[CIVN-2026-0205] Multiple Vulnerabilities in Microsoft Products

By Published On: April 27, 2026

—–BEGIN PGP SIGNED MESSAGE—–

Hash: SHA256


Multiple Vulnerabilities in Microsoft Products


Indian – Computer Emergency Response Team (https://www.cert-in.org.in)


Severity Rating: HIGH


Software Affected


Windows 10: Versions 1607, 1809, 21H2, and 22H2.

Windows 11: Versions 23H2, 24H2, and 25H2.

Windows Server: 2012, 2012 R2, 2016, 2019, 2022, 2022 (23H2 Edition), and 2025.

Microsoft Office (various supported versions).

Microsoft Edge (Chromium-based)

Overview


Multiple vulnerabilities have been reported in Microsoft products which could allow an attacker to execute arbitrary code, elevate privileges, disclose sensitive information, or cause denial of service on the affected systems.


Target Audience:

All organizations and individuals using affected Microsoft products.


Risk Assessment:

High risk due to the potential for remote code execution, privilege escalation, information disclosure, and denial of service.


Impact Assessment:

Potential for remote code execution, privilege escalation, unauthorized disclosure of sensitive information, bypass of security protections, and disruption of system availability.


Description


These vulnerabilities exist in Microsoft products due to improper input validation, memory corruption, insufficient access control mechanisms and improper handling of objects in memory. An attacker could exploit these vulnerabilities remotely or locally depending on the attack vector, with some cases requiring user interaction (such as opening a crafted file or visiting a malicious webpage) while others may be exploited without authentication.


Successful exploitation of these vulnerabilities could allow an attacker to execute arbitrary code in the context of the current user, escalate privileges, access sensitive information, or disrupt system availability.


Solution


Apply appropriate updates as mentioned as mentioned by the Vendor:

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21515


https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-35431


https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-24303


https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26150


https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33819


https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33102


https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32210


https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32172



Vendor Information


Microsoft Corporation

https://www.microsoft.com/en-in/


References


 

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21515

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-35431

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-24303

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26150

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33819

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33102

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32210

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32172


CVE Name

CVE-2026-21515

CVE-2026-35431

CVE-2026-24303

CVE-2026-26150

CVE-2026-33819

CVE-2026-33102

CVE-2026-32210

CVE-2026-32172




– —


Thanks and Regards,

CERT-In


Incident Response Help Desk

e-mail: incident@cert-in.org.in

Phone: +91-11-22902657

Toll Free Number: 1800-11-4949

Toll Free Fax : 1800-11-6969

Web: http://www.cert-in.org.in

PGP Fingerprint: A768 083E 4475 5725 B81A A379 2156 C0C0 B620 D0B4

PGP Key information:

https://www.cert-in.org.in/s2cMainServlet?pageid=CONTACTUS


Postal address:

Indian Computer Emergency Response Team (CERT-In)

Ministry of Electronics and Information Technology

Government of India

Electronics Niketan

6, C.G.O. Complex

New Delhi-110 003

—–BEGIN PGP SIGNATURE—–


iQIzBAEBCAAdFiEE6r4Iam/Ey0c/KakL3jCgcSdcys8FAmnvZogACgkQ3jCgcSdc

ys/4PRAAleeK2Zg1jDK1sIJk3132efkuYyrZa//sacMIubBYoZ8kzdNn29IFS57L

Z36pQAxdZNArOPvFypw5mIyrhilYyYzlEF2DfJJY4tEFiBCncheobP4efzF0SDjB

MNNauhQTDVmt0bmSJBtc3o+flK6iCi/Qv2FxIK05YeTCjj68nzlwSTaKYB5YfCjD

Z+KrINUlXjVz4+OVyoSfgaN05sPwHFRLEhkEDHbVZGbrqo6g3vpumhvvPUzUSWLb

eC3sUJ6AUsBc/lqfE46bjonjA4emEpVPUrWNkNYNmOPLs8rGFHRSww6vsX59QzGH

WfZDDzLVdorYqZqaj9MZ51A+tpHfwoYvQ6BQ6ceq2GIJhmfz35Jeps3dkDIwEnZR

JrJrPKriTxHUyBjBZSQmUgPw3gMbPRhZKFeCxdb89fWPHHUPvsnuURRaP2oPtfyd

KUCYNaUTIYP0KNol06zTKqP25JaVIF0qC+7hV6ac7pqism4ji6GBN8C2jUqQPjpo

9JDMW6j04YworKJtrGf8R9mIeobuqN49/TCqh8pGuURZF8QHANfKqRfFhvjNYVW/

p1u1AHaPztS2jN1R3GZ5WBzpRABBjhAFudetQufuRdGOZ9SgyhJ84LXh1xqAiCmP

4aBywg8g6QN/AzYCj/f2EW4wclcnjz/F51Wt4hV+6qdkV1iz0c8=

=FS8Q

—–END PGP SIGNATURE—–

Share this article