Concise Cyber

Subscribe below for free to get these delivered straight to your inbox

Advertisements
Microsoft Defender Zero-Days: Active Exploitation Reported for Two Unpatched Flaws
Advertisements

A critical security situation has emerged involving Microsoft Defender, as threat actors have begun weaponizing three recently disclosed zero-day vulnerabilities. The flaws, which were released publicly by a researcher known as Chaotic Eclipse (or Nightmare-Eclipse), stem from a dispute over Microsoft’s vulnerability disclosure protocols. While Microsoft has addressed one of the issues in its most recent update cycle, two remaining vulnerabilities continue to pose a significant risk to unpatched systems.

The Origin of the ‘Chaotic’ Disclosures

The vulnerabilities—codenamed BlueHammer, RedSun, and UnDefend—entered the public domain as zero-days after the researcher expressed dissatisfaction with Microsoft’s handling of the reporting process. This unconventional release provided threat actors with an immediate window of opportunity. Security firm Huntress has confirmed that these flaws are not merely theoretical; they have been observed in active, hands-on-keyboard attacks since early April 2026.

Technical Breakdown: Escalation and Denial of Service

The three vulnerabilities target different aspects of the Defender ecosystem, ranging from privilege elevation to the disruption of security updates. Security analysts have categorized the risks as follows:

  • BlueHammer (CVE-2026-33825): A local privilege escalation (LPE) flaw that allows an attacker with limited access to gain higher-level permissions on a compromised host.
  • RedSun: Another LPE vulnerability that remains unpatched, enabling attackers to elevate their control over the targeted environment.
  • UnDefend: A Denial-of-Service (DoS) exploit that effectively neutralizes Defender’s ability to receive and apply new security definitions, leaving the system blind to emerging threats.

Observation of Hands-on-Keyboard Activity

According to telemetry from Huntress, the exploitation of BlueHammer began as early as April 10, 2026. By April 16, proof-of-concept exploits for RedSun and UnDefend were also seen in use. Attackers have been observed using typical enumeration commands such as whoami /priv and net group immediately following the exploitation of these flaws. This behavior indicates that the vulnerabilities are being used as a foothold for deeper lateral movement within enterprise networks.

Current Patch Status and Recommendations

As of the latest reports, Microsoft has officially patched the BlueHammer vulnerability via CVE-2026-33825 in the recent Patch Tuesday updates. However, RedSun and UnDefend do not currently have an official fix. Microsoft has stated they are committed to investigating reported issues and protecting customers, but they continue to emphasize the importance of coordinated vulnerability disclosure to prevent such zero-day scenarios. Organizations are advised to monitor their endpoint logs for unusual privilege escalation activity and isolate high-risk systems until full remediation is available.

In conclusion, the exploitation of these Defender zero-days highlights the ongoing tension between independent researchers and major software vendors. With two of the three flaws still lacking a patch, administrators must remain vigilant and prioritize the deployment of existing updates to mitigate at least one of the primary attack vectors.

All articles are written here with the help of AI on the basis of openly available information which cannot be independently verified. We do strive to quote the relevant sources.The intent is only to summarise what is already reported in public forum in our own wordswith no intention to plagarise or copy other person’s work.The publisher has no intent to defame or cause offence to anyone, any person or any organisation at any moment.The publisher assumes no responsibility for any damage or loss caused by making decisions on the basis of whatever is published on cyberconcise.com.You’re advised to do your own checks and balances before making any decision, and owners and publishers at cyberconcise.com cannot be held accountable for its resulting ramifications.If you have any objections, concerns or point out anything factually incorrect, please reach out using the form on https://concisecyber.com/about/

Discover more from Concise Cyber

Subscribe now to keep reading and get access to the full archive.

Continue reading