Security & Infrastructure Tools
Recently leaked Windows zero-days now exploited in attacks
Threat actors are actively exploiting three newly disclosed Windows zero-days—BlueHammer, RedSun, and UnDefend—to gain SYSTEM or elevated privileges and to block Defender updates. BlueHammer has been patched in the April 2026 updates (CVE-2026-33825), but RedSun and UnDefend remain unpatched, enabling attacks on Windows 10/11 and Windows Server 2019+ even with Defender enabled. Security researchers have observed all three exploits in the wild since early April, including an instance via a compromised SSLVPN session, indicating hands-on-keyboard activity and foreshadowing a wave of further exploits.

Recently Leaked Windows Zero-Days Now Exploited in Attacks
1) Executive Overview
- Threat actors are leveraging three recently disclosed Windows vulnerabilities to gain SYSTEM or elevated administrator privileges.
- Proof-of-concept code for all three flaws circulated publicly in the wake of the disclosure process, prompting widespread attention from defenders and researchers.
- Among the flaws, two are local privilege escalation (LPE) issues affecting Microsoft Defender, while the third can be triggered by a standard user to disrupt Defender updates.
2) The Exploitable Flaws (BlueHammer, RedSun, UnDefend)
- BlueHammer (CVE-2026-33825)
- A Windows Defender local privilege escalation flaw.
- Patch status: addressed in the April 2026 Security Updates.
- Impact: when exploited, an attacker can escalate privileges to SYSTEM on affected Windows versions.
- RedSun
- Another Defender-related LPE vulnerability.
- Patch status: no official fix available as part of the April 2026 cycle.
- Impact: enables SYSTEM-level access on Windows 10, Windows 11, and Windows Server 2019 and newer when Defender is enabled; PoC demonstrates overwriting critical system files to achieve elevated privileges.
- UnDefend
- A separate vulnerability exploitable by a standard user to block Microsoft Defender definition updates.
- Patch status: no fix available in the cited timeframe.
- Impact: defangs Defender by preventing updates to its threat definitions, potentially increasing exposure to other threats.
3) Timeline of Disclosure and PoC Publication
- Early April 2026
- A security researcher group released PoC exploit code for all three flaws, citing concerns with how disclosure was handled by Microsoft’s Security Response Center.
- April 10, 2026
- Evidence emerged of active exploitation in the wild, with BlueHammer already being used in attacks.
- Late April 2026
- Observations from security outfits indicated continued deployment of RedSun and UnDefend techniques in compromised environments.
4) Observed In-The-Wild Activity
- The three exploit techniques were reportedly deployed together in some campaigns, with attackers pursuing SYSTEM-level access and persistence.
- A notable real-world instance involved a Windows device breached via a compromised SSL VPN credential where hands-on threat activity was observed, suggesting the attackers were actively guiding the exploitation process.
- Security researchers highlighted that Nightmare-Eclipse's exploitation chain was visible in multiple engagements, underscoring the seriousness of the three flaws when combined with a live environment.
5) Impact Scope and Technical Nuances
- Affected systems span Windows 10, Windows 11, and Windows Server 2019 and later, particularly when Defender is enabled.
- BlueHammer’s patch provides relief, but the other two flaws continue to expose unpatched devices to privilege escalation or Defender-update disruption.
- The RedSun vector is described as abusing Defender’s behavior around file handling to overwrite critical system files, enabling privilege elevation. This emphasizes how defender-integrated components can become attack surfaces when not fully mitigated.
- The UnDefend vector demonstrates how defense mechanisms themselves can be leveraged to stall remediation efforts by halting signature updates, complicating incident response.
6) Vendor Responses and Security Community Commentary
- Microsoft acknowledged the ongoing investigation and stressed the importance of coordinated vulnerability disclosure to balance customer protection with security research.
- Security researchers noted the rapid emergence of exploit activity following public PoCs, reinforcing the need for prompt patching and vigilant monitoring of Defender-related events.
- Industry researchers and incident responders emphasized that zero-days with a combination of LPE and update-disruption capabilities present elevated risk, particularly in environments where Defender is enabled and systems are reachable over the network.
7) Defensive Context and Remediation Outlook
- Patch coverage: BlueHammer has been remediated in the April 2026 update wave, but RedSun and UnDefend remain unpatched in the cited window, leaving devices exposed until fixes are applied.
- Threat posture implications: attackers can use a mix of elevated-privilege techniques and update-blocking tactics to establish footholds, move laterally, and hinder detection.
- Operational considerations: organizations should review Defender configuration continuity, ensure timely application of security updates when released, and monitor for indicators related to defense-definition manipulation and unusual privilege escalation patterns.
8) Visual and Public Communications Footnotes
- Security teams and researchers publicly shared indicators of compromise and procedural insights through social channels and research repositories linked to the involved exploit disclosures.
- Public discussions highlighted the dual-use nature of PoCs: they serve as proof-of-concept demonstrations and, when weaponized, can enable rapid exploitation on unpatched systems.
9) Related Contexts and Directions
- The exploitation of Defender-related flaws demonstrates the evolving landscape where security tooling itself can become an attack vector.
- As new defenses and mitigations emerge, defenders are increasingly challenged to stay ahead of adversaries who combine multiple zero-days to bypass protections and maintain persistence in targeted environments.
10) Summary of Key Points
- Three Windows zero-days were observed exploited in the wild following public PoCs.
- BlueHammer has been patched; RedSun and UnDefend remain outstanding concerns at the time described.
- Attack activity included elevated-privilege objectives and Defender-update disruption, underscoring the need for careful posture management and rapid remediation when updates become available.