
Microsoft has released its second-biggest Patch Tuesday ever, addressing a staggering 163 vulnerabilities across its ecosystem. This massive update includes fixes for three zero-day vulnerabilities that are confirmed to be actively exploited in the wild, urging administrators to prioritize patching.
The Scope of the April 2026 Update
The sheer volume of this month’s updates highlights the growing complexity of securing enterprise environments. The vulnerabilities span across various Microsoft products, including Windows OS components, Microsoft Office, Edge, Azure, and specifically, enterprise server solutions.
Of the 163 vulnerabilities, over a dozen are rated “Critical,” meaning they could allow remote code execution (RCE) without user interaction. The remaining are mostly “Important” and “Moderate,” covering elevation of privilege, information disclosure, and denial-of-service flaws.
Active Exploits: CVE-2026-32201
One of the most critical issues addressed is CVE-2026-32201, a Microsoft SharePoint Server spoofing vulnerability. This flaw allows an authenticated attacker to bypass critical security measures, potentially leading to unauthorized access to sensitive corporate data and lateral movement within the network. Evidence suggests threat actors have been leveraging this in targeted attacks.
Two other zero-days, involving Windows Kernel Elevation of Privilege and Windows Print Spooler components, were also observed in limited exploitation chains.
How to check if you’re affected
- Windows Users: Navigate to
Settings > Windows Updateand click “Check for updates”. Apply all available updates, which will include the April cumulative patch. Restart your device to ensure changes take effect. - SharePoint Administrators: You must apply the specific server-side patches immediately. Check your current SharePoint version against the Microsoft Advisory. Updates need to be applied directly to the server nodes. Be sure to run the SharePoint Products Configuration Wizard after installing the patches to fully mitigate the vulnerability.
