Ethical Hacking News
US government agencies are being ordered by CISA to patch a critical Windows vulnerability that was exploited in zero-day attacks, highlighting the need for timely patching and mitigation strategies to prevent attacks and minimize damage.
CISA has issued an urgent warning to U.S. government agencies to patch a critical Windows vulnerability. The vulnerability, CVE-2026-33825, allows low-privileged local threat actors to gain SYSTEM permissions on unpatched devices. Microsoft patched the vulnerability on April 14 as part of its Patch Tuesday updates. CISA has added the BlueHammer vulnerability to its Known Exploited Vulnerabilities (KEV) Catalog, ordering Federal agencies to patch their systems within two weeks.
The Cybersecurity and Infrastructure Security Agency (CISA) has issued an urgent warning to U.S. government agencies, ordering them to patch a critical vulnerability in Windows systems that was exploited in zero-day attacks. The vulnerability, tracked as CVE-2026-33825, is a Microsoft Defender privilege escalation flaw that allows low-privileged local threat actors to gain SYSTEM permissions on unpatched devices.
Microsoft patched the vulnerability on April 14, as part of this month's Patch Tuesday, one week after a security researcher using the "Chaotic Eclipse" handle dubbed it "BlueHammer" and published proof-of-concept exploit code in protest to how Microsoft's Security Response Center (MSRC) handled the disclosure process. Chaotic Eclipse also disclosed a second Microsoft Defender privilege escalation flaw (dubbed RedSun) and a third flaw (known as UnDefend) that can be exploited as a standard user to block Defender definition updates.
At the time of the leak, all three vulnerabilities were considered zero-days by Microsoft's definition, since they had no official patches. Additionally, as Huntress Labs security researchers revealed on April 16, attackers had also been exploiting these zero-days in attacks that showed evidence of "hands-on-keyboard threat actor activity."
"The activity also appeared to be part of a broader intrusion rather than isolated proof-of-concept (PoC) testing," the cybersecurity company said in a Monday report. "Huntress identified suspicious FortiGate SSL VPN access tied to the compromised environment, including a source IP geolocated to Russia, with additional suspicious infrastructure observed in other regions."
CISA has now added the BlueHammer vulnerability to its Known Exploited Vulnerabilities (KEV) Catalog on Monday, ordering Federal Civilian Executive Branch (FCEB) agencies to patch their Windows systems against ongoing CVE-2026-33825 attacks within two weeks, until May 7. This type of vulnerability is a frequent attack vector for malicious cyber actors and poses significant risks to the federal enterprise," CISA warned.
"Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable."
One week ago, CISA also warned that a Windows Task Host privilege-escalation vulnerability (CVE-2025-60710) that grants attackers SYSTEM privileges on unpatched Windows 11 and Windows Server 2025 devices is also now actively exploited in the wild.
The BlueHammer vulnerability is just one of several zero-day vulnerabilities that have been exposed in recent weeks, highlighting the need for organizations to stay vigilant and proactive in their cybersecurity efforts. As we move forward into the next year, it's essential to recognize the importance of timely patching and mitigation strategies to prevent attacks and minimize damage.
The attack on U.S. government agencies underscores the critical role that CISA plays in protecting national security interests. By issuing this urgent warning, CISA is demonstrating its commitment to safeguarding federal systems and data against the ever-evolving threat landscape.
As we continue to navigate the complex and rapidly evolving world of cybersecurity threats, it's essential for organizations to prioritize their security posture through regular patching, monitoring, and incident response planning. By doing so, they can significantly reduce the risk of exploitation by malicious actors and minimize the impact of potential breaches.
In conclusion, the exposure of the BlueHammer vulnerability serves as a stark reminder of the importance of cybersecurity awareness and proactive threat management. As organizations move forward into 2026, it's essential to stay informed about emerging threats and vulnerabilities, and to remain vigilant in their efforts to protect against them.
Related Information:
https://www.ethicalhackingnews.com/articles/CISA-Orders-Feds-to-Patch-Urgently-Microsoft-Defender-BlueHammer-Zero-Day-Vulnerability-Exposed-ehn.shtml
https://www.bleepingcomputer.com/news/security/cisa-orders-feds-to-patch-microsoft-defender-flaw-exploited-in-zero-day-attacks/
https://www.theatlasnews.com/cisa-orders-federal-agencies-to-fix-exploited-samsung-flaw-tied-to-mobile-spyware/
https://nvd.nist.gov/vuln/detail/CVE-2025-60710
https://www.cvedetails.com/cve/CVE-2025-60710/
https://nvd.nist.gov/vuln/detail/CVE-2026-33825
https://www.cvedetails.com/cve/CVE-2026-33825/
Published: Thu Apr 23 06:57:53 2026 by llama3.2 3B Q4_K_M