Microsoft April 2026 Patch Tuesday: ​
167 Vulnerabilities Fixed, Including 2 Zero-Days and Critical Secure Boot Updates

Stay ahead of critical vulnerabilities with our breakdown of this month's Microsoft security patches.

Release Date: April 14, 2026 KB Articles: KB5083769 (Windows 11 25H2/24H2) · KB5082052 (Windows 11 23H2) · KB5083768 (Windows 11 26H1) OS Builds: 26200.8246 / 26100.8246

Key Takeaways

  • 167 vulnerabilities patched, one of Microsoft's largest monthly releases of the year, with 11 rated Critical
  • 2 zero-days addressed: a publicly disclosed RDP Remote Code Execution flaw and a Windows Kernel Privilege Escalation vulnerability
  • Secure Boot deadline approaching fast, the original 2011 certificates expire June 26, 2026 (73 days away); April's update begins targeted certificate rollouts with a new Windows Security status dashboard
  • BitLocker Recovery bug fixed,  devices incorrectly entering recovery mode after March's Secure Boot update are now resolved
  • Reset This PC failure fixed,  the "Keep my files" / "Remove everything" options broken by March's Hotpatch (KB5079420) are now restored
  • Remote Desktop phishing hardening.rdp files now display all connection settings before connecting, with a one-time security warning on first use
  • Elevation of Privilege dominates, EoP flaws account for nearly half of all patches, reflecting the aggressive Q1 2026 threat trend
  • Deploy immediately on RDP-exposed systems; use staged rollout for the broader fleet given March's update quality concerns

Overview

Microsoft's April 2026 Patch Tuesday is one of the largest security updates of the year, addressing 167 vulnerabilities across Windows, Microsoft Office, Remote Desktop Services, and other core components. The release includes fixes for 2 zero-day vulnerabilities and delivers significant improvements around Secure Boot certificate management, an area of critical urgency as legacy 2011 certificates approach their June 26, 2026 expiration.

Coming off a turbulent March that saw multiple out-of-band emergency releases and failed installations, April's update also resolves a known issue causing device resets to fail after the March 2026 Hotpatch. IT and security teams should treat this update as high priority and begin deployment immediately, with particular focus on the zero-days and Secure Boot remediation.

Effective patch management is the cornerstone of endpoint security, and April's release underlines why a structured, automated deployment process is no longer optional for enterprise environments.

Vulnerability Summary

 

SeverityCount
Critical11
Important149
Moderate7
Total167

 

Vulnerability CategoryCount
Elevation of Privilege (EoP)79
Remote Code Execution (RCE)29
Security Feature Bypass18
Information Disclosure14
Denial of Service (DoS)12
Spoofing8
Other7

Note: This total does not include separately patched Microsoft Edge (Chromium) or Azure cloud-side-only vulnerabilities released earlier in the month. For full CVE details, see the Microsoft Security Update Guide for April 2026.

Zero-Day Vulnerabilities - Patch Immediately

April 2026 addresses two zero-day vulnerabilities. Both were publicly disclosed before this release, meaning technical details are circulating in the security community and exploitation risk is elevated. For background on how zero-day vulnerabilities are discovered and weaponized, see Zecurit's security hub.

Zero-Day 1 : Remote Desktop Protocol (RDP) Remote Code Execution

Component: Windows Remote Desktop Protocol (RDP) Impact: Remote Code Execution (unauthenticated) Priority: Critical

This zero-day affects Windows' Remote Desktop Protocol implementation, potentially allowing an attacker to execute arbitrary code on a target system without authentication. Organizations relying on RDP for remote administration must prioritize this patch above all others in this cycle.

Beyond the vulnerability patch itself, Microsoft has introduced an important anti-phishing hardening measure for .rdp files: when a user opens an .rdp file, Remote Desktop now displays all requested connection settings before connecting, with each setting disabled by default. A one-time security warning also appears the first time an .rdp file is opened on a device. This directly addresses a documented attack vector where threat actors deliver malicious .rdp files via phishing emails to establish unauthorized remote sessions. You can learn more about monitoring Remote Desktop connections in our knowledge base.

Zero-Day 2 : Windows Kernel Privilege Escalation

Component: Windows Kernel Impact: Local Elevation of Privilege (SYSTEM-level access) Priority: High

This publicly disclosed zero-day allows a local attacker to elevate system privileges, potentially gaining full control. The fix strengthens kernel-level security checks and access controls. While local access is required, privilege escalation flaws like this are routinely chained with phishing, malicious attachments, or lateral movement from already-compromised endpoints to complete full attack chains. Defenders should enable endpoint monitoring and alerts to detect unusual privilege activity in the post-deployment window.

Secure Boot Certificate Expiration : Critical Action Required Before June 26

One of the most operationally significant aspects of April's update is the continued rollout of updated Secure Boot certificates, addressing the impending expiration of the original 2011 certificates on June 26, 2026, now just 73 days away.

This is no longer a future planning item. It is an active remediation requiring immediate attention across your entire fleet.

What's New in April's Update

Windows Security App Visibility: April introduces a Secure Boot certificate update status display in the Windows Security app (Settings > Privacy & Security > Windows Security), including badge notifications and status alerts. Learn more about Secure Boot certificate update status. Note this feature is disabled by default on commercial devices.

Broader Device Targeting: Windows quality updates now include additional high-confidence device targeting data, increasing the pool of devices eligible to automatically receive new Secure Boot certificates in a controlled, phased rollout.

BitLocker Recovery Bug Fix: This update resolves a critical issue where devices entered BitLocker Recovery mode after Secure Boot certificate updates, disrupting organizations that had already begun rolling out March's update. If you rely on BitLocker encryption, this fix is essential before further Secure Boot remediation. Zecurit's BitLocker management guide and BitLocker recovery key guide can help if devices need manual recovery.

What Happens After June 26, 2026?

Devices without updated 2023 Secure Boot certificates will continue to boot normally, but will:

  • Stop receiving security fixes for Windows Boot Manager
  • Lose protection against bootkit malware such as BlackLotus (CVE-2023-24932)
  • Fail to trust third-party software signed with newer certificates

Action now: Verify Secure Boot compliance using Confirm-SecureBootUEFI in PowerShell or via System Information. Note that some systems manufactured between 2012 and 2025 also require OEM firmware/BIOS updates to accept new UEFI certificates, this is hardware-level work that cannot be delivered by Windows Update alone. See Microsoft's full Secure Boot Certificate Expiration and CA Updates guidance for preparation steps.

Additional Notable Fixes

Reset This PC - Known Issue Resolved

This update fixes a failure in the "Keep my files" and "Remove everything" device reset options introduced by the March 2026 Hotpatch (KB5079420). Organizations that needed to re-image or reset endpoints since March will now be unblocked.

SMB Compression over QUIC - Reliability Improvement

This update improves reliability when Windows uses SMB compression over QUIC, reducing timeout failures and supporting more dependable enterprise network performance. This is particularly relevant for environments using direct SMB access over the internet or cloud-hosted Windows shares.

Elevation of Privilege at Scale

EoP flaws account for nearly half of all 167 patches this month. Understanding privilege escalation is critical for defenders, as these vulnerabilities are the primary mechanism attackers use to move from initial access to full system compromise. Combine prompt patching with strong endpoint privilege management practices to limit the blast radius of any breach.

Remote Code Execution in Core Components

Multiple remote code execution vulnerabilities affect Windows Server, Office, and network services. Internet-facing and externally accessible systems should be prioritized in your deployment schedule. For Windows Server management environments, this release patches RCE flaws across Windows Server 2019, 2022, and 2025.

Windows Update Details by Version

OS VersionKB ArticleBuild NumberLink
Windows 11, version 26H1KB508376828000.1836View KB
Windows 11, version 25H2KB508376926200.8246View KB
Windows 11, version 24H2KB508376926100.8246View KB
Windows 11, version 23H2KB508205222631.6936View KB

For the full Windows servicing history, visit the Windows Release Health Dashboard and the Windows Message Center.

Q1 2026 Threat Context: An Escalating Vulnerability Landscape

April's 167-vulnerability release must be viewed in the context of a relentlessly active Q1 2026. Reviewing our January 2026 Patch Tuesday and February 2026 Patch Tuesday breakdowns reveals how the threat landscape has accelerated month over month:

MonthCVEs PatchedZero-DaysCritical
January 20261123 (1 actively exploited)8
February 2026586 (all actively exploited)5
March 2026842 (publicly disclosed)8
April 20261672 (publicly disclosed)11

February's six actively exploited zero-days, including a SmartScreen bypass (CVE-2026-21510), MSHTML Framework bypass (CVE-2026-21513), and Remote Desktop Services EoP (CVE-2026-21533) discovered by CrowdStrike , illustrated just how aggressively attackers are targeting Windows components. March's AI-discovered CVSS 9.8 RCE flaw further signalled that the pace of vulnerability discovery is accelerating. April's 167-vulnerability count is the year's largest Patch Tuesday to date.

The day after Patch Tuesday is widely known as "Exploit Wednesday" , when threat actors reverse-engineer newly released patches to develop working exploits for still-unpatched systems. With 11 actively exploited zero-days documented across Q1 2026, a rapid and well-planned patch deployment strategy is essential.

Patch Management Recommendations

Given the scale of this release and the lessons from March's problematic rollout, organizations should follow a risk-tiered deployment approach. A mature vulnerability management program backed by automated endpoint management tooling will be especially important for large fleets.

Immediate Priority : Deploy Within 24–48 Hours

  • RDP zero-day patch on all systems with Remote Desktop Services enabled
  • Windows Kernel privilege escalation zero-day on all endpoints and servers
  • All 11 Critical-rated CVEs

High Priority : Deploy Within 1 Week

  • EoP and RCE vulnerabilities rated Important across Windows Server, Windows 11, and Office
  • Secure Boot certificate update verification and remediation planning (June 26 deadline)
  • BitLocker configuration review post-update for any device that entered recovery mode

Operational Best Practices

  • Pilot before broad rollout, March 2026 showed that immediate large-scale deployment can surface compatibility issues. Use deployment scheduling to stage updates across pilot groups before production tiers.
  • Run vulnerability scanning to identify unpatched systems and track remediation progress in real time.
  • Verify Secure Boot compliance using PowerShell (Confirm-SecureBootUEFI) or System Information before the June 26, 2026 deadline.
  • Coordinate with OEM firmware schedules, some hardware requires BIOS-level UEFI certificate updates outside of Windows Update.
  • Monitor CISA's KEV catalog for any escalation of April's zero-days to actively exploited status.
  • Enable endpoint monitoring and alerts to detect unusual privilege activity, process spawning, or failed authentication in the days after deployment.
  • Use remote script execution to run compliance checks and collect Secure Boot status at scale across your managed fleet, Zecurit's IT automation script library includes scripts useful for post-patch verification.
  • Review reports and auditing dashboards after rollout to confirm patch success rates and identify any devices requiring manual follow-up.

Compliance Considerations

Organizations operating under HIPAA, GDPR, PCI-DSS, or other regulatory frameworks have a mandated obligation to apply security patches within defined windows. The two publicly disclosed zero-days in this release, combined with CISA's history of adding Microsoft vulnerabilities to the KEV catalog within days of Patch Tuesday, mean that federal agencies and regulated enterprises must treat April's deployment as non-deferrable. Federal Civilian Executive Branch (FCEB) agencies should note that CISA mandates KEV-listed vulnerabilities be remediated by defined deadlines.

The Zero Trust security model reinforces why patch status must be treated as a condition of device trust. Unpatched endpoints, particularly those with the RDP zero-day unresolved, should be treated as untrusted until confirmed compliant, especially in environments using Zero Trust network access principles.

For organizations still managing Windows 10 endpoints that reached end-of-life in October 2025, note that extended security updates (ESU) continue to be released. Zecurit's Windows 10 end-of-life guide covers your ESU options and migration planning path to Windows 11.

Third-Party Updates Alongside April 2026 Patch Tuesday

Other vendors also released security updates this cycle. Administrators managing broader environments should review:

Keeping pace with top cybersecurity vulnerabilities across the third-party landscape is an important complement to Windows patching, especially for organizations with diverse software estates.

Resources and Reference

Microsoft Official Sources

Security Community Coverage

Zecurit Endpoint Management Resources

Posted by Zecurit | Endpoint Management & Patch Intelligence | April 14, 2026

Patch Tuesday: CVE Details

Below is a detailed list of the security patches and CVEs released in this month's Patch. This information is fetched directly from the Microsoft Security Response Center (MSRC) to help you stay protected with the latest patches.

What is Patch Tuesday and Why is it so Important?

Introduced by Microsoft in 2003, Patch Tuesday was created to bring order to the chaotic world of software updates. Before this schedule, updates were released sporadically, making it difficult for IT teams to plan their patching efforts.

Today, the predictable monthly schedule allows administrators to prepare for the deployment of these patches. However, the importance of Patch Tuesday goes beyond simple scheduling:

  • Proactive Vulnerability Management: It is Microsoft's primary mechanism for addressing publicly known Common Vulnerabilities and Exposures (CVEs) in its products.

  • Averting Cyberattacks: Timely patching is the most effective way to prevent cybercriminals from exploiting known weaknesses. For every patch Microsoft releases, attackers race to reverse-engineer the update to find the underlying vulnerability and develop an exploit for unpatched systems—a phenomenon often referred to as "Exploit Wednesday."

  • System Stability: Beyond security, these updates often contain important bug fixes and performance enhancements that ensure your systems run smoothly.

Patch Management Best Practices for Businesses

Effectively handling Patch Tuesday updates is a core responsibility for any IT team. Simply installing the patches isn't enough; a well-defined process is needed to minimize risk and prevent system downtime.

Here are some best practices for managing your patching cycle:

  1. Prioritize Patches: Not all patches are created equal. Focus on deploying updates with a "Critical" or "Important" severity rating first, as these address the most severe vulnerabilities.

  2. Test Before Deployment: Never roll out patches to your entire organization without testing them first. Use a staging or lab environment that mirrors your production systems to check for any compatibility issues or bugs.

  3. Automate the Process: Tools like Windows Server Update Services (WSUS) and Microsoft Endpoint Configuration Manager (SCCM) are indispensable for automating the deployment of patches. Automation saves time, reduces human error, and ensures consistency across your network.

  4. Monitor and Verify: After deployment, actively monitor systems to ensure the patches were installed correctly and did not cause any unexpected issues. A rollback plan should be in place to quickly revert any problematic updates.

  5. Stay Informed: Follow official Microsoft security channels and industry news to stay up-to-date on any out-of-band updates (critical patches released outside of the normal schedule) or known issues with the monthly patches.

Understanding CVEs: What to Look For

Patch Tuesday updates are tied to specific CVEs. A CVE (Common Vulnerabilities and Exposures) is a unique ID number assigned to a publicly known security flaw. Each CVE entry provides a brief description of the vulnerability, allowing security professionals to track and prioritize fixes.

When reviewing our monthly list of CVEs, pay close attention to:

  • Severity Rating: Microsoft assigns a severity rating (Critical, Important, Moderate, Low) to each vulnerability. Critical vulnerabilities, which could allow remote code execution without user interaction, should be your highest priority.

  • Exploitability: The "Exploited" status indicates if a vulnerability is being actively targeted by attackers. Patches for these CVEs must be applied immediately.

Patch Tuesday is more than just a monthly event; it is the cornerstone of modern vulnerability management for anyone using Microsoft products. By understanding what it is, embracing best practices, and staying informed about the latest CVEs, you can strengthen your security posture and protect your organization from a constantly evolving threat landscape.

Frequently Asked Questions (FAQs)

  • What is Patch Tuesday?

    Patch Tuesday is the second Tuesday of each month when Microsoft releases its regular updates for Windows operating systems and other Microsoft products. These updates typically include security patches, bug fixes, and sometimes feature improvements.

  • Why is Patch Tuesday important?

    Patch Tuesday is crucial for maintaining the security and stability of systems. The updates often address vulnerabilities that could be exploited by attackers, and keeping systems up to date helps protect against these risks.

  • How do I know when a new Patch Tuesday update is released?

    Microsoft releases Patch Tuesday updates on their website and through Windows Update. For detailed patch notes, you can refer to Microsoft's Security Update Guide or subscribe to update notifications from your device or trusted sources like security blogs.

  • Can I manually install Patch Tuesday updates?

    Yes, you can manually download and install updates through Windows Update, or directly from the Microsoft Update Catalog website, which offers patches for individual downloads.

  • Do I need to install every update?

    It’s highly recommended to install all security updates to ensure your system remains protected from known vulnerabilities. However, non-security updates or feature updates might be optional based on your needs.

  • What happens if I miss a Patch Tuesday update?

    If you miss a Patch Tuesday update, it’s important to install the updates as soon as possible to avoid potential security risks. Microsoft allows you to download and install any missed updates through Windows Update.

  • How do I manage Patch Tuesday updates on multiple systems?

    For businesses or IT administrators, you can use Windows Server Update Services (WSUS), System Center Configuration Manager (SCCM), or third-party patch management tools to schedule, approve, and distribute updates across multiple systems.

  • Are all updates released on Patch Tuesday critical?

    Not all updates are critical. Patch Tuesday updates include a range of fixes, from critical security patches to optional non-security updates. It’s important to assess which updates are most relevant to your environment.

  • What is the impact of not applying Patch Tuesday updates?

    Failing to apply updates can leave your system vulnerable to exploits and attacks. Many of the updates address critical security flaws that cybercriminals may target, so staying updated is vital for system security.

Important Links

Microsoft Security Updates Guide
This is the primary source for information on Microsoft's security updates. It includes details on the vulnerabilities addressed, affected products, and mitigation guidance.
Read more
Microsoft Security Response Center
This blog shares insights on current security threats and Microsoft's responses, detailing specific vulnerabilities and their potential impacts.
Read more
CVE details
The CVE database offers detailed insights on vulnerabilities, including severity, descriptions, and their potential impacts on security.
Read more
Security advisories
Microsoft publishes security advisories for critical vulnerabilities, detailing the issue, its impact, and recommended mitigation steps.
Read more