[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$fT-YEm_iBeyczLc8SjeX5Io2B5MuHbT4Faki364WXBx4":3},{"article":4,"iocs":53},{"id":5,"title":6,"slug":7,"summary":8,"ai_summary":9,"brief":10,"full_text":11,"url":12,"image_url":13,"published_at":14,"ingested_at":15,"relevance_score":16,"entities":17,"category_id":32,"category":33,"article_tags":37},"19308891-aad0-4dd8-b813-d04ede57526f","Microsoft Patches Exploited UnDefend and RedSun Defender Zero-Days","microsoft-patches-exploited-undefend-and-redsun-defender-zero-days-abf255","The bugs could be exploited to elevate privileges to System or create a denial-of-service (DoS) condition. The post Microsoft Patches Exploited UnDefend and RedSun Defender Zero-Days appeared first on SecurityWeek.","Microsoft released security patches for two zero-day vulnerabilities in Microsoft Defender that have been actively exploited in the wild. CVE-2026-41091 (CVSS 7.8) allows privilege escalation to System via link-following, while CVE-2026-45498 (CVSS 4.0) causes denial-of-service; both are variants of the BlueHammer exploit publicly disclosed last month. CISA added these flaws to its Known Exploited Vulnerabilities list and mandated federal agencies patch by June 3, 2026.","Microsoft patches two exploited Defender zero-days allowing privilege escalation and DoS attacks.","Microsoft this week released patches for two vulnerabilities in Defender, warning they have been exploited in the wild as zero-days. The first, tracked as CVE-2026-41091 (CVSS score of 7.8), is described as a link-following issue that allows attackers to elevate their privileges to System. “Improper link resolution before file access (‘link following’) in Microsoft Defender allows an authorized attacker to elevate privileges locally,” Microsoft notes in its bare-bones advisory. The second bug, tracked as CVE-2026-45498 (CVSS score of 4.0), is a denial-of-service (DoS) flaw. Microsoft addressed the two security defects in Microsoft Defender Antimalware Platform version 4.18.26040.7. According to the company, systems with Microsoft Defender disabled are not exploitable, even though Defender’s files remain on disk. The company warned that both vulnerabilities have been publicly disclosed and that in-the-wild exploitation was detected, but did not provide further details.Advertisement. Scroll to continue reading. According to a post by Microsoft MVP Fabian Bader, the two vulnerabilities are the RedSun and UnDefend variants of the BlueHammer exploit that security researcher Chaos Eclipse dropped publicly last month. BlueHammer has also been exploited in the wild. On Wednesday, the US cybersecurity agency CISA added both flaws to its Known Exploited Vulnerabilities (KEV) list, urging federal agencies to patch them by June 3. The fresh Defender bugs were added to CISA’s KEV list alongside five other issues, all disclosed over half a decade ago. The oldest of the five is CVE-2008-4250, a remote code execution (RCE) weakness in the Server service of older Windows iterations that can be exploited via crafted RPC requests. Next in line is CVE-2009-1537, a NULL byte overwrite issue in Microsoft DirectX that could be exploited for RCE via crafted QuickTime media files. It was flagged as exploited in the wild in May 2009. The third vulnerability newly added to the KEV catalog is CVE-2009-3459, a heap-based buffer overflow in Adobe Acrobat and Reader that can be exploited for RCE via crafted PDF files. Additionally, CISA warned of the in-the-wild exploitation of two use-after-free vulnerabilities in Internet Explorer (CVE-2010-0249 and CVE-2010-0806). Federal agencies have until June 3 to apply patches for all these security defects. All organizations are advised to review CISA’s KEV list and address the vulnerabilities in it as soon as possible. Related: Verizon DBIR 2026: Vulnerability Exploitation Overtakes Credential Theft as Top Breach Vector Related: Researcher Drops MiniPlasma Windows Exploit for Unpatched 2020 CVE Related: Exploitation of Critical NGINX Vulnerability Begins Related: Microsoft Warns of Exchange Server Zero-Day Exploited in the Wild Written By Ionut Arghire Ionut Arghire is an international correspondent for SecurityWeek. Daily Briefing Newsletter Subscribe to the SecurityWeek Email Briefing for the latest cybersecurity threats, trends, and expert insights. More from Ionut Arghire Microsoft Rolls Out Mitigations for ‘YellowKey’ BitLocker BypassOver 320 NPM Packages Hit by Fresh Mini Shai-Hulud Supply Chain AttackGitHub Confirms Hack Impacting 3,800 Internal RepositoriesVerizon DBIR 2026: Vulnerability Exploitation Overtakes Credential Theft as Top Breach VectorUnpatched ChromaDB Vulnerability Can Lead to Server TakeoverB1ack’s Stash Marketplace Gives Away 4.6 Million Stolen Credit Cards201 Arrested in Crackdown on Cybercrime in Middle East, North AfricaPoC Released for DirtyDecrypt Linux Kernel Vulnerability Latest News Cisco Patches Critical Vulnerability in Secure WorkloadOcean Emerges From Stealth With $28M for Agentic Email Security PlatformApple Rejected 2 Million App Store Submissions in 2025 for Security and Fraud PreventionDrupal Patches Highly Critical Vulnerability Exposing Websites to HackingSocket Raises $60 Million at $1 Billion ValuationGoogle’s Surge in Chrome Vulnerability Discoveries Likely Driven by AISupply Chain Security Crisis: Too Many Vulnerabilities, Too Little VisibilityQuantum Bridge Raises $8 Million for Quantum-Safe Key Distribution Solution Trending Daily Briefing NewsletterSubscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts. Virtual Event: Threat Detection and Incident Response Summit May 20, 2026 Delve into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization. Register Webinar: Third-Party Risk in Practice June 4, 2026 Organizations are investing heavily in third-party risk management, but breaches, delays, and blind spots continue to persist. Join this live webinar as we examine the gap between how organizations think their third-party risk programs are performing and what’s actually happening in practice. Register People on the MoveJoe Chen has become Chief Technology Officer at Trellix.Usercentrics has named Pawan Hegde as COO and Elena Ignatova as CPTO.SecureAuth has named Mark van Oppen as Chief Revenue Officer.More People On The MoveExpert Insights Caught Off Guard: Securing AI After It Hits Production As enterprises rush AI projects into production, security teams are increasingly being forced into reactive mode. (Joshua Goldfarb) Cyber Resilience is the New Business Continuity Plan The organizations best prepared to face disruption are those that align security, continuity and risk management around what the business cannot afford to lose. (Steve Durbin) Enhancing Data Center Security Without Sacrificing Performance For AI data centers, where the stakes are the highest and performance constraints are the tightest, security and performance are no longer a zero-sum game. (Nadir Izrael) Is the SOC Obsolete, and We Just Haven’t Admitted It Yet? Many AI-first enterprises have already embraced sovereign architectures for general AI initiatives; cybersecurity—and the SOC—should be next. (Danelle Au) The Mythos Moment: Enterprises Must Fight Agents with Agents Only with the right platform and an agentic, AI-driven defense, will enterprises be able to protect themselves in the agentic era. (Etay Maor) Flipboard Reddit Whatsapp Whatsapp Email","https:\u002F\u002Fwww.securityweek.com\u002Fmicrosoft-patches-exploited-undefend-and-redsun-defender-zero-days\u002F","https:\u002F\u002Fwww.securityweek.com\u002Fwp-content\u002Fuploads\u002F2026\u002F05\u002FMicrosoft-Defender.jpg","2026-05-21T09:52:05+00:00","2026-05-21T10:00:06.094636+00:00",9,[18,21,24,26,29],{"name":19,"type":20},"Microsoft","vendor",{"name":22,"type":23},"Microsoft Defender","product",{"name":25,"type":23},"Microsoft Defender Antimalware Platform",{"name":27,"type":28},"BlueHammer exploit","technology",{"name":30,"type":31},"Chaos Eclipse","threat_actor","574f766a-fb3f-487c-8d2c-0720ae75471b",{"id":32,"icon":34,"name":35,"slug":36},null,"Zero-day","zero-day",[38,43,48],{"category":39},{"id":40,"icon":34,"name":41,"slug":42},"80544778-fabb-4dcd-aa35-17492e5dcf4f","Vulnerabilities","vulnerabilities",{"category":44},{"id":45,"icon":34,"name":46,"slug":47},"89f78b1c-3503-45a1-9fc7-e23d2ce1c6d5","Malware","malware",{"category":49},{"id":50,"icon":34,"name":51,"slug":52},"c5eccf7c-abbc-4bd3-bbed-e6da5cba8e73","Incident Response","incident-response",[54,58,61],{"type":55,"value":56,"context":57},"cve","CVE-2026-41091","Microsoft Defender privilege escalation via link-following (CVSS 7.8)",{"type":55,"value":59,"context":60},"CVE-2026-45498","Microsoft Defender denial-of-service vulnerability (CVSS 4.0)",{"type":47,"value":62,"context":63},"BlueHammer","Exploit framework with RedSun and UnDefend variants exploited in the wild"]