Skip to main content
Cyber News & CTI Reports :: 2026-04-14 | Microsoft Patch Tuesday for April 2026 - Snort Rule and Prominent Vulnerabilities
Contact Page | Privacy Policy

2026-04-14 | Microsoft Patch Tuesday for April 2026 - Snort Rule and Prominent Vulnerabilities

1. AI Summary

Microsoft April 2026 Patch Tuesday releases 165 fixes, including critical RCE and DoS bugs in .NET, Remote Desktop, Office, IKE, AD and TCP/IP; Talos adds Snort rules to detect exploits; mitigation guidance includes blocking IKE ports.

2. IOCs

IOC Type Value Description Relevant MITRE ATT&CK Techniques
Vulnerability CVE-2026-23666 Critical DoS in .NET Framework; network‑level denial of service. T1499
Vulnerability CVE-2026-32157 Critical use‑after‑free in Remote Desktop client, leads to code execution on client when connecting to malicious server. T1210
Vulnerability CVE-2026-32190 Critical use‑after‑free in Microsoft Office, enables local code execution. T1068
Vulnerability CVE-2026-33114 Critical untrusted pointer dereference in Office Word, local code execution. T1068
Vulnerability CVE-2026-33115 Critical use‑after‑free in Office Word, local code execution. T1068
Vulnerability CVE-2026-33824 Critical double‑free in IKE extension, remote code execution via crafted UDP packets. T1190
Vulnerability CVE-2026-33826 Critical input validation flaw in Active Directory RPC, requires authentication within same AD domain for RCE. T1078
Vulnerability CVE-2026-33827 Critical race condition in Windows TCP/IP, unauthenticated RCE via crafted IPv6 packets. T1190
Vulnerability CVE-2026-32201 Important input validation issue in SharePoint, enables spoofing and information disclosure; observed in the wild. T1195.001

3. MITRE ATT&CK

Code Title
T1190 Exploitation of public‑facing applications (e.g., IKE, Remote Desktop client).
T1210 Exploitation for client execution (Remote Desktop client use‑after‑free).
T1068 Exploitation for privilege escalation (multiple elevation‑of‑privilege bugs).
T1499 Denial of Service via .NET DoS vulnerability.
T1195.001 Supply chain compromise – malicious Snort rules could be used to detect or block exploitation attempts.
T1040 Network sniffing – attackers may monitor crafted packets for IKE/TCP‑IP exploits.
T1064 Scripting – exploitation of Office documents often involves malicious macros.
T1203 Exploitation for remote code execution (Windows IKE, AD RPC).
T1078 Valid Accounts – some exploits require authenticated access (AD RPC).
T1566.001 Phishing: Spearphishing Attachment - Phishing – remote Office exploits often delivered via crafted email attachments.

4. Targets

Type Value
Region Global
Sector Enterprise IT / Windows operating systems

5. Article Details

6. Original text

Blog Microsoft Patch Tuesday for April 2026 - Snort Rule and Prominent Vulnerabilities By Nick Biasini Tuesday, April 14, 2026 16:27 Patch Tuesday Microsoft has released its monthly security update for April 2026, which includes 165 vulnerabilities affecting a wide range of products, including eight Microsoft marked as “critical.”

CVE-2026-23666
is a critical Denial of Service (DoS) vulnerability that affects the .NET framework. Successful exploitation could allow the attacker to deny service over the network.
CVE-2026-32157
is a critical use after free vulnerability in the Remote Desktop Client that results in code execution. Attack requires an authorized user on the client to connect to a malicious server, which could result in code execution on the client.
CVE-2026-32190
is a critical user after free vulnerability in Microsoft Office that can result in local code execution. Attacker is remote but attack is carried out locally. Code from the local machine needs to be executed to exploit the vulnerability.
CVE-2026-33114
is a critical untrusted pointer deference vulnerability in Microsoft Office Word that could allow the attacker to execute code locally. Code from the local machine needs to be executed to exploit this vulnerability.
CVE-2026-33115
is a critical use after free vulnerability in Microsoft Office word that can result in local code execution. Similar to
CVE-2026-33114
and
CVE-2026-32190
the attacker is remote, but code needs to be executed from the local machine to exploit the vulnerability.
CVE-2026-33824
is a critical double free vulnerability in the Widows Internet Key Exchange (IKE) extension, allowing remote code execution. An unauthenticated attacker can send specially crafted packets to a Windows machine with IKE version 2 enabled to potentially enable remote code execution. Additional mitigations can include blocking inbound traffic on UDP ports 500 and 4500 if IKE is not in use.

CVE-2026-33826
is a critical improper input validation in Windows Active Directory that can result in code execution over an adjacent network. Requires an authenticated attacker to send specially crafted RPC calls to an RPC host. Can result in remote code execution. Note that successful exploitation requires the attacker be in the same restricted Active Directory domain as the target system.
CVE-2026-33827
is a critical race condition vulnerability in Windows TCP/IP that can result in remote code execution. Successful exploitation requires the attacker to win a race condition along with additional actions prior to exploitation to prepare the target environment. An unauthenticated actor can send specially crafted IPv6 packets to a Windows node where IPSec is enabled to potentially achieve remote code execution.
CVE-2026-32201
is an important improper input validation vulnerability in Microsoft Office SharePoint that can allow an unauthorized user to perform spoofing. An attacker that successfully exploits this vulnerability could view some sensitive information and make changes to disclosed information. This vulnerability has already been detected as being exploited in the wild. The majority of the remaining vulnerabilities are labeled as important with a two moderate and one low vulnerability also being patched. Talos would like to highlight the several additional  important vulnerabilities that Microsoft has deemed as “more likely” to be exploited.

· CVE-2026-0390 - UEFI Secure Boot Security Feature Bypass Vulnerability · CVE-2026-26151 - Remote Desktop Spoofing Vulnerability · CVE-2026-26169 - Windows Kernel Memory Information Disclosure Vulnerability · CVE-2026-26173 - Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability · CVE-2026-26177 - Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability · CVE-2026-26182 - Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability · CVE-2026-27906 - Windows Hello Security Feature Bypass Vulnerability · CVE-2026-27908 - Windows TDI Translation Driver (tdx.sys) Elevation of Privilege Vulnerability · CVE-2026-27909 - Windows Search Service Elevation of Privilege Vulnerability · CVE-2026-27913 - Windows BitLocker Security Feature Bypass Vulnerability · CVE-2026-27914 - Microsoft Management Console Elevation of Privilege Vulnerability · CVE-2026-27921 - Windows TDI Translation Driver (tdx.sys) Elevation of Privilege Vulnerability · CVE-2026-27922 - Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability · CVE-2026-32070 - Windows Common Log File System Driver Elevation of Privilege Vulnerability · CVE-2026-32075 - Windows UPnP Device Host Elevation of Privilege Vulnerability · CVE-2026-32093 - Windows Function Discovery Service (fdwsd.dll) Elevation of Privilege Vulnerability · CVE-2026-32152 - Desktop Window Manager Elevation of Privilege Vulnerability · CVE-2026-32154 - Desktop Window Manager Elevation of Privilege Vulnerability · CVE-2026-32155 - Desktop Window Manager Elevation of Privilege Vulnerability · CVE-2026-32162 - Windows COM Elevation of Privilege Vulnerability · CVE-2026-32202 - Windows Shell Spoofing Vulnerability · CVE-2026-32225 - Windows Shell Security Feature Bypass Vulnerability · CVE-2026-33825 - Microsoft Defender Elevation of Privilege Vulnerability A complete list of all other vulnerabilities Microsoft disclosed this month is available on its update page .

In response to these vulnerability disclosures, Talos is releasing a new Snort rule set that detects attempts to exploit some of them. Please note that additional rules may be released at a future date and current rules are subject to change pending additional information. Cisco Security Firewall customers should use the latest update to their ruleset by updating their SRU. Open-source Snort Subscriber Rule Set customers can stay up to date by downloading the latest rule pack available for purchase on Snort.org . The rules included in this release that protect against the exploitation of many of these vulnerabilities are: 1:65902-1:65903, 1:66242-1:66251, 1:66259-1:66260, 1:66264-1:66267, 1:66275-1:66276 The following Snort 3 rules are also available: 1:301398, 1:301468-1:3101472, 1:301475, 1:301477-1:301478, 1:301480 Share this post