HomeIntelligenceBrief
VULNERABILITY BRIEF🟠 High Vulnerability

CVE-2026-33825 Microsoft Defender Insufficient Granularity of Access Control Vulnerability Actively Exploited

CISA added CVE‑2026‑33825 to its KEV catalog, confirming that attackers are exploiting a privilege‑escalation flaw in Microsoft Defender for Endpoint. The vulnerability threatens any organization that relies on Defender for endpoint protection, creating a supply‑chain risk for third‑party service providers.

LiveThreat™ Intelligence · 📅 April 23, 2026· 📰 cisa.gov
🟠
Severity
High
VU
Type
Vulnerability
🎯
Confidence
High
🏢
Affected
2 sector(s)
Actions
4 recommended
📰
Source
cisa.gov

CVE-2026-33825 Microsoft Defender Insufficient Granularity of Access Control Vulnerability – Active Exploitation Threatens Endpoint Security

What It Is – A privilege‑escalation flaw in Microsoft Defender’s access‑control logic allows an attacker to bypass granular policy enforcement, potentially gaining broader visibility or control over protected endpoints.

Exploitability – The vulnerability is listed in CISA’s Known Exploited Vulnerabilities (KEV) catalog, confirming active exploitation in the wild. No public PoC is required; threat actors are already leveraging it. CVSS v3.1 is currently rated 8.8 (High).

Affected Products – Microsoft Defender for Endpoint (Windows 10/11, Server 2016‑2022) and any integrated Microsoft security stack that relies on its access‑control module.

TPRM Impact

  • Third‑party SaaS or managed‑service providers that embed Microsoft Defender in their security offering inherit the same exposure.
  • Organizations that mandate Microsoft Defender as a contractual security control may face non‑compliance if the flaw remains unpatched.

Recommended Actions

  • Prioritize patching to the latest Microsoft Defender update (released 2026‑04‑15) across all managed endpoints.
  • Verify remediation status against CISA BOD 22‑01 deadlines; document compliance for audit trails.
  • Review and tighten any custom access‑control policies that could be bypassed by the flaw.
  • Incorporate the CVE into your vulnerability‑management scoring model and notify any downstream vendors that rely on your Defender deployment.

Source: CISA Advisory – CVE‑2026‑33825

📰 Original Source
https://www.cisa.gov/news-events/alerts/2026/04/22/cisa-adds-one-known-exploited-vulnerability-catalog

This LiveThreat Intelligence Brief is an independent analysis. Read the original reporting at the link above.

Monitor Your Vendor Risk with LiveThreat™

Get automated breach alerts, security scorecards, and intelligence briefs when your vendors are compromised.