April 2026 Patch Tuesday: 10 Critical Security Updates You Must Apply Now

By ✦ min read

April 2026 delivered a monumental Patch Tuesday from Microsoft, with a staggering 167 vulnerabilities fixed—the second-highest count ever. Among them are a SharePoint Server zero-day under active attack, a publicly disclosed Windows Defender flaw, plus emergency patches from Google and Adobe. This listicle breaks down the ten most critical updates you need to know, with expert insights and actionable advice to keep your systems safe.

1. Record-Breaking Patch Tuesday: 167 Vulnerabilities Addressed

Microsoft’s April 2026 update set a new benchmark for volume, patching 167 security holes across Windows, Office, and related software. According to Satnam Narang of Tenable, this is the second-largest Patch Tuesday ever, trailing only a previous record. Nearly 60 of these flaws reside in the Edge browser, which is built on Chromium. While the sheer number can be overwhelming, prioritizing the most dangerous vulnerabilities is crucial. Attackers are already exploiting some of these flaws, so immediate deployment of these patches is strongly recommended. The update includes fixes for privilege escalation, remote code execution, and spoofing issues.

April 2026 Patch Tuesday: 10 Critical Security Updates You Must Apply Now
Source: krebsonsecurity.com

2. SharePoint Server Zero-Day Under Active Attack (CVE-2026-32201)

Microsoft warns that attackers are actively exploiting CVE-2026-32201, a spoofing vulnerability in SharePoint Server. This flaw allows adversaries to present falsified content within trusted SharePoint environments. Mike Walters of Action1 explains that it enables phishing attacks, unauthorized data manipulation, and social engineering campaigns that can lead to further compromise. Because SharePoint is often used for internal collaboration, a successful attack could deceive employees, partners, or customers. Organizations using SharePoint Server should apply this patch urgently and review any suspicious activity in their environments.

3. BlueHammer: Windows Defender Privilege Escalation (CVE-2026-33825)

Dubbed “BlueHammer,” this privilege escalation bug in Windows Defender allows an attacker to gain elevated system access. The vulnerability was publicly disclosed after the researcher who discovered it grew frustrated with Microsoft’s response. Exploit code was published, but Will Dormann of Tharros confirmed that installing the April patches renders that code ineffective. Still, the disclosure means that attackers had a window of opportunity before the fix. Ensure your systems are updated to close this gap. BlueHammer serves as a reminder that even security software can have critical flaws.

4. Google Chrome’s Fourth Zero-Day of 2026

Google released an emergency update for Chrome to fix its fourth zero-day vulnerability of 2026. Details are sparse, but such patches typically address actively exploited flaws that could lead to remote code execution or information disclosure. Chrome users should update their browsers immediately—either by restarting the browser or checking for updates in the settings. Because Chrome updates are seamless, most users will get the fix automatically, but it’s wise to confirm the latest version is installed. This zero-day follows a trend of increasing discoveries, which some experts link to advancements in AI-driven vulnerability research.

5. Adobe Reader Emergency Patch for Actively Exploited Flaw (CVE-2026-34621)

Adobe issued an emergency update on April 11 for CVE-2026-34621, a critical vulnerability in Adobe Reader that allows remote code execution. Satnam Narang reports indications that this flaw has been actively exploited since at least November 2025. Attackers can craft malicious PDF files that, when opened, execute arbitrary code. Given the long exploitation window, it’s crucial to apply the patch even if you haven’t noticed issues. Adobe Reader is a ubiquitous tool for reading documents, making this a high-risk vulnerability for both individuals and enterprises.

6. Expert Insights: Increased Organizational Risk from Phishing via SharePoint

Mike Walters emphasizes that the active exploitation of the SharePoint zero-day (CVE-2026-32201) significantly increases organizational risk. Attackers can launch convincing phishing campaigns from within trusted SharePoint sites, making it hard for employees to distinguish legitimate from malicious content. Walters recommends reviewing SharePoint permissions, enabling multi-factor authentication, and educating users about the threat. The spoofing nature means even security-aware staff might be fooled. This vulnerability underscores the importance of patching collaboration platforms promptly and monitoring for anomalous behavior.

April 2026 Patch Tuesday: 10 Critical Security Updates You Must Apply Now
Source: krebsonsecurity.com

7. The BlueHammer Aftermath: Public Exploit Code Neutralized

After the researcher published exploit code for BlueHammer, the security community scrambled to assess the risk. Will Dormann confirmed that the April patches break the public exploit, effectively neutralizing it. However, the incident raises questions about disclosure timelines and researcher frustrations. Organizations that had not yet patched were exposed during the gap. This highlights the need for faster patch deployment and better communication between vendors and researchers. BlueHammer also demonstrates that even foundational security tools like Windows Defender are not immune to privilege escalation bugs.

8. Browser Vulnerabilities Surge: Nearly 60 Flaws in Edge

Microsoft Edge received nearly 60 vulnerability fixes this month, a record number for a single browser update. Adam Barnett of Rapid7 notes that this spike likely stems from the Chromium engine’s broad researcher community and possibly from AI-driven vulnerability discovery. While no browser is immune, the volume suggests constant scrutiny. Users should ensure automatic updates are enabled and restart the browser to apply the fixes. The surge also means that attackers have many potential entry points, so keeping browsers current is a simple but effective security measure.

9. The AI Connection: Project Glasswing and Expanding Capabilities

Adam Barnett speculates that the increase in vulnerability reports may be tied to Project Glasswing, a new AI capability from Anthropic that excels at finding bugs. Although announced a week before Patch Tuesday, its influence might be indirect. Barnett concludes that AI is driving greater vulnerability discovery, and we should expect this trend to continue. While AI helps defenders find flaws faster, it also aids attackers in identifying exploits. This arms race means timely patching becomes even more critical. The April update is a harbinger of ever-growing security update volumes.

10. Critical Advice: Restart Your Browser After Patching

A simple but often overlooked step: after installing browser updates, completely close and restart the browser. Many updates only take effect when the browser is fully shut down and relaunched. Additionally, ensure all extensions are up to date. This advice applies to Chrome, Edge, Firefox, or any browser. Restarting clears old processes and loads the patched code. It’s a quick action that can prevent many browser-based attacks. Make it part of your routine whenever you apply system or browser updates.

This April Patch Tuesday underscores the accelerating pace of vulnerability discovery and the importance of proactive patching. From actively exploited zero-days to record-breaking browser fixes, attackers are moving quickly. By prioritizing these ten updates—especially the SharePoint zero-day, BlueHammer, Chrome, and Adobe Reader patches—you can significantly reduce your risk. Stay vigilant, keep systems updated, and remind users to restart browsers after updates. The security landscape is evolving, and timely action remains your best defense.

Tags:

Recommended

Discover More

Grafana Cloud k6 Launches Centralized Secrets Management to Eliminate Credential Sprawl in Performance TestingBuilding with Perplexity's Mac-Native Personal Computer Platform: A Comprehensive GuideHow to Seize an Enemy Position Using Only Unmanned Systems: A Step-by-Step GuideThe Go Source-Level Inliner: 5 Essential Insights for Modernizing Your CodeMeta Threatens to Remove Facebook, Instagram, WhatsApp from New Mexico Over 'Impossible' Safety Demands