Microsoft April 2026 Patch Tuesday releases 165 fixes, including critical RCE and DoS bugs in .NET, Remote Desktop, Office, IKE, AD and TCP/IP; Talos adds Snort rules to detect exploits; mitigation guidance includes blocking IKE ports.
| IOC Type | Value | Description | Relevant MITRE ATT&CK Techniques |
|---|---|---|---|
| Vulnerability | CVE-2026-23666 | Critical DoS in .NET Framework; network‑level denial of service. | T1499 |
| Vulnerability | CVE-2026-32157 | Critical use‑after‑free in Remote Desktop client, leads to code execution on client when connecting to malicious server. | T1210 |
| Vulnerability | CVE-2026-32190 | Critical use‑after‑free in Microsoft Office, enables local code execution. | T1068 |
| Vulnerability | CVE-2026-33114 | Critical untrusted pointer dereference in Office Word, local code execution. | T1068 |
| Vulnerability | CVE-2026-33115 | Critical use‑after‑free in Office Word, local code execution. | T1068 |
| Vulnerability | CVE-2026-33824 | Critical double‑free in IKE extension, remote code execution via crafted UDP packets. | T1190 |
| Vulnerability | CVE-2026-33826 | Critical input validation flaw in Active Directory RPC, requires authentication within same AD domain for RCE. | T1078 |
| Vulnerability | CVE-2026-33827 | Critical race condition in Windows TCP/IP, unauthenticated RCE via crafted IPv6 packets. | T1190 |
| Vulnerability | CVE-2026-32201 | Important input validation issue in SharePoint, enables spoofing and information disclosure; observed in the wild. | T1195.001 |
| Code | Title |
|---|---|
| T1190 | Exploitation of public‑facing applications (e.g., IKE, Remote Desktop client). |
| T1210 | Exploitation for client execution (Remote Desktop client use‑after‑free). |
| T1068 | Exploitation for privilege escalation (multiple elevation‑of‑privilege bugs). |
| T1499 | Denial of Service via .NET DoS vulnerability. |
| T1195.001 | Supply chain compromise – malicious Snort rules could be used to detect or block exploitation attempts. |
| T1040 | Network sniffing – attackers may monitor crafted packets for IKE/TCP‑IP exploits. |
| T1064 | Scripting – exploitation of Office documents often involves malicious macros. |
| T1203 | Exploitation for remote code execution (Windows IKE, AD RPC). |
| T1078 | Valid Accounts – some exploits require authenticated access (AD RPC). |
| T1566.001 | Phishing: Spearphishing Attachment - Phishing – remote Office exploits often delivered via crafted email attachments. |
| Type | Value |
|---|---|
| Region | Global |
| Sector | Enterprise IT / Windows operating systems |
Blog Microsoft Patch Tuesday for April 2026 - Snort Rule and Prominent Vulnerabilities By Nick Biasini Tuesday, April 14, 2026 16:27 Patch Tuesday Microsoft has released its monthly security update for April 2026, which includes 165 vulnerabilities affecting a wide range of products, including eight Microsoft marked as “critical.”
· CVE-2026-0390 - UEFI Secure Boot Security Feature Bypass Vulnerability · CVE-2026-26151 - Remote Desktop Spoofing Vulnerability · CVE-2026-26169 - Windows Kernel Memory Information Disclosure Vulnerability · CVE-2026-26173 - Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability · CVE-2026-26177 - Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability · CVE-2026-26182 - Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability · CVE-2026-27906 - Windows Hello Security Feature Bypass Vulnerability · CVE-2026-27908 - Windows TDI Translation Driver (tdx.sys) Elevation of Privilege Vulnerability · CVE-2026-27909 - Windows Search Service Elevation of Privilege Vulnerability · CVE-2026-27913 - Windows BitLocker Security Feature Bypass Vulnerability · CVE-2026-27914 - Microsoft Management Console Elevation of Privilege Vulnerability · CVE-2026-27921 - Windows TDI Translation Driver (tdx.sys) Elevation of Privilege Vulnerability · CVE-2026-27922 - Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability · CVE-2026-32070 - Windows Common Log File System Driver Elevation of Privilege Vulnerability · CVE-2026-32075 - Windows UPnP Device Host Elevation of Privilege Vulnerability · CVE-2026-32093 - Windows Function Discovery Service (fdwsd.dll) Elevation of Privilege Vulnerability · CVE-2026-32152 - Desktop Window Manager Elevation of Privilege Vulnerability · CVE-2026-32154 - Desktop Window Manager Elevation of Privilege Vulnerability · CVE-2026-32155 - Desktop Window Manager Elevation of Privilege Vulnerability · CVE-2026-32162 - Windows COM Elevation of Privilege Vulnerability · CVE-2026-32202 - Windows Shell Spoofing Vulnerability · CVE-2026-32225 - Windows Shell Security Feature Bypass Vulnerability · CVE-2026-33825 - Microsoft Defender Elevation of Privilege Vulnerability A complete list of all other vulnerabilities Microsoft disclosed this month is available on its update page .
In response to these vulnerability disclosures, Talos is releasing a new Snort rule set that detects attempts to exploit some of them. Please note that additional rules may be released at a future date and current rules are subject to change pending additional information. Cisco Security Firewall customers should use the latest update to their ruleset by updating their SRU. Open-source Snort Subscriber Rule Set customers can stay up to date by downloading the latest rule pack available for purchase on Snort.org . The rules included in this release that protect against the exploitation of many of these vulnerabilities are: 1:65902-1:65903, 1:66242-1:66251, 1:66259-1:66260, 1:66264-1:66267, 1:66275-1:66276 The following Snort 3 rules are also available: 1:301398, 1:301468-1:3101472, 1:301475, 1:301477-1:301478, 1:301480 Share this post