Patch immediately, no workaround substitutes for the fix.
Security researchers and threat monitoring teams have identified three zero‑day vulnerabilities affecting Microsoft Defender – BlueHammer, RedSun, and UnDefend that were publicly disclosed and subsequently observed being exploited in the wild during April 2026.
These vulnerabilities allow attackers to escalate privileges and weaken endpoint protection by abusing Defender’s internal remediation and update mechanisms.
Apr 3–7, 2026 Proof‑of‑concept (PoC) exploit code for the Microsoft Defender local privilege escalation vulnerability, later named BlueHammer, was publicly released.
Apr 10, 2026 Security vendors observed active in‑the‑wild exploitation of BlueHammer, involving interactive, hands‑on‑keyboard attacker activity during real intrusions.
Apr 14, 2026 Microsoft released a security update patching BlueHammer and assigned CVE‑2026‑33825 as part of the regular April Patch Tuesday updates.
Apr 16, 2026 Two additional Microsoft Defender zero‑day exploits. RedSun (local privilege escalation) and UnDefend (Defender update disruption) were released, with live exploitation of all three techniques confirmed the same day, indicating potential chaining.
As of late April 2026, the RedSun and UnDefend vulnerabilities remain unpatched, leaving even fully updated systems exposed to continued exploitation until Microsoft releases remediation.
The vulnerabilities exploit trusted Microsoft Defender processes running with SYSTEM privileges, effectively turning the endpoint protection mechanism itself into an attack vector.
Q1) What is being reported?
Three publicly disclosed and in-the-wild exploited Microsoft Defender zero-day vulnerabilities—BlueHammer, RedSun, and UnDefend—are being used to escalate privileges and/or degrade endpoint protection by abusing Defender remediation and update mechanisms.
Q2) Why do these vulnerabilities matter?
Two issues (BlueHammer and RedSun) can lead to SYSTEM-level privilege escalation from a standard user context, and one issue (UnDefend) can silently reduce Defender effectiveness by blocking/disrupting updates—together enabling compromise plus defense evasion.
Q3) Which systems are likely to be affected?
Endpoints running Microsoft Defender on Windows are the primary concern. Risk is highest where users can execute code from user-writable locations (Downloads/Temp) and where monitoring for Defender tampering/update failures is limited.
Q4) What is the patch status?
BlueHammer is reported as patched by Microsoft (April 2026 updates). RedSun and UnDefend are reported as unpatched at the time of writing—so fully patched systems may still remain exposed to those two techniques.
Q5) What are the most useful indicators to monitor right now?
Prioritize telemetry for Defender-initiated SYSTEM-level process execution, unexpected remediation activity touching protected paths, exploit execution from user-writable directories, and repeated/stalled Defender engine or signature update failures.
Q6) What immediate mitigations can reduce risk while waiting for patches?
Apply April 2026 Defender updates (for BlueHammer), restrict execution from user-writable directories, enforce Attack Surface Reduction (ASR) rules where feasible, and increase alerting for Defender tamper/update anomalies and abnormal remediation behavior.
Q7) If we suspect exploitation, what response actions should we take?
Isolate the affected endpoint(s), preserve relevant logs/telemetry, validate Defender health (engine/signature currency and update success), look for evidence of SYSTEM-level persistence or lateral movement, and remediate/rebuild per incident response procedures before returning systems to service.