Microsoft March and April 2026 Patch Tuesdays Address Multiple Zero-Days and Critical Flaws
Updated: 14.04.2026 21:09
· First: 10.03.2026 19:49
· 📰 8 src / 9 articles
Microsoft’s multi-month Patch Tuesday campaign continues with the April 2026 release of 167 security patches, including two actively exploited zero-days (CVE-2026-32201 in SharePoint Server and CVE-2026-33825 in Microsoft Defender). Eight Critical vulnerabilities were patched, primarily remote code execution flaws, alongside updates for elevation of privilege, security feature bypass, information disclosure, denial of service, and spoofing vulnerabilities. The April updates were distributed through Windows 11 cumulative updates KB5083769 (for versions 25H2/24H2) and KB5082052 (for 23H2), which changed build numbers to 26200.8246 (25H2), 26100.8246 (24H2), and 22631.6936 (23H2). New features included the ability to modify Smart App Control without reinstalling Windows, improved Narrator functionality with Copilot integration, enhanced File Explorer permissions management, and display reliability improvements supporting high refresh rate monitors. Microsoft also addressed System File Checker error reporting issues and confirmed plans for future quality updates including a movable taskbar and reduced Copilot integration. The campaign follows the March 2026 Patch Tuesday which addressed 84 vulnerabilities including two zero-days, with critical updates for SQL Server, Microsoft Office, Excel, and Windows Server 2022 components. Windows 10 Enterprise LTSC and ESU participants now receive the April fixes via KB5082200, updating to build 19045.7184 (Windows 10) or 19044.7184 (Windows 10 Enterprise LTSC 2021). The update also introduces Remote Desktop file phishing protections, Secure Boot certificate rollout indicators, and resolves BitLocker Recovery issues on Intel-based devices.