 149 (set in December 2024). Security researchers attribute the increase to:

  • Expanded scope of Microsoft's bug bounty program
  • Increased internal red-team investment via the Microsoft Security Response Center
  • Broader AI-assisted code analysis surfacing latent vulnerabilities
  • Integration of additional Azure and developer tool components into the Patch Tuesday scope

Regardless of the cause, the volume represents a significant operational burden for enterprise patch management teams. Organizations using automated patching tools (SCCM, Intune, WSUS) should verify deployment rings are configured for timely rollout given the critical nature of this month's release.

#Microsoft#Patch Tuesday#Zero-Day#SharePoint#Vulnerability#Windows

Related Articles

ThreatsDay Bulletin: Defender 0-Day, SonicWall Brute-Force, 17-Year-Old Excel RCE

This week's threat roundup covers an unpatched Microsoft Defender zero-day, active SonicWall brute-force campaigns, a 17-year-old Excel RCE vulnerability now being exploited, and 15 additional security stories demanding attention.

4 min read

Recently Leaked Windows Zero-Days Now Exploited in Active Attacks

Threat actors are actively exploiting three recently disclosed Windows security vulnerabilities that allow attackers to gain SYSTEM or elevated administrator privileges on compromised systems.

4 min read

Disgruntled Researcher Leaks BlueHammer Windows Zero-Day Exploit

A security researcher operating under the aliases 'Chaotic Eclipse' and 'Nightmare-Eclipse' has publicly released exploit code for an unpatched Windows...

5 min read
Back to all News