Microsoft patches Defender zero-day that could give attackers SYSTEM privileges


Microsoft has fixed a publicly disclosed zero-day in Microsoft Defender that could let a local attacker raise privileges to SYSTEM, the highest level of access on a Windows machine. The flaw, tracked as CVE-2026-33825, affects the Microsoft Defender Antimalware Platform and carries a CVSS 3.1 score of 7.8.

This is a local privilege escalation bug, not a remote code execution flaw. The published CVSS vector shows low attack complexity, low privileges required, and no user interaction, which means an attacker needs a foothold first but can then move quickly to full SYSTEM rights on a vulnerable device.

Microsoft has not said the flaw was exploited in the wild, but it did mark the issue as publicly disclosed. Rapid7’s Patch Tuesday review says Microsoft was aware of public disclosure before the patch landed, which is why many researchers are treating it as a zero-day in the disclosure sense rather than an actively exploited one.

What the Defender bug does

The vulnerability stems from insufficient granularity of access control in Microsoft Defender. NVD and the CVE record both use that exact description and map it to CWE-1220.

If an attacker successfully exploits the bug, they can jump from a low-privileged local context to SYSTEM. That level of access can let an intruder disable protections, install persistent malware, read sensitive data, and create or modify privileged accounts. Those outcomes follow from standard SYSTEM-level control on Windows, and multiple Patch Tuesday reviews flagged that as the core risk.

The issue matters because it hits Defender itself. When a security product becomes the path to full privilege escalation, attackers can use a modest foothold to turn a protected machine into a fully compromised one.

Key detailStatus
CVECVE-2026-33825
ComponentMicrosoft Defender Antimalware Platform
SeverityImportant
CVSS7.8
Attack typeLocal privilege escalation
Exploitation statusPublicly disclosed, no confirmed in-the-wild exploitation in the sources reviewed
Fixed versionDefender platform 4.18.26030.3011

Patch details and affected versions

The fix is tied to the Microsoft Defender Antimalware Platform version, not a normal Windows cumulative update alone. Microsoft’s current Defender update page lists platform version 4.18.26030.3011, and Tenable says systems running an earlier Antimalware Platform version are vulnerable to CVE-2026-33825.

That means admins should verify the Defender platform version directly, especially in managed environments where engine and platform updates may lag behind regular Windows patching. Microsoft’s Defender for Endpoint release notes also list platform version 4.18.26030.3011.

Rapid7 says no manual action should be necessary in most cases because Defender platform updates usually install automatically. Even so, large organizations should still confirm deployment through their update tools rather than assume every endpoint pulled the fix.

What defenders should do now

Patch validation comes first. Check whether endpoints run Defender platform version 4.18.26030.3011 or later, then investigate any device that still reports an older platform build.

Security teams should also remember the attack path here. This flaw needs local access or an existing low-privilege foothold, so it pairs naturally with phishing, stolen credentials, malware drops, or another initial compromise. On its own, it does not break into a machine from the internet.

The practical risk is that once an attacker lands on the device, this bug can help them finish the job. That makes it a strong patching priority even without confirmed active exploitation.

Immediate steps

  • Check Defender platform versions across all Windows endpoints.
  • Update any device below 4.18.26030.3011.
  • Prioritize endpoints where users have local access and sensitive data lives.
  • Review EDR alerts for attempts to gain SYSTEM privileges after initial access.
  • Confirm automatic Defender platform updates still work in your software distribution stack.

FAQ

Is CVE-2026-33825 a true zero-day?

It was publicly disclosed before Microsoft shipped the fix, which fits the common zero-day disclosure definition. The sources I reviewed do not show confirmed in-the-wild exploitation as of April 17, 2026.

Can this bug be exploited remotely?

No. The published CVSS vector says the attack requires local access and low privileges.

What does the attacker gain?

Successful exploitation can raise access to SYSTEM, which gives near-total control over the affected Windows machine.

What version fixes it?

Microsoft’s current published Defender platform version is 4.18.26030.3011, and outside vulnerability tracking says earlier platform versions are affected.

Readers help support VPNCentral. We may get a commission if you buy through our links. Tooltip Icon

Read our disclosure page to find out how can you help VPNCentral sustain the editorial team Read more

User forum

0 messages