Three zero-day vulnerabilities in Microsoft Defender are being actively exploited in the wild as of mid-April 2026. Two of them still don’t have patches.

This isn’t a theoretical risk. Attackers are using these flaws right now against Windows systems running Defender — which means potentially every Windows PC, home server, or small business workstation that relies on Defender for security is exposed to attacks that bypass the very software designed to stop them.


What Are the Vulnerabilities?

The three zero-days were disclosed by The Hacker News in April 2026 based on ongoing threat intelligence. The specific CVE identifiers have not all been publicly confirmed at time of writing, but the nature of the vulnerabilities falls into two categories:

Type 1 — Defender Engine Bypass: Flaws that allow maliciously crafted files or code to evade Defender’s real-time protection engine. An attacker who delivers malware that exploits these vulnerabilities can execute on the target system without triggering Defender alerts, effectively disabling the primary layer of endpoint protection.

Type 2 — Privilege Escalation via Defender: Flaws in Defender’s privileged service processes that allow a local attacker (or malware that has gained initial foothold) to escalate from a standard user context to SYSTEM-level privileges. This converts a limited intrusion into full system control.

Of the three vulnerabilities:

  • One has a patch available through Windows Update
  • Two remain unpatched — Microsoft is aware and working on fixes, but no patch timeline has been disclosed

Why Defender Zero-Days Are Particularly Dangerous

A zero-day in your web browser or a specific application is serious. A zero-day in your security software is a different category of threat.

The trust inversion problem: Antivirus and endpoint protection software runs with elevated privileges by design. It needs deep system access to monitor processes, scan files, and intercept threats. A vulnerability in Defender that allows privilege escalation or code execution runs in a highly privileged context — giving attackers immediate system-level access rather than requiring a separate privilege escalation step.

The detection gap: If your security software is itself compromised or bypassed, you lose visibility into what’s happening on your system. Threats that would normally generate alerts pass through silently. The attacker gains not just access but invisibility.

The ubiquity of Defender: Microsoft Defender is the default antivirus on every modern Windows installation. Unlike third-party AV products, there’s no version-targeting complexity for attackers — Defender is everywhere.


Who Is at Risk

The affected user population is extremely broad:

User TypeRisk Profile
Home Windows PC usersDefault Defender installation — directly exposed
Home office / work-from-home usersWindows PCs often serve as gateways to work systems
Small businesses using WindowsWidespread Defender dependency
Windows-based home servers (NAS, media servers)Often unmonitored, always-on targets
Smart home automation controllers on WindowsHome Assistant on Windows, Node-RED on Windows, etc.

For smart home users specifically: if you’re running your home automation hub — Home Assistant, OpenHAB, or similar — on a Windows machine, a Defender compromise could give an attacker access to your entire smart home automation system, including locks, cameras, alarms, and any integrations.


The Actively Exploited Status

“Actively exploited” isn’t marketing language — it has a specific technical meaning in the vulnerability disclosure world. It means threat intelligence researchers have observed in-the-wild exploitation: real attackers using these vulnerabilities against real targets, not just proof-of-concept demonstrations in controlled environments.

CISA’s Known Exploited Vulnerabilities (KEV) catalog tracks actively exploited CVEs and mandates patching timelines for federal agencies. When CISA KEV-lists a vulnerability, it means exploitation is confirmed and widespread enough to warrant mandatory government-wide action.

For the two unpatched Defender zero-days, the situation is particularly acute: there is confirmed active exploitation, and there is no patch available. This is the definition of a zero-day: a vulnerability for which no vendor-supplied fix exists.


What You Can Do Right Now

1. Apply the available patch immediately. One of the three vulnerabilities has a patch. Open Windows Update and install all available security updates now. Don’t defer.

Settings → Windows Update → Check for Updates → Install All

2. Enable automatic Windows updates. If you’ve disabled automatic updates for any reason, re-enable them. Security patches are the exception where automatic installation is worth the inconvenience of occasional unexpected reboots.

3. Apply the temporary mitigations below for the two unpatched flaws.

Mitigation for Engine Bypass Vulnerabilities

While Microsoft prepares patches, several defensive measures reduce exposure:

Enable cloud-delivered protection in Defender: Cloud-based signatures update faster than local definition updates and may provide earlier protection against new malware variants targeting these flaws.

Windows Security → Virus & Threat Protection → Manage Settings
→ Cloud-delivered protection: ON
→ Automatic sample submission: ON

Enable tamper protection: This prevents malware from disabling or modifying Defender settings.

Windows Security → Virus & Threat Protection → Manage Settings
→ Tamper Protection: ON

Consider supplementary detection: Running a second detection layer — a network-level IDS/IPS on your router, or a supplementary EDR solution — can detect malicious behavior that bypasses Defender.

Mitigation for Privilege Escalation Vulnerabilities

Reduce your attack surface by operating as a standard user: If you routinely use your PC from an administrator account, consider switching to a standard account for daily use. Privilege escalation vulnerabilities are less impactful when the initial foothold is a limited-privilege user account.

Enable Windows Defender Credential Guard (on Windows 11 Enterprise/Education): This protects credential material from extraction even if the system is partially compromised.

Audit local administrator accounts: Ensure only accounts that genuinely need admin rights have them. Remove admin rights from accounts used for daily browsing and email.


Monitoring for Compromise

Given that active exploitation is occurring, it’s worth reviewing indicators that a system may already be compromised:

  • Unexpected processes running at SYSTEM privilege — check Task Manager and sort by Username for SYSTEM processes you don’t recognize
  • Defender reporting as disabled when you haven’t disabled it — a sign malware has tampered with it
  • Unusual outbound network connections — malware beaconing to C2 infrastructure
  • New local administrator accounts created without your action
  • Missing or modified files in Windows\System32 or Defender installation directories

Free tools like Microsoft’s Process Monitor and Autoruns (Sysinternals) can help identify suspicious persistent processes.


The Bigger Picture: Your Security Software Isn’t Infallible

The deeper lesson from these vulnerabilities is architectural: relying on a single security layer — even a good one like Defender — creates a single point of failure. When that layer is bypassed or compromised, you have no remaining defense.

Security professionals call this defense in depth: layering multiple independent security controls so that failure or bypass of any single control doesn’t result in total exposure.

For home and small business users, practical defense-in-depth includes:

  • Network-level security (router firewall, DNS filtering, IoT segmentation)
  • Endpoint security (Defender + additional hardening)
  • Account security (strong unique passwords, MFA on all accounts)
  • Behavioral awareness (phishing resistance, software only from trusted sources)
  • Backup (a current, tested backup means ransomware is inconvenient rather than catastrophic)

No single control is unbreakable. The goal is making the combination hard enough that attackers move on to easier targets.


Sources