Access Control Vulnerability in Microsoft Defender
CVE-2026-33825

7.8HIGH

Key Information:

Vendor

Microsoft

Vendor
CVE Published:
14 April 2026

Badges

πŸ”₯ Trending nowπŸ“ˆ TrendedπŸ“ˆ Score: 3,390

What is CVE-2026-33825?

CVE-2026-33825 is an access control vulnerability found in Microsoft Defender, a prominent security solution designed to protect devices and networks from various threats such as malware, ransomware, and other cyberattacks. This particular weakness arises from insufficient granularity in access control mechanisms within the software, allowing an authorized attacker to escalate their privileges locally. The potential exploitation of this vulnerability can lead to unauthorized changes to system configurations, access to sensitive data, and the capability to execute arbitrary commands, greatly undermining the security posture of organizations employing Microsoft Defender to safeguard their environments.

Potential Impact of CVE-2026-33825

  1. Privilege Escalation: The vulnerability enables authorized attackers to gain elevated privileges, potentially allowing them to execute harmful actions that standard users cannot perform. This escalation may lead to compromised accounts, abuse of administrative controls, and unauthorized access to sensitive system areas.

  2. Data Breaches: With heightened privileges, attackers could access confidential data, leading to significant breaches of sensitive information. This risk not only endangers the confidentiality of user and organizational data but may also result in legal repercussions and damage to organizational reputation if sensitive information is disclosed.

  3. Impact on System Integrity: An attacker exploiting this vulnerability could manipulate critical system processes or configurations, leading to system instability or further vulnerabilities. Such modifications can allow for the installation of persistent malware, creating long-term risks that may be difficult to detect and remediate.

Affected Version(s)

Microsoft Defender Antimalware Platform 4.0.0.0 < 4.18.26030.3011

References

CVSS V3.1

Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • πŸ“ˆ

    Vulnerability started trending

  • Vulnerability published

  • Vulnerability Reserved

.