Skip to main content

Microsoft security update summary's for April 2026

  • April 3, 2026
  • 10 replies
  • 131 views

TripleHelix
Moderator
Forum|alt.badge.img+63

CVEs have been published or revised in the Security Update Guide

April 2, 2026

These common vulnerabilities and exposures (CVEs) were recently published or revised in the Microsoft Security Update Guide:

CVE-2026-26135

  • Title: Azure Custom Locations Resource Provider (RP) Elevation of Privilege Vulnerability
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: April 2, 2026
  • Last updated: April 2, 2026
  • Aggregate CVE severity rating: Critical
  • Customer action required: No

CVE-2026-32173

  • Title: Azure SRE Agent Information Disclosure Vulnerability
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: April 2, 2026
  • Last updated: April 2, 2026
  • Aggregate CVE severity rating: Critical
  • Customer action required: No

CVE-2026-32186

  • Title: Microsoft Bing Elevation of Privilege Vulnerability
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: April 2, 2026
  • Last updated: April 2, 2026
  • Aggregate CVE severity rating: Critical
  • Customer action required: No

CVE-2026-32211

  • Title: Azure MCP Server Information Disclosure Vulnerability
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: April 2, 2026
  • Last updated: April 2, 2026
  • Aggregate CVE severity rating: Critical
  • Customer action required: No

CVE-2026-32213

  • Title: Azure AI Foundry Elevation of Privilege Vulnerability
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: April 2, 2026
  • Last updated: April 2, 2026
  • Aggregate CVE severity rating: Critical
  • Customer action required: No

CVE-2026-33105

  • Title: Microsoft Azure Kubernetes Service Elevation of Privilege Vulnerability
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: April 2, 2026
  • Last updated: April 2, 2026
  • Aggregate CVE severity rating: Critical
  • Customer action required: No

CVE-2026-33107

  • Title: Azure Databricks Elevation of Privilege Vulnerability
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: April 2, 2026
  • Last updated: April 2, 2026
  • Aggregate CVE severity rating: Critical
  • Customer action required: No

CVE-2026-5272

  • Title: Chromium: CVE-2026-5272 Heap buffer overflow in GPU
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: April 2, 2026
  • Last updated: April 2, 2026
  • Aggregate CVE severity rating:
  • Customer action required: Yes

CVE-2026-5273

  • Title: Chromium: CVE-2026-5273 Use after free in CSS
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: April 2, 2026
  • Last updated: April 2, 2026
  • Aggregate CVE severity rating:
  • Customer action required: Yes

CVE-2026-5274

  • Title: Chromium: CVE-2026-5274 Integer overflow in Codecs
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: April 2, 2026
  • Last updated: April 2, 2026
  • Aggregate CVE severity rating:
  • Customer action required: Yes

CVE-2026-5275

  • Title: Chromium: CVE-2026-5275 Heap buffer overflow in ANGLE
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: April 2, 2026
  • Last updated: April 2, 2026
  • Aggregate CVE severity rating:
  • Customer action required: Yes

CVE-2026-5276

  • Title: Chromium: CVE-2026-5276 Insufficient policy enforcement in WebUSB
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: April 2, 2026
  • Last updated: April 2, 2026
  • Aggregate CVE severity rating:
  • Customer action required: Yes

CVE-2026-5277

  • Title: Chromium: CVE-2026-5277 Integer overflow in ANGLE
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: April 2, 2026
  • Last updated: April 2, 2026
  • Aggregate CVE severity rating:
  • Customer action required: Yes

CVE-2026-5279

  • Title: Chromium: CVE-2026-5279 Object corruption in V8
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: April 2, 2026
  • Last updated: April 2, 2026
  • Aggregate CVE severity rating:
  • Customer action required: Yes

CVE-2026-5280

  • Title: Chromium: CVE-2026-5280 Use after free in WebCodecs
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: April 2, 2026
  • Last updated: April 2, 2026
  • Aggregate CVE severity rating:
  • Customer action required: Yes

CVE-2026-5281

  • Title: Chromium: CVE-2026-5281 Use after free in Dawn
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: April 2, 2026
  • Last updated: April 2, 2026
  • Aggregate CVE severity rating:
  • Customer action required: Yes

CVE-2026-5283

  • Title: Chromium: CVE-2026-5283 Inappropriate implementation in ANGLE
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: April 2, 2026
  • Last updated: April 2, 2026
  • Aggregate CVE severity rating:
  • Customer action required: Yes

CVE-2026-5284

  • Title: Chromium: CVE-2026-5284 Use after free in Dawn
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: April 2, 2026
  • Last updated: April 2, 2026
  • Aggregate CVE severity rating:
  • Customer action required: Yes

CVE-2026-5285

  • Title: Chromium: CVE-2026-5285 Use after free in WebGL
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: April 2, 2026
  • Last updated: April 2, 2026
  • Aggregate CVE severity rating:
  • Customer action required: Yes

CVE-2026-5286

  • Title: Chromium: CVE-2026-5286 Use after free in Dawn
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: April 2, 2026
  • Last updated: April 2, 2026
  • Aggregate CVE severity rating:
  • Customer action required: Yes

CVE-2026-5287

  • Title: Chromium: CVE-2026-5287 Use after free in PDF
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: April 2, 2026
  • Last updated: April 2, 2026
  • Aggregate CVE severity rating:
  • Customer action required: Yes

CVE-2026-5289

  • Title: Chromium: CVE-2026-5289 Use after free in Navigation
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: April 2, 2026
  • Last updated: April 2, 2026
  • Aggregate CVE severity rating:
  • Customer action required: Yes

CVE-2026-5290

  • Title: Chromium: CVE-2026-5290 Use after free in Compositing
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: April 2, 2026
  • Last updated: April 2, 2026
  • Aggregate CVE severity rating:
  • Customer action required: Yes

CVE-2026-5291

  • Title: Chromium: CVE-2026-5291 Inappropriate implementation in WebGL
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: April 2, 2026
  • Last updated: April 2, 2026
  • Aggregate CVE severity rating:
  • Customer action required: Yes

CVE-2026-5292

  • Title: Chromium: CVE-2026-5292 Out of bounds read in WebCodecs
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: April 2, 2026
  • Last updated: April 2, 2026
  • Aggregate CVE severity rating:

Customer action required: Yes

10 replies

TripleHelix
Moderator
Forum|alt.badge.img+63
  • Author
  • Moderator
  • April 11, 2026

CVEs have been published or revised in the Security Update Guide

April 10, 2026

These common vulnerabilities and exposures (CVEs) were recently published or revised in the Microsoft Security Update Guide:

CVE-2026-33118

  • Title: Microsoft Edge (Chromium-based) Spoofing Vulnerability
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: April 10, 2026
  • Last updated: April 10, 2026
  • Aggregate CVE severity rating: Low
  • Customer action required: Yes

CVE-2026-33119

  • Title: Microsoft Edge (Chromium-based) for Android Spoofing Vulnerability
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: April 10, 2026
  • Last updated: April 10, 2026
  • Aggregate CVE severity rating: Moderate

Customer action required: Yes


TripleHelix
Moderator
Forum|alt.badge.img+63
  • Author
  • Moderator
  • April 11, 2026

CVEs have been published or revised in the Security Update Guide

April 10, 2026

These common vulnerabilities and exposures (CVEs) were recently published or revised in the Microsoft Security Update Guide:

CVE-2026-5858

  • Title: Chromium: CVE-2026-5858 Heap buffer overflow in WebML
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: April 10, 2026
  • Last updated: April 10, 2026
  • Aggregate CVE severity rating:
  • Customer action required: Yes

CVE-2026-5859

  • Title: Chromium: CVE-2026-5859 Integer overflow in WebML
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: April 10, 2026
  • Last updated: April 10, 2026
  • Aggregate CVE severity rating:
  • Customer action required: Yes

CVE-2026-5860

  • Title: Chromium: CVE-2026-5860 Use after free in WebRTC
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: April 10, 2026
  • Last updated: April 10, 2026
  • Aggregate CVE severity rating:
  • Customer action required: Yes

CVE-2026-5861

  • Title: Chromium: CVE-2026-5861 Use after free in V8
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: April 10, 2026
  • Last updated: April 10, 2026
  • Aggregate CVE severity rating:
  • Customer action required: Yes

CVE-2026-5862

  • Title: Chromium: CVE-2026-5862 Inappropriate implementation in V8
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: April 10, 2026
  • Last updated: April 10, 2026
  • Aggregate CVE severity rating:
  • Customer action required: Yes

CVE-2026-5863

  • Title: Chromium: CVE-2026-5863 Inappropriate implementation in V8
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: April 10, 2026
  • Last updated: April 10, 2026
  • Aggregate CVE severity rating:
  • Customer action required: Yes

CVE-2026-5864

  • Title: Chromium: CVE-2026-5864 Heap buffer overflow in WebAudio
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: April 10, 2026
  • Last updated: April 10, 2026
  • Aggregate CVE severity rating:
  • Customer action required: Yes

CVE-2026-5865

  • Title: Chromium: CVE-2026-5865 Type Confusion in V8
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: April 10, 2026
  • Last updated: April 10, 2026
  • Aggregate CVE severity rating:
  • Customer action required: Yes

CVE-2026-5866

  • Title: Chromium: CVE-2026-5866 Use after free in Media
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: April 10, 2026
  • Last updated: April 10, 2026
  • Aggregate CVE severity rating:
  • Customer action required: Yes

CVE-2026-5867

  • Title: Chromium: CVE-2026-5867 Heap buffer overflow in WebML
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: April 10, 2026
  • Last updated: April 10, 2026
  • Aggregate CVE severity rating:
  • Customer action required: Yes

CVE-2026-5868

  • Title: Chromium: CVE-2026-5868 Heap buffer overflow in ANGLE
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: April 10, 2026
  • Last updated: April 10, 2026
  • Aggregate CVE severity rating:
  • Customer action required: Yes

CVE-2026-5869

  • Title: Chromium: CVE-2026-5869 Heap buffer overflow in WebML
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: April 10, 2026
  • Last updated: April 10, 2026
  • Aggregate CVE severity rating:
  • Customer action required: Yes

CVE-2026-5870

  • Title: Chromium: CVE-2026-5870 Integer overflow in Skia
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: April 10, 2026
  • Last updated: April 10, 2026
  • Aggregate CVE severity rating:
  • Customer action required: Yes

CVE-2026-5871

  • Title: Chromium: CVE-2026-5871 Type Confusion in V8
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: April 10, 2026
  • Last updated: April 10, 2026
  • Aggregate CVE severity rating:
  • Customer action required: Yes

CVE-2026-5872

  • Title: Chromium: CVE-2026-5872 Use after free in Blink
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: April 10, 2026
  • Last updated: April 10, 2026
  • Aggregate CVE severity rating:
  • Customer action required: Yes

CVE-2026-5873

  • Title: Chromium: CVE-2026-5873 Out of bounds read and write in V8
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: April 10, 2026
  • Last updated: April 10, 2026
  • Aggregate CVE severity rating:
  • Customer action required: Yes

CVE-2026-5874

  • Title: Chromium: CVE-2026-5874 Use after free in PrivateAI
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: April 10, 2026
  • Last updated: April 10, 2026
  • Aggregate CVE severity rating:
  • Customer action required: Yes

CVE-2026-5875

  • Title: Chromium: CVE-2026-5875 Policy bypass in Blink
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: April 10, 2026
  • Last updated: April 10, 2026
  • Aggregate CVE severity rating:
  • Customer action required: Yes

CVE-2026-5876

  • Title: Chromium: CVE-2026-5876 Side-channel information leakage in Navigation
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: April 10, 2026
  • Last updated: April 10, 2026
  • Aggregate CVE severity rating:
  • Customer action required: Yes

CVE-2026-5877

  • Title: Chromium: CVE-2026-5877 Use after free in Navigation
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: April 10, 2026
  • Last updated: April 10, 2026
  • Aggregate CVE severity rating:
  • Customer action required: Yes

CVE-2026-5878

  • Title: Chromium: CVE-2026-5878 Incorrect security UI in Blink
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: April 10, 2026
  • Last updated: April 10, 2026
  • Aggregate CVE severity rating:
  • Customer action required: Yes

CVE-2026-5879

  • Title: Chromium: CVE-2026-5879 Insufficient validation of untrusted input in ANGLE
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: April 10, 2026
  • Last updated: April 10, 2026
  • Aggregate CVE severity rating:
  • Customer action required: Yes

CVE-2026-5880

  • Title: Chromium: CVE-2026-5880 Incorrect security UI in browser UI
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: April 10, 2026
  • Last updated: April 10, 2026
  • Aggregate CVE severity rating:
  • Customer action required: Yes

CVE-2026-5881

  • Title: Chromium: CVE-2026-5881 Policy bypass in LocalNetworkAccess
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: April 10, 2026
  • Last updated: April 10, 2026
  • Aggregate CVE severity rating:
  • Customer action required: Yes

CVE-2026-5882

  • Title: Chromium: CVE-2026-5882 Incorrect security UI in Fullscreen
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: April 10, 2026
  • Last updated: April 10, 2026
  • Aggregate CVE severity rating:
  • Customer action required: Yes

CVE-2026-5883

  • Title: Chromium: CVE-2026-5883 Use after free in Media
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: April 10, 2026
  • Last updated: April 10, 2026
  • Aggregate CVE severity rating:
  • Customer action required: Yes

CVE-2026-5884

  • Title: Chromium: CVE-2026-5884 Insufficient validation of untrusted input in Media
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: April 10, 2026
  • Last updated: April 10, 2026
  • Aggregate CVE severity rating:
  • Customer action required: Yes

CVE-2026-5885

  • Title: Chromium: CVE-2026-5885 Insufficient validation of untrusted input in WebML
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: April 10, 2026
  • Last updated: April 10, 2026
  • Aggregate CVE severity rating:
  • Customer action required: Yes

TripleHelix
Moderator
Forum|alt.badge.img+63
  • Author
  • Moderator
  • April 11, 2026

Continued!

 

CVE-2026-5886

  • Title: Chromium: CVE-2026-5886 Out of bounds read in WebAudio
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: April 10, 2026
  • Last updated: April 10, 2026
  • Aggregate CVE severity rating:
  • Customer action required: Yes

CVE-2026-5887

  • Title: Chromium: CVE-2026-5887 Insufficient validation of untrusted input in Downloads
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: April 10, 2026
  • Last updated: April 10, 2026
  • Aggregate CVE severity rating:
  • Customer action required: Yes

CVE-2026-5888

  • Title: Chromium: CVE-2026-5888 Uninitialized Use in WebCodecs
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: April 10, 2026
  • Last updated: April 10, 2026
  • Aggregate CVE severity rating:
  • Customer action required: Yes

CVE-2026-5889

  • Title: Chromium: CVE-2026-5889 Cryptographic Flaw in PDFium
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: April 10, 2026
  • Last updated: April 10, 2026
  • Aggregate CVE severity rating:
  • Customer action required: Yes

CVE-2026-5890

  • Title: Chromium: CVE-2026-5890 Race in WebCodecs
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: April 10, 2026
  • Last updated: April 10, 2026
  • Aggregate CVE severity rating:
  • Customer action required: Yes

CVE-2026-5891

  • Title: Chromium: CVE-2026-5891 Insufficient policy enforcement in browser UI
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: April 10, 2026
  • Last updated: April 10, 2026
  • Aggregate CVE severity rating:
  • Customer action required: Yes

CVE-2026-5892

  • Title: Chromium: CVE-2026-5892 Insufficient policy enforcement in PWAs
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: April 10, 2026
  • Last updated: April 10, 2026
  • Aggregate CVE severity rating:
  • Customer action required: Yes

CVE-2026-5893

  • Title: Chromium: CVE-2026-5893 Race in V8
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: April 10, 2026
  • Last updated: April 10, 2026
  • Aggregate CVE severity rating:
  • Customer action required: Yes

CVE-2026-5894

  • Title: Chromium: CVE-2026-5894 Inappropriate implementation in PDF
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: April 10, 2026
  • Last updated: April 10, 2026
  • Aggregate CVE severity rating:
  • Customer action required: Yes

CVE-2026-5895

  • Title: Chromium: CVE-2026-5895 Incorrect security UI in Omnibox
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: April 10, 2026
  • Last updated: April 10, 2026
  • Aggregate CVE severity rating:
  • Customer action required: Yes

CVE-2026-5896

  • Title: Chromium: CVE-2026-5896 Policy bypass in Audio
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: April 10, 2026
  • Last updated: April 10, 2026
  • Aggregate CVE severity rating:
  • Customer action required: Yes

CVE-2026-5897

  • Title: Chromium: CVE-2026-5897 Incorrect security UI in Downloads
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: April 10, 2026
  • Last updated: April 10, 2026
  • Aggregate CVE severity rating:
  • Customer action required: Yes

CVE-2026-5898

  • Title: Chromium: CVE-2026-5898 Incorrect security UI in Omnibox
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: April 10, 2026
  • Last updated: April 10, 2026
  • Aggregate CVE severity rating:
  • Customer action required: Yes

CVE-2026-5899

  • Title: Chromium: CVE-2026-5899 Incorrect security UI in History Navigation
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: April 10, 2026
  • Last updated: April 10, 2026
  • Aggregate CVE severity rating:
  • Customer action required: Yes

CVE-2026-5900

  • Title: Chromium: CVE-2026-5900 Policy bypass in Downloads
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: April 10, 2026
  • Last updated: April 10, 2026
  • Aggregate CVE severity rating:
  • Customer action required: Yes

CVE-2026-5901

  • Title: Chromium: CVE-2026-5901 Policy bypass in DevTools
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: April 10, 2026
  • Last updated: April 10, 2026
  • Aggregate CVE severity rating:
  • Customer action required: Yes

CVE-2026-5902

  • Title: Chromium: CVE-2026-5902 Race in Media
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: April 10, 2026
  • Last updated: April 10, 2026
  • Aggregate CVE severity rating:
  • Customer action required: Yes

CVE-2026-5903

  • Title: Chromium: CVE-2026-5903 Policy bypass in IFrameSandbox
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: April 10, 2026
  • Last updated: April 10, 2026
  • Aggregate CVE severity rating:
  • Customer action required: Yes

CVE-2026-5904

  • Title: Chromium: CVE-2026-5904 Use after free in V8
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: April 10, 2026
  • Last updated: April 10, 2026
  • Aggregate CVE severity rating:
  • Customer action required: Yes

CVE-2026-5905

  • Title: Chromium: CVE-2026-5905 Incorrect security UI in Permissions
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: April 10, 2026
  • Last updated: April 10, 2026
  • Aggregate CVE severity rating:
  • Customer action required: Yes

CVE-2026-5906

  • Title: Chromium: CVE-2026-5906 Incorrect security UI in Omnibox
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: April 10, 2026
  • Last updated: April 10, 2026
  • Aggregate CVE severity rating:
  • Customer action required: Yes

CVE-2026-5907

  • Title: Chromium: CVE-2026-5907 Insufficient data validation in Media
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: April 10, 2026
  • Last updated: April 10, 2026
  • Aggregate CVE severity rating:
  • Customer action required: Yes

CVE-2026-5908

  • Title: Chromium: CVE-2026-5908 Integer overflow in Media
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: April 10, 2026
  • Last updated: April 10, 2026
  • Aggregate CVE severity rating:
  • Customer action required: Yes

CVE-2026-5909

  • Title: Chromium: CVE-2026-5909 Integer overflow in Media
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: April 10, 2026
  • Last updated: April 10, 2026
  • Aggregate CVE severity rating:
  • Customer action required: Yes

CVE-2026-5910

  • Title: Chromium: CVE-2026-5910 Integer overflow in Media
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: April 10, 2026
  • Last updated: April 10, 2026
  • Aggregate CVE severity rating:
  • Customer action required: Yes

CVE-2026-5911

  • Title: Chromium: CVE-2026-5911 Policy bypass in ServiceWorkers
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: April 10, 2026
  • Last updated: April 10, 2026
  • Aggregate CVE severity rating:
  • Customer action required: Yes

CVE-2026-5912

  • Title: Chromium: CVE-2026-5912 Integer overflow in WebRTC
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: April 10, 2026
  • Last updated: April 10, 2026
  • Aggregate CVE severity rating:
  • Customer action required: Yes

CVE-2026-5913

  • Title: Chromium: CVE-2026-5913 Out of bounds read in Blink
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: April 10, 2026
  • Last updated: April 10, 2026
  • Aggregate CVE severity rating:
  • Customer action required: Yes

CVE-2026-5914

  • Title: Chromium: CVE-2026-5914 Type Confusion in CSS
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: April 10, 2026
  • Last updated: April 10, 2026
  • Aggregate CVE severity rating:
  • Customer action required: Yes

CVE-2026-5915

  • Title: Chromium: CVE-2026-5915 Insufficient validation of untrusted input in WebML
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: April 10, 2026
  • Last updated: April 10, 2026
  • Aggregate CVE severity rating:
  • Customer action required: Yes

CVE-2026-5918

  • Title: Chromium: CVE-2026-5918 Inappropriate implementation in Navigation
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: April 10, 2026
  • Last updated: April 10, 2026
  • Aggregate CVE severity rating:
  • Customer action required: Yes

CVE-2026-5919

  • Title: Chromium: CVE-2026-5919 Insufficient validation of untrusted input in WebSockets
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: April 10, 2026
  • Last updated: April 10, 2026
  • Aggregate CVE severity rating:

Customer action required: Yes


TripleHelix
Moderator
Forum|alt.badge.img+63
  • Author
  • Moderator
  • April 14, 2026

Patch Tuesday!

Microsoft security update summary for April 2026

April 14, 2026

Here’s a summary of Microsoft security updates released on this date.

Critical security updates

  • Microsoft .NET Framework 3.5
  • Microsoft .NET Framework 3.5 AND 4.7.2
  • Microsoft .NET Framework 3.5 AND 4.8
  • Microsoft .NET Framework 3.5 AND 4.8.1
  • Microsoft .NET Framework 4.6.2/4.7/4.7.1/4.7.2
  • Microsoft .NET Framework 4.8
  • Microsoft 365 Apps for Enterprise for 32-bit Systems
  • Microsoft 365 Apps for Enterprise for 64-bit Systems
  • Microsoft Office 2016 (32-bit edition)
  • Microsoft Office 2016 (64-bit edition)
  • Microsoft Office 2019 for 32-bit editions
  • Microsoft Office 2019 for 64-bit editions
  • Microsoft Office LTSC 2021 for 32-bit editions
  • Microsoft Office LTSC 2021 for 64-bit editions
  • Microsoft Office LTSC 2024 for 32-bit editions
  • Microsoft Office LTSC 2024 for 64-bit editions
  • Microsoft Office LTSC for Mac 2021
  • Microsoft Office LTSC for Mac 2024
  • Remote Desktop client for Windows Desktop
  • Windows 10 for 32-bit Systems
  • Windows 10 for x64-based Systems
  • Windows 10 Version 1607 for 32-bit Systems
  • Windows 10 Version 1607 for x64-based Systems
  • Windows 10 Version 1809 for 32-bit Systems
  • Windows 10 Version 1809 for x64-based Systems
  • Windows 10 Version 21H2 for 32-bit Systems
  • Windows 10 Version 21H2 for ARM64-based Systems
  • Windows 10 Version 21H2 for x64-based Systems
  • Windows 10 Version 22H2 for 32-bit Systems
  • Windows 10 Version 22H2 for ARM64-based Systems
  • Windows 10 Version 22H2 for x64-based Systems
  • Windows 11 Version 23H2 for ARM64-based Systems
  • Windows 11 Version 23H2 for x64-based Systems
  • Windows 11 Version 24H2 for ARM64-based Systems
  • Windows 11 Version 24H2 for x64-based Systems
  • Windows 11 Version 25H2 for ARM systems
  • Windows 11 Version 25H2 for x64-based Systems
  • Windows 11 Version 26H1 for ARM64-based Systems
  • Windows 11 version 26H1 for x64-based Systems
  • Windows App Client for Windows Desktop
  • Windows Server 2008 for 32-bit Systems Service Pack 2
  • Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)
  • Windows Server 2008 for x64-based Systems Service Pack 2
  • Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)
  • Windows Server 2008 R2 for x64-based Systems Service Pack 1
  • Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)
  • Windows Server 2012
  • Windows Server 2012 (Server Core installation)
  • Windows Server 2012 R2
  • Windows Server 2012 R2 (Server Core installation)
  • Windows Server 2016
  • Windows Server 2016 (Server Core installation)
  • Windows Server 2019
  • Windows Server 2019 (Server Core installation)
  • Windows Server 2022
  • Windows Server 2022 (Server Core installation)
  • Windows Server 2022, 23H2 Edition (Server Core installation)
  • Windows Server 2025
  • Windows Server 2025 (Server Core installation)

Important security updates

  • .NET 10.0 installed on Linux
  • .NET 10.0 installed on Mac OS
  • .NET 10.0 installed on Windows
  • .NET 8.0
  • .NET 8.0 installed on Linux
  • .NET 8.0 installed on Mac OS
  • .NET 8.0 installed on Windows
  • .NET 9.0 installed on Linux
  • .NET 9.0 installed on Mac OS
  • .NET 9.0 installed on Windows
  • Azure Logic Apps
  • Azure Monitor Agent
  • Microsoft Defender Antimalware Platform
  • Microsoft Dynamics 365 (on-premises) version 9.0
  • Microsoft Excel 2016 (32-bit edition)
  • Microsoft Excel 2016 (64-bit edition)
  • Microsoft HPC Pack 2019
  • Microsoft Power Apps
  • Microsoft PowerPoint 2016 (32-bit edition)
  • Microsoft PowerPoint 2016 (64-bit edition)
  • Microsoft SharePoint Enterprise Server 2016
  • Microsoft SharePoint Server 2019
  • Microsoft SharePoint Server Subscription Edition
  • Microsoft SQL Server 2016 for x64-based Systems Service Pack 3 (GDR)
  • Microsoft SQL Server 2016 for x64-based Systems Service Pack 3 Azure Connect Feature Pack
  • Microsoft SQL Server 2017 for x64-based Systems (CU 31)
  • Microsoft SQL Server 2017 for x64-based Systems (GDR)
  • Microsoft SQL Server 2019 for x64-based Systems (CU 32)
  • Microsoft SQL Server 2019 for x64-based Systems (GDR)
  • Microsoft SQL Server 2022 for x64-based Systems (CU 24)
  • Microsoft SQL Server 2022 for x64-based Systems (GDR)
  • Microsoft SQL Server 2025 for x64-based Systems (CU3)
  • Microsoft SQL Server 2025 for x64-based Systems (GDR)
  • Microsoft Visual Studio 2017 version 15.9 (includes 15.0 - 15.8)
  • Microsoft Visual Studio 2019 version 16.4 (includes 16.0 - 16.3)
  • Microsoft Visual Studio 2022 version 17.12
  • Microsoft Visual Studio 2022 version 17.14
  • Microsoft Visual Studio Code CoPilot Chat Extension
  • Office Online Server
  • PowerShell 7.4
  • PowerShell 7.5
  • Windows Admin Center

No action required security updates


TripleHelix
Moderator
Forum|alt.badge.img+63
  • Author
  • Moderator
  • April 14, 2026

My Windows 11 Pro Updates!

 

 


TripleHelix
Moderator
Forum|alt.badge.img+63
  • Author
  • Moderator
  • April 14, 2026

April 2026 Security Updates

This release consists of the following 165 Microsoft CVEs:
Tag
CVE Base Score CVSS Vector Exploitability FAQs? Workarounds? Mitigations?

Windows Boot Loader CVE-2026-0390
Windows COM CVE-2026-20806
Windows Recovery Environment Agent CVE-2026-20928
Windows Management Services CVE-2026-20930
Microsoft Office SharePoint CVE-2026-20945
GitHub Copilot and Visual Studio Code CVE-2026-23653
Microsoft Office Word CVE-2026-23657
.NET Framework CVE-2026-23666
Windows Virtualization-Based Security (VBS) Enclave CVE-2026-23670
Applocker Filter Driver (applockerfltr.sys) CVE-2026-25184
Microsoft PowerShell CVE-2026-26143
Microsoft Power Apps CVE-2026-26149
Windows Remote Desktop CVE-2026-26151
Windows Cryptographic Services CVE-2026-26152
Windows Encrypting File System (EFS) CVE-2026-26153
Windows Server Update Service CVE-2026-26154
Windows Local Security Authority Subsystem Service (LSASS) CVE-2026-26155
Role: Windows Hyper-V CVE-2026-26156

Windows Remote Desktop Licensing Service CVE-2026-26159
Windows Remote Desktop Licensing Service CVE-2026-26160
Windows Sensor Data Service CVE-2026-26161
Windows OLE CVE-2026-26162
Windows Kernel CVE-2026-26163
Windows Shell CVE-2026-26165
Windows Shell CVE-2026-26166
Windows Push Notifications CVE-2026-26167
Windows Ancillary Function Driver for WinSock CVE-2026-26168
Windows Kernel Memory CVE-2026-26169
Microsoft PowerShell CVE-2026-26170
.NET CVE-2026-26171
Windows Push Notifications CVE-2026-26172
Windows Ancillary Function Driver for WinSock CVE-2026-26173
Windows Server Update Service CVE-2026-26174
Windows Boot Manager CVE-2026-26175
Windows Client Side Caching driver (csc.sys) CVE-2026-26176
Windows Ancillary Function Driver for WinSock CVE-2026-26177
Windows Advanced Rasterization Platform CVE-2026-26178
Windows Kernel CVE-2026-26179
Windows Kernel CVE-2026-26180

Microsoft Brokering File System CVE-2026-26181
Windows Ancillary Function Driver for WinSock CVE-2026-26182
Windows RPC API CVE-2026-26183
Windows Projected File System CVE-2026-26184
Windows Hello CVE-2026-27906
Windows Storage Spaces Controller CVE-2026-27907
Windows TDI Translation Driver (tdx.sys) CVE-2026-27908
Microsoft Windows Search Component CVE-2026-27909
Windows Installer CVE-2026-27910
Windows User Interface Core CVE-2026-27911
Windows Kerberos CVE-2026-27912
Windows BitLocker CVE-2026-27913
Microsoft Management Console CVE-2026-27914
Windows Universal Plug and Play (UPnP) Device Host CVE-2026-27915
Windows Universal Plug and Play (UPnP) Device Host CVE-2026-27916
Windows WFP NDIS Lightweight Filter Driver (wfplwfs.sys) CVE-2026-27917
Windows Shell CVE-2026-27918
Windows Universal Plug and Play (UPnP) Device Host CVE-2026-27919
Windows Universal Plug and Play (UPnP) Device Host CVE-2026-27920
Windows TCP/IP CVE-2026-27921
Windows Ancillary Function Driver for WinSock CVE-2026-27922
Desktop Window Manager CVE-2026-27923
Desktop Window Manager CVE-2026-27924
Windows Universal Plug and Play (UPnP) Device Host CVE-2026-27925
Windows Cloud Files Mini Filter Driver CVE-2026-27926
Windows Projected File System CVE-2026-27927

Windows Hello CVE-2026-27928
Windows LUAFV CVE-2026-27929
Windows GDI CVE-2026-27930
Windows GDI CVE-2026-27931
Windows SSDP Service CVE-2026-32068
Windows Projected File System CVE-2026-32069
Windows Common Log File System Driver CVE-2026-32070
Windows Local Security Authority Subsystem Service (LSASS) CVE-2026-32071
Windows Active Directory CVE-2026-32072
Windows Ancillary Function Driver for WinSock CVE-2026-32073
Windows Projected File System CVE-2026-32074
Windows Universal Plug and Play (UPnP) Device Host CVE-2026-32075
Windows Storage Spaces Controller CVE-2026-32076
Windows Universal Plug and Play (UPnP) Device Host CVE-2026-32077
Windows Projected File System CVE-2026-32078
Windows File Explorer CVE-2026-32079
Windows WalletService CVE-2026-32080
Windows File Explorer CVE-2026-32081
Windows SSDP Service CVE-2026-32082
Windows SSDP Service CVE-2026-32083
Windows File Explorer CVE-2026-32084

Windows Remote Procedure Call CVE-2026-32085
Function Discovery Service (fdwsd.dll) CVE-2026-32086
Function Discovery Service (fdwsd.dll) CVE-2026-32087
Windows Biometric Service CVE-2026-32088
Windows Speech Brokered Api CVE-2026-32089
Windows Speech Brokered Api CVE-2026-32090
Microsoft Brokering File System CVE-2026-32091
Function Discovery Service (fdwsd.dll) CVE-2026-32093
Role: Windows Hyper-V CVE-2026-32149
Function Discovery Service (fdwsd.dll) CVE-2026-32150
Windows Shell CVE-2026-32151

Desktop Window Manager CVE-2026-32152
Microsoft Windows Speech CVE-2026-32153
Desktop Window Manager CVE-2026-32154
Desktop Window Manager CVE-2026-32155
Windows Universal Plug and Play (UPnP) Device Host CVE-2026-32156
Remote Desktop Client CVE-2026-32157
Windows Push Notifications CVE-2026-32158
Windows Push Notifications CVE-2026-32159
Windows Push Notifications CVE-2026-32160
Windows COM CVE-2026-32162
Windows User Interface Core CVE-2026-32163
Windows User Interface Core CVE-2026-32164
Windows User Interface Core CVE-2026-32165
SQL Server CVE-2026-32167
Azure Monitor Agent CVE-2026-32168
Azure Logic Apps CVE-2026-32171
SQL Server CVE-2026-32176 6.7
.NET CVE-2026-32178
Microsoft Windows CVE-2026-32181
Windows Snipping Tool CVE-2026-32183
Microsoft High Performance Compute Pack (HPC) CVE-2026-32184
Microsoft Office Excel CVE-2026-32188
Microsoft Office Excel CVE-2026-32189
Microsoft Office CVE-2026-32190
Azure Monitor Agent CVE-2026-32192

Windows Kernel CVE-2026-32195
Windows Admin Center CVE-2026-32196
Microsoft Office Excel CVE-2026-32197
Microsoft Office Excel CVE-2026-32198
Microsoft Office Excel CVE-2026-32199
Microsoft Office PowerPoint CVE-2026-32200
Microsoft Office SharePoint CVE-2026-32201
Windows Shell CVE-2026-32202
.NET and Visual Studio CVE-2026-32203
Universal Plug and Play (upnp.dll) CVE-2026-32212
Universal Plug and Play (upnp.dll) CVE-2026-32214
Windows Kernel CVE-2026-32215 5.5
Windows Redirected Drive Buffering CVE-2026-32216
Windows Kernel CVE-2026-32217
Windows Kernel CVE-2026-32218
Microsoft Brokering File System CVE-2026-32219
Windows Virtualization-Based Security (VBS) Enclave CVE-2026-32220
Microsoft Graphics Component CVE-2026-32221
Windows Win32K - ICOMP CVE-2026-32222
Windows USB Print Driver CVE-2026-32223
Windows Server Update Service CVE-2026-32224
Windows Shell CVE-2026-32225
.NET Framework CVE-2026-32226
Microsoft Office Word CVE-2026-33095
Windows HTTP.sys CVE-2026-33096

Windows Container Isolation FS Filter Driver CVE-2026-33098
Windows Ancillary Function Driver for WinSock CVE-2026-33099
Windows Ancillary Function Driver for WinSock CVE-2026-33100
Windows Print Spooler Components CVE-2026-33101
Microsoft Dynamics 365 (on-premises) CVE-2026-33103
Windows Win32K - GRFX CVE-2026-33104
Microsoft Office Word CVE-2026-33114
Microsoft Office Word CVE-2026-33115
.NET, .NET Framework, Visual Studio CVE-2026-33116
Microsoft Edge (Chromium-based) CVE-2026-33118
Microsoft Edge (Chromium-based) CVE-2026-33119
SQL Server CVE-2026-33120
Microsoft Office Word CVE-2026-33822
Windows IKE Extension CVE-2026-33824
Microsoft Defender CVE-2026-33825
Windows Active Directory CVE-2026-33826
Windows TCP/IP CVE-2026-33827
Windows Snipping Tool CVE-2026-33829

We are republishing 82 non-Microsoft CVEs:
CNA Tag CVE FAQs? Workarounds? Mitigations?

AMD Input-Output Memory Management Unit (IOMMU) CVE-2023-20585
HackerOne Node.js CVE-2026-21637
MITRE Windows Secure Boot CVE-2026-25250
GitHub GitHub Repo: Git for Windows CVE-2026-32631
Chrome Microsoft Edge (Chromium-based) CVE-2026-5272
Chrome Microsoft Edge (Chromium-based) CVE-2026-5273
Chrome Microsoft Edge (Chromium-based) CVE-2026-5274
Chrome Microsoft Edge (Chromium-based) CVE-2026-5275
Chrome Microsoft Edge (Chromium-based) CVE-2026-5276
Chrome Microsoft Edge (Chromium-based) CVE-2026-5277
Chrome Microsoft Edge (Chromium-based) CVE-2026-5279
Chrome Microsoft Edge (Chromium-based) CVE-2026-5280
Chrome Microsoft Edge (Chromium-based) CVE-2026-5281
Chrome Microsoft Edge (Chromium-based) CVE-2026-5283
Chrome Microsoft Edge (Chromium-based) CVE-2026-5284
Chrome Microsoft Edge (Chromium-based) CVE-2026-5285
Chrome Microsoft Edge (Chromium-based) CVE-2026-5286
Chrome Microsoft Edge (Chromium-based) CVE-2026-5287
Chrome Microsoft Edge (Chromium-based) CVE-2026-5289
Chrome Microsoft Edge (Chromium-based) CVE-2026-5290
Chrome Microsoft Edge (Chromium-based) CVE-2026-5291
Chrome Microsoft Edge (Chromium-based) CVE-2026-5292
Chrome Microsoft Edge (Chromium-based) CVE-2026-5858
Chrome Microsoft Edge (Chromium-based) CVE-2026-5859
Chrome Microsoft Edge (Chromium-based) CVE-2026-5860
Chrome Microsoft Edge (Chromium-based) CVE-2026-5861
Chrome Microsoft Edge (Chromium-based) CVE-2026-5862
Chrome Microsoft Edge (Chromium-based) CVE-2026-5863
Chrome Microsoft Edge (Chromium-based) CVE-2026-5864
Chrome Microsoft Edge (Chromium-based) CVE-2026-5865
Chrome Microsoft Edge (Chromium-based) CVE-2026-5866
Chrome Microsoft Edge (Chromium-based) CVE-2026-5867
Chrome Microsoft Edge (Chromium-based) CVE-2026-5868
Chrome Microsoft Edge (Chromium-based) CVE-2026-5869
Chrome Microsoft Edge (Chromium-based) CVE-2026-5870
Chrome Microsoft Edge (Chromium-based) CVE-2026-5871
Chrome Microsoft Edge (Chromium-based) CVE-2026-5872
Chrome Microsoft Edge (Chromium-based) CVE-2026-5873
Chrome Microsoft Edge (Chromium-based) CVE-2026-5874
Chrome Microsoft Edge (Chromium-based) CVE-2026-5875
Chrome Microsoft Edge (Chromium-based) CVE-2026-5876
Chrome Microsoft Edge (Chromium-based) CVE-2026-5877
Chrome Microsoft Edge (Chromium-based) CVE-2026-5878
Chrome Microsoft Edge (Chromium-based) CVE-2026-5879
Chrome Microsoft Edge (Chromium-based) CVE-2026-5880
Chrome Microsoft Edge (Chromium-based) CVE-2026-5881
Chrome Microsoft Edge (Chromium-based) CVE-2026-5882
Chrome Microsoft Edge (Chromium-based) CVE-2026-5883
Chrome Microsoft Edge (Chromium-based) CVE-2026-5884
Chrome Microsoft Edge (Chromium-based) CVE-2026-5885
Chrome Microsoft Edge (Chromium-based) CVE-2026-5886
Chrome Microsoft Edge (Chromium-based) CVE-2026-5887
Chrome Microsoft Edge (Chromium-based) CVE-2026-5888
Chrome Microsoft Edge (Chromium-based) CVE-2026-5889
Chrome Microsoft Edge (Chromium-based) CVE-2026-5890
Chrome Microsoft Edge (Chromium-based) CVE-2026-5891
Chrome Microsoft Edge (Chromium-based) CVE-2026-5892
Chrome Microsoft Edge (Chromium-based) CVE-2026-5893
Chrome Microsoft Edge (Chromium-based) CVE-2026-5894
Chrome Microsoft Edge (Chromium-based) CVE-2026-5895
Chrome Microsoft Edge (Chromium-based) CVE-2026-5896
Chrome Microsoft Edge (Chromium-based) CVE-2026-5897
Chrome Microsoft Edge (Chromium-based) CVE-2026-5898
Chrome Microsoft Edge (Chromium-based) CVE-2026-5899
Chrome Microsoft Edge (Chromium-based) CVE-2026-5900
Chrome Microsoft Edge (Chromium-based) CVE-2026-5901
Chrome Microsoft Edge (Chromium-based) CVE-2026-5902
Chrome Microsoft Edge (Chromium-based) CVE-2026-5903
Chrome Microsoft Edge (Chromium-based) CVE-2026-5904
Chrome Microsoft Edge (Chromium-based) CVE-2026-5905
Chrome Microsoft Edge (Chromium-based) CVE-2026-5906
Chrome Microsoft Edge (Chromium-based) CVE-2026-5907
Chrome Microsoft Edge (Chromium-based) CVE-2026-5908
Chrome Microsoft Edge (Chromium-based) CVE-2026-5909
Chrome Microsoft Edge (Chromium-based) CVE-2026-5910
Chrome Microsoft Edge (Chromium-based) CVE-2026-5911
Chrome Microsoft Edge (Chromium-based) CVE-2026-5912
Chrome Microsoft Edge (Chromium-based) CVE-2026-5913
Chrome Microsoft Edge (Chromium-based) CVE-2026-5914
Chrome Microsoft Edge (Chromium-based) CVE-2026-5915
Chrome Microsoft Edge (Chromium-based) CVE-2026-5918
Chrome Microsoft Edge (Chromium-based) CVE-2026-5919

Security Update Guide Blog Posts
Date Blog Post
October 31, 2025 You asked, we delivered: Introducing new features for an improved security experience
October 28, 2025 Understanding CVE-2025-55315: What CISOs, security engineers, and sysadmins should know
October 22, 2025 Toward greater transparency: Introducing machine-readable Vulnerability Exploitability Xchange (VEX) for Azure Linux and beyond
November 12, 2024 Toward greater transparency: Publishing machine-readable CSAF files
June 27, 2024 Toward greater transparency: Unveiling Cloud Service CVEs
April 9, 2024 Toward greater transparency: Security Update Guide now shares CWEs for CVEs
January 6, 2023 Publishing CBL-Mariner CVEs on the Security Update Guide CVRF API
January 11, 2022 Coming Soon: New Security Update Guide Notification System
February 9, 2021 Continuing to Listen: Good News about the Security Update Guide API
January 13, 2021 Security Update Guide Supports CVEs Assigned by Industry Partners
December 8, 2020 Security Update Guide: Let’s keep the conversation going
November 9, 2020 Vulnerability Descriptions in the New Version of the Security Update Guide

Relevant Resources

  • The new Hotpatching feature is now generally available. Please see Hotpatching feature for Windows Server Azure Edition virtual machines (VMs) for more information.
  • Windows 10 and Windows 11 updates are cumulative. The monthly security release includes all security fixes for vulnerabilities that affect Windows 10 and Windows 11, in addition to non-security updates. The updates are available via the Microsoft Update Catalog. For information on lifecycle and support dates for Windows 10 and Windows 11 operating systems, please see Windows Lifecycle Facts Sheet.
  • Microsoft is improving Windows Release Notes. For more information, please see What's next for Windows release notes.
  • A list of the latest servicing stack updates for each operating system can be found in ADV990001. This list will be updated whenever a new servicing stack update is released. It is important to install the latest servicing stack update.
  • In addition to security changes for the vulnerabilities, updates include defense-in-depth updates to help improve security-related features.
  • Customers running Windows Server 2008 R2, or Windows Server 2008 need to purchase the Extended Security Update to continue receiving security updates. See 4522133 for more information.

Known Issues
You can see these in more detail from the Deployments tab by selecting Known Issues column in the Edit Columns panel.

For more information about Windows Known Issues, please see Windows message center (links to currently-supported versions of Windows are in the left pane).

KB Article Applies To
5082060 Windows Server 2022 23H2
5082063 Windows Server 2025
5082142 Windows Server 2022
Released: Apr 14, 2026

April 2026 Security Updates - Release Notes - Security Update Guide - Microsoft


TripleHelix
Moderator
Forum|alt.badge.img+63
  • Author
  • Moderator
  • April 17, 2026

CVEs have been published or revised in the Security Update Guide

April 17, 2026

These common vulnerabilities and exposures (CVEs) were recently published or revised in the Microsoft Security Update Guide:

CVE-2026-6296

  • Title: Chromium: CVE-2026-6296 Heap buffer overflow in ANGLE
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: April 17, 2026
  • Last updated: April 17, 2026
  • Aggregate CVE severity rating:
  • Customer action required: Yes

CVE-2026-6297

  • Title: Chromium: CVE-2026-6297 Use after free in Proxy
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: April 17, 2026
  • Last updated: April 17, 2026
  • Aggregate CVE severity rating:
  • Customer action required: Yes

CVE-2026-6298

  • Title: Chromium: CVE-2026-6298 Heap buffer overflow in Skia
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: April 17, 2026
  • Last updated: April 17, 2026
  • Aggregate CVE severity rating:
  • Customer action required: Yes

CVE-2026-6299

  • Title: Chromium: CVE-2026-6299 Use after free in Prerender
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: April 17, 2026
  • Last updated: April 17, 2026
  • Aggregate CVE severity rating:
  • Customer action required: Yes

CVE-2026-6300

  • Title: Chromium: CVE-2026-6300 Use after free in CSS
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: April 17, 2026
  • Last updated: April 17, 2026
  • Aggregate CVE severity rating:
  • Customer action required: Yes

CVE-2026-6301

  • Title: Chromium: CVE-2026-6301 Type Confusion in Turbofan
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: April 17, 2026
  • Last updated: April 17, 2026
  • Aggregate CVE severity rating:
  • Customer action required: Yes

CVE-2026-6302

  • Title: Chromium: CVE-2026-6302 Use after free in Video
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: April 17, 2026
  • Last updated: April 17, 2026
  • Aggregate CVE severity rating:
  • Customer action required: Yes

CVE-2026-6303

  • Title: Chromium: CVE-2026-6303 Use after free in Codecs
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: April 17, 2026
  • Last updated: April 17, 2026
  • Aggregate CVE severity rating:
  • Customer action required: Yes

CVE-2026-6304

  • Title: Chromium: CVE-2026-6304 Use after free in Graphite
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: April 17, 2026
  • Last updated: April 17, 2026
  • Aggregate CVE severity rating:
  • Customer action required: Yes

CVE-2026-6305

  • Title: Chromium: CVE-2026-6305 Heap buffer overflow in PDFium
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: April 17, 2026
  • Last updated: April 17, 2026
  • Aggregate CVE severity rating:
  • Customer action required: Yes

CVE-2026-6306

  • Title: Chromium: CVE-2026-6306 Heap buffer overflow in PDFium
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: April 17, 2026
  • Last updated: April 17, 2026
  • Aggregate CVE severity rating:
  • Customer action required: Yes

CVE-2026-6307

  • Title: Chromium: CVE-2026-6307 Type Confusion in Turbofan
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: April 17, 2026
  • Last updated: April 17, 2026
  • Aggregate CVE severity rating:
  • Customer action required: Yes

CVE-2026-6308

  • Title: Chromium: CVE-2026-6308 Out of bounds read in Media
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: April 17, 2026
  • Last updated: April 17, 2026
  • Aggregate CVE severity rating:
  • Customer action required: Yes

CVE-2026-6309

  • Title: Chromium: CVE-2026-6309 Use after free in Viz
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: April 17, 2026
  • Last updated: April 17, 2026
  • Aggregate CVE severity rating:
  • Customer action required: Yes

CVE-2026-6310

  • Title: Chromium: CVE-2026-6310 Use after free in Dawn
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: April 17, 2026
  • Last updated: April 17, 2026
  • Aggregate CVE severity rating:
  • Customer action required: Yes

CVE-2026-6311

  • Title: Chromium: CVE-2026-6311 Uninitialized Use in Accessibility
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: April 17, 2026
  • Last updated: April 17, 2026
  • Aggregate CVE severity rating:
  • Customer action required: Yes

CVE-2026-6312

  • Title: Chromium: CVE-2026-6312 Insufficient policy enforcement in Passwords
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: April 17, 2026
  • Last updated: April 17, 2026
  • Aggregate CVE severity rating:
  • Customer action required: Yes

CVE-2026-6313

  • Title: Chromium: CVE-2026-6313 Insufficient policy enforcement in CORS
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: April 17, 2026
  • Last updated: April 17, 2026
  • Aggregate CVE severity rating:
  • Customer action required: Yes

CVE-2026-6314

  • Title: Chromium: CVE-2026-6314 Out of bounds write in GPU
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: April 17, 2026
  • Last updated: April 17, 2026
  • Aggregate CVE severity rating:
  • Customer action required: Yes

CVE-2026-6316

  • Title: Chromium: CVE-2026-6316 Use after free in Forms
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: April 17, 2026
  • Last updated: April 17, 2026
  • Aggregate CVE severity rating:
  • Customer action required: Yes

CVE-2026-6317

  • Title: Chromium: CVE-2026-6317 Use after free in Cast
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: April 17, 2026
  • Last updated: April 17, 2026
  • Aggregate CVE severity rating:
  • Customer action required: Yes

CVE-2026-6318

  • Title: Chromium: CVE-2026-6318 Use after free in Codecs
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: April 17, 2026
  • Last updated: April 17, 2026
  • Aggregate CVE severity rating:
  • Customer action required: Yes

CVE-2026-6359

  • Title: Chromium: CVE-2026-6359 Use after free in Video
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: April 17, 2026
  • Last updated: April 17, 2026
  • Aggregate CVE severity rating:
  • Customer action required: Yes

CVE-2026-6360

  • Title: Chromium: CVE-2026-6360 Use after free in FileSystem
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: April 17, 2026
  • Last updated: April 17, 2026
  • Aggregate CVE severity rating:
  • Customer action required: Yes

CVE-2026-6361

  • Title: Chromium: CVE-2026-6361 Heap buffer overflow in PDFium
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: April 17, 2026
  • Last updated: April 17, 2026
  • Aggregate CVE severity rating:
  • Customer action required: Yes

CVE-2026-6362

  • Title: Chromium: CVE-2026-6362 Use after free in Codecs
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: April 17, 2026
  • Last updated: April 17, 2026
  • Aggregate CVE severity rating:
  • Customer action required: Yes

CVE-2026-6363

  • Title: Chromium: CVE-2026-6363 Type Confusion in V8
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: April 17, 2026
  • Last updated: April 17, 2026
  • Aggregate CVE severity rating:
  • Customer action required: Yes

CVE-2026-6364

  • Title: Chromium: CVE-2026-6364 Out of bounds read in Skia
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: April 17, 2026
  • Last updated: April 17, 2026
  • Aggregate CVE severity rating:

Customer action required: Yes


TripleHelix
Moderator
Forum|alt.badge.img+63
  • Author
  • Moderator
  • April 28, 2026

CVEs have been published or revised in the Security Update Guide

April 27, 2026

These common vulnerabilities and exposures (CVEs) were recently published or revised in the Microsoft Security Update Guide:

CVE-2026-21515

  • Title: Azure IoT Central Elevation of Privilege Vulnerability
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: April 23, 2026
  • Last updated: April 23, 2026
  • Aggregate CVE severity rating: Critical
  • Customer action required: No

CVE-2026-24303

  • Title: Microsoft Partner Center Elevation of Privilege Vulnerability
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: April 23, 2026
  • Last updated: April 23, 2026
  • Aggregate CVE severity rating: Critical
  • Customer action required: No

CVE-2026-26150

  • Title: Microsoft Purview eDiscovery Elevation of Privilege Vulnerability
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: April 23, 2026
  • Last updated: April 23, 2026
  • Aggregate CVE severity rating: Critical
  • Customer action required: No

CVE-2026-32172

  • Title: Microsoft Power Apps Remote Code Execution Vulnerability
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: April 23, 2026
  • Last updated: April 23, 2026
  • Aggregate CVE severity rating: Critical
  • Customer action required: No

CVE-2026-32202

  • Title: Windows Shell Spoofing Vulnerability
  • Version: 1.1
  • Reason for revision: Corrected the Exploitability Index, Exploited flag and CVSS vector which was incorrect at the time of publication on 4/14/2026. This is an informational change only.
  • Originally released: April 14, 2026
  • Last updated: April 27, 2026
  • Aggregate CVE severity rating: Important
  • Customer action required: Yes

CVE-2026-32210

  • Title: Microsoft Dynamics 365 (online) Spoofing Vulnerability
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: April 23, 2026
  • Last updated: April 23, 2026
  • Aggregate CVE severity rating: Critical
  • Customer action required: No

CVE-2026-33102

  • Title: Microsoft 365 Copilot Elevation of Privilege Vulnerability
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: April 23, 2026
  • Last updated: April 23, 2026
  • Aggregate CVE severity rating: Critical
  • Customer action required: No

CVE-2026-33819

  • Title: Microsoft Bing Remote Code Execution Vulnerability
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: April 23, 2026
  • Last updated: April 23, 2026
  • Aggregate CVE severity rating: Critical
  • Customer action required: No

CVE-2026-35431

  • Title: Microsoft Entra ID Entitlement Management Spoofing Vulnerability
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: April 23, 2026
  • Last updated: April 23, 2026
  • Aggregate CVE severity rating: Critical
  • Customer action required: No

CVE-2026-6919

  • Title: Chromium: CVE-2026-6919 Use after free in DevTools
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: April 24, 2026
  • Last updated: April 24, 2026
  • Aggregate CVE severity rating:
  • Customer action required: Yes

CVE-2026-6921

  • Title: Chromium: CVE-2026-6921 Race in GPU
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: April 24, 2026
  • Last updated: April 24, 2026
  • Aggregate CVE severity rating:

Customer action required: Yes


TripleHelix
Moderator
Forum|alt.badge.img+63
  • Author
  • Moderator
  • April 28, 2026

CVEs have been published or revised in the Security Update Guide

April 28, 2026

These common vulnerabilities and exposures (CVEs) were recently published or revised in the Microsoft Security Update Guide:

CVE-2026-6919

  • Title: Chromium: CVE-2026-6919 Use after free in DevTools
  • Version: 1.2
  • Reason for revision: Added a second Security Only package to Edge security update This is an informational change only.
  • Originally released: April 24, 2026
  • Last updated: April 28, 2026
  • Aggregate CVE severity rating:
  • Customer action required: Yes

CVE-2026-6920

  • Title: Chromium: CVE-2026-6920 Out of bounds read in GPU
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: April 28, 2026
  • Last updated: April 28, 2026
  • Aggregate CVE severity rating:
  • Customer action required: Yes
 

TripleHelix
Moderator
Forum|alt.badge.img+63
  • Author
  • Moderator
  • April 28, 2026

Security advisories were published or revised in Microsoft Security Update Guide

April 28, 2026

The following security advisories (ADVs) were recently published or revised in the Microsoft Security Update Guide:

 

 

ADV24202320

  • Title: Power Automate Defense in Depth Advisory
  • Version 1
  • Originally released: April 28, 2026
  • Last updated: April 16, 2024