BotBeat
...
← Back

> ▌

MicrosoftMicrosoft
POLICY & REGULATIONMicrosoft2026-04-20

RedSun and UnDefend Exploits Leave Windows Defender Vulnerable; Patches Absent Weeks After BlueHammer Fix

Key Takeaways

  • ▸RedSun and UnDefend remain unpatched and unassigned CVE numbers despite confirmed real-world exploitation
  • ▸The three exploits form a coordinated attack chain that patches addressing only BlueHammer fail to contain
  • ▸Local privilege escalation attacks require only user-level shell access, not physical proximity, making enterprise exposure significantly higher than some public coverage suggests
Source:
Hacker Newshttps://cyberspit.com/redsun-undefend-defender-zero-days.html↗

Summary

A researcher operating under the aliases Nightmare-Eclipse and Chaotic Eclipse has disclosed three working exploits targeting Microsoft Defender within a 12-13 day period in April 2026. While the first exploit, BlueHammer, was patched under CVE-2026-33825 during the April Patch Tuesday cycle, two subsequent exploits—RedSun and UnDefend—remain unpatched with no CVE identifiers assigned and no official Microsoft remediation timeline. Security firm Huntress has confirmed all three exploits have been used in real-world intrusions.

The three exploits form a cohesive offensive workflow that escalates privileges, executes arbitrary code with SYSTEM rights, and disables Defender's detection capabilities. The BlueHammer patch addresses only the first component, leaving organizations that applied April updates still fully exposed to two-thirds of the toolkit. Contrary to some consumer media reporting, these exploits do not require physical access—they can be triggered by any user-level shell access, such as from phishing, malware downloads, or compromised VPN credentials.

  • Microsoft has issued no official patch timeline, with the next Patch Tuesday weeks away from the disclosure date

Editorial Opinion

The disclosure of RedSun and UnDefend represents a critical gap in Microsoft's vulnerability response infrastructure. While the company patched BlueHammer promptly, the existence of two related exploits with no CVE assignments or patches weeks after disclosure raises serious questions about coordinated disclosure practices and patch release cadence. Organizations should not wait for official patches before assessing their exposure to local privilege escalation risks through Defender itself.

CybersecurityRegulation & PolicyAI Safety & Alignment

More from Microsoft

MicrosoftMicrosoft
INDUSTRY REPORT

LinkedIn Data Shows AI Not Yet Impacting Job Market Despite 20% Hiring Decline Since 2022

2026-04-15
MicrosoftMicrosoft
FUNDING & BUSINESS

Microsoft Raises Prices Across All Surface PCs, Now More Expensive Than Mac Equivalents

2026-04-15
MicrosoftMicrosoft
UPDATE

.NET 11 Preview 3 Released with Runtime, SDK, and ASP.NET Core Improvements

2026-04-14

Comments

Suggested

ObjectionObjection
PRODUCT LAUNCH

Peter Thiel Launches Objection.ai, an AI-Powered 'Tribunal' to Challenge Media Reporting

2026-04-20
AnthropicAnthropic
PRODUCT LAUNCH

Anthropic's Mythos AI Model Raises Global Cyber Security Alarm Over Accelerated Hacking Threats

2026-04-20
N/AN/A
POLICY & REGULATION

Germany's Merz Calls for Less Stringent EU Regulation on Industrial AI

2026-04-20
← Back to news
© 2026 BotBeat
AboutPrivacy PolicyTerms of ServiceContact Us