Disclosed on April 14, 2026, the flaw is tracked as CVE-2026-33825 and carries an “Important” severity rating.
If successfully exploited, this elevation-of-privilege vulnerability allows an attacker to bypass standard permissions and gain full SYSTEM privileges on the affected machine.
The core issue stems from insufficient access-control granularity (CWE-1220) within the Microsoft Defender Antimalware Platform.
This platform consists of user-mode binaries, such as MsMpEng.exe, and kernel-mode drivers designed to protect Windows devices.
Because of the access control weakness, an authorized attacker with basic local access can exploit the flaw to elevate their permissions to the highest level.
Gaining SYSTEM privileges represents a critical threat to organizational security. It allows attackers to turn off security tools, install persistent malware, access sensitive data, and create new accounts with full administrative rights.
According to Microsoft’s CVSS 3.1 scoring, the vulnerability has a base score of 7.8.
Key technical characteristics of the flaw include:
Security researchers Zen Dodd and Yuanpei XU reported the vulnerability to Microsoft. While the technical details of the flaw are publicly disclosed, Microsoft notes that it has not yet been exploited in the wild.
However, the company assesses that exploitation is “More Likely,” meaning threat actors are expected to develop and deploy working exploit code soon.
Interestingly, enterprise vulnerability scanners might flag systems where Microsoft Defender is disabled. This happens because the affected binary files remain on the hard drive.
Microsoft clarifies that systems with disabled Defender are not actually in an exploitable state, though updating is still recommended.
Microsoft frequently updates malware definitions and the underlying platform to protect against emerging threats. In most enterprise environments and for home users, default configurations will automatically download and install these critical updates.
The vulnerability affects platform versions up to 4.18.26020.6 and is fully patched in version 4.18.26030.3011. Organizations and users should manually verify their update status to ensure complete protection.
To check your current version:
Administrators should regularly audit their software distribution tools to confirm that automatic deployments of the Windows Defender Antimalware Platform are functioning correctly across their networks.
Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.
The post Microsoft Defender 0-Day Vulnerability Enables Privilege Escalation Attack appeared first on Cyber Security News.
Lawo and swXtch.io have entered into a memorandum of understanding to integrate swXtch.io’s groundSwXtch software-defined…
The post Haivision Launches Falkon X4 5G Transmitters appeared first on TV News Check.
The post NAB Show: Vinten To Showcase New Versine 240 Fluid Head, PTZ Control appeared…
The post JB&A Spotlights Exhibitors Ahead Of NAB Show appeared first on TV News Check.
Wowza will attend the NAB Show in Las Vegas, April 18-22, in Meeting Room W2674,…
Saga, a story-centric newsroom system, rolled out new features designed to speed daily production and…
This website uses cookies.