Questioning Everything Propaganda

Home Tags
Login RSS
WinSlop

Windows 11 — CVEs, Zero-Days & Severe Update Bugs (2021–2026)

All Patch Tuesday CVE data and documented severe bugs since Windows 11's GA release on October 5, 2021.
Severity ratings follow Microsoft's classifications (Critical / Important / Moderate) and CVSS scores where available.
"Exploited" = confirmed in-the-wild exploitation at time of patch.


Feature Version Release Timeline

Release Date Version Build Number Notes
2021-10-05 21H2 (initial GA) 22000.194 Windows 11 general availability
2022-09-20 22H2 22621.521 First annual feature update
2023-10-31 23H2 22631.2428 Second annual feature update
2024-10-01 24H2 26100.1742 Third annual feature update
2025-09-30 25H2 26200.x Fourth annual feature update
2026-02-10 26H1 26300.x Fifth feature update (mid-year cadence shift)

Security CVEs & Severe Bugs — Full History

Date Win 11 Version KB Number Type CVE ID CVSS Exploited Description
2021-10-05 21H2 Bug TPM 2.0 requirement blocked upgrade on millions of otherwise capable systems; no bypass path for consumers
2021-11-09 21H2 KB5007215 Bug First cumulative update caused UI rendering glitches, Start menu search failures, and context-menu lag on some hardware
2021-12-14 21H2 KB5008215 CVE CVE-2021-43890 7.1 Yes Windows AppX Installer spoofing vulnerability; actively exploited to distribute Emotet/TrickBot malware via fake package prompts
2022-01-11 21H2 KB5009566 CVE CVE-2022-21907 9.8 No HTTP Protocol Stack RCE; wormable, no authentication required; one of 11 Critical CVEs in this cycle (98 total CVEs)
2022-01-11 21H2 KB5009566 Bug Update caused L2TP VPN connections to fail on some configurations; Microsoft issued out-of-band KB5010793
2022-02-08 21H2 KB5010386 CVE CVE-2022-21989 7.8 No Windows Kernel EoP vulnerability allowing SYSTEM-level privilege escalation
2022-03-08 21H2 KB5011493 CVE CVE-2022-21990 8.8 Yes Remote Desktop Client RCE; 92 total CVEs, 3 zero-days, 3 Critical rated
2022-03-08 21H2 KB5011493 CVE CVE-2022-24512 6.3 Yes .NET and Visual Studio RCE; publicly disclosed before patch
2022-03-08 21H2 KB5011493 CVE CVE-2022-24459 7.8 Yes Windows Fax and Scan Service EoP; publicly disclosed
2022-04-12 21H2 KB5012592 CVE CVE-2022-24521 7.8 Yes Windows CLFS (Common Log File System) EoP; actively exploited
2022-04-12 21H2 KB5012592 CVE CVE-2022-26809 9.8 No Windows RPC RCE; wormable potential, Critical rating
2022-05-10 21H2 KB5013943 Bug AMD CPU L3 cache latency bug: update doubled L3 cache latency on AMD Ryzen processors, causing up to 15% gaming performance loss
2022-05-10 21H2 KB5013943 CVE CVE-2022-26925 8.1 Yes Windows LSA spoofing / NTLM relay zero-day; exploitable via PetitPotam; Microsoft forced forced-patch on DCs
2022-06-14 21H2 KB5014697 CVE CVE-2022-30136 9.8 No Windows NFS v4.1 RCE; Critical, no authentication required
2022-06-14 21H2 KB5014697 Bug Printer installation failures: user-mode printer drivers unloaded unexpectedly from multiple print queues to same driver; IPP printer installs failed
2022-07-12 21H2 KB5015814 CVE CVE-2022-22047 7.8 Yes Windows CSRSS EoP; actively exploited in targeted attacks
2022-08-09 21H2 KB5016629 CVE CVE-2022-34713 7.8 Yes MSDT "DogWalk" RCE; actively exploited; bypass for earlier Follina mitigations
2022-08-09 21H2 KB5016629 CVE CVE-2022-35743 7.8 No Microsoft Windows Support Diagnostic Tool (MSDT) RCE
2022-09-13 21H2 KB5017328 CVE CVE-2022-37969 7.8 Yes Windows CLFS EoP zero-day; exploited by multiple threat actors; 63 total CVEs
2022-09-13 21H2 KB5017328 CVE CVE-2022-34721 9.8 No Windows IKE Protocol Extensions RCE; Critical, unauthenticated
2022-09-13 21H2 KB5017328 CVE CVE-2022-34718 9.8 No Windows TCP/IP RCE; Critical, unauthenticated
2022-10-11 21H2 KB5018418 CVE CVE-2022-41033 7.8 Yes Windows COM+ Event System Service EoP; actively exploited zero-day
2022-10-11 21H2 KB5018418 CVE CVE-2022-41043 4.0 Yes Microsoft Office information disclosure; publicly disclosed
2022-11-08 21H2 KB5019980 CVE CVE-2022-41073 7.8 Yes Windows Print Spooler EoP; SYSTEM privilege escalation; one of 6 exploited zero-days
2022-11-08 21H2 KB5019980 CVE CVE-2022-41125 7.8 Yes Windows CNG Key Isolation Service EoP; SYSTEM privilege escalation; exploited
2022-11-08 21H2 KB5019980 CVE CVE-2022-41091 5.4 Yes Windows Mark of the Web (MotW) security bypass; exploited to deliver malware without SmartScreen warnings
2022-11-08 21H2 KB5019980 CVE CVE-2022-41128 8.8 Yes Windows Scripting Languages RCE; actively exploited; 68 total CVEs, 11 Critical
2022-11-08 21H2 KB5019980 CVE CVE-2022-41040 8.8 Yes Exchange Server SSRF (ProxyNotShell); chained with CVE-2022-41082 for RCE
2022-11-08 21H2 KB5019980 CVE CVE-2022-41082 8.8 Yes Exchange Server RCE (ProxyNotShell); disclosed by GTSC in September 2022
2022-12-13 21H2 KB5021234 CVE CVE-2022-44698 5.4 Yes Windows SmartScreen security bypass zero-day; actively exploited
2022-12-13 21H2 KB5021234 CVE CVE-2022-44710 7.8 Yes DirectX Graphics Kernel EoP; publicly disclosed
2023-01-10 22H2 KB5022303 CVE CVE-2023-21674 8.8 Yes Windows ALPC (Advanced Local Procedure Call) EoP; sandbox escape zero-day; exploited in targeted attacks
2023-02-14 22H2 KB5022845 CVE CVE-2023-21823 7.8 Yes Windows Graphics Component EoP; exploited; affects multiple Windows versions
2023-02-14 22H2 KB5022845 CVE CVE-2023-23376 7.8 Yes Windows CLFS EoP zero-day; exploited in the wild; 77 total CVEs, 9 Critical
2023-02-14 22H2 KB5022845 CVE CVE-2023-21715 7.3 Yes Microsoft Publisher SFB (Security Feature Bypass); exploited
2023-03-14 22H2 KB5023706 CVE CVE-2023-23397 9.8 Yes Microsoft Outlook Critical EoP; CVSS 9.8; zero authentication required; harvests NTLM hashes; exploited by Russian APT28 against EU defense/government targets
2023-03-14 22H2 KB5023706 CVE CVE-2023-24880 5.1 Yes Windows SmartScreen bypass; exploited to deliver Magniber ransomware
2023-04-11 22H2 KB5025239 CVE CVE-2023-28252 7.8 Yes Windows CLFS EoP zero-day; exploited by Nokoyawa ransomware gang; SYSTEM privilege escalation; 97 total CVEs
2023-05-09 22H2 KB5026372 CVE CVE-2023-29336 7.8 Yes Win32k Kernel EoP; SYSTEM-level privilege escalation; exploited in wild
2023-05-09 22H2 KB5026372 CVE CVE-2023-24932 6.7 Yes Secure Boot Security Feature Bypass; used by BlackLotus UEFI bootkit to persist across reinstalls
2023-05-09 22H2 KB5026372 Bug VPN breakage: L2TP/IPsec VPN speeds dropped from 16 MB/s to near-zero; connection delays increased to 20–30 seconds; affected hundreds of enterprise deployments
2023-06-13 22H2 KB5027231 CVE CVE-2023-29357 9.8 Yes Microsoft SharePoint Server EoP; Critical CVSS 9.8; no authentication needed; chained with CVE-2023-24955
2023-07-11 22H2 KB5028185 CVE CVE-2023-36874 7.8 Yes Windows Error Reporting Service EoP zero-day; exploited
2023-07-11 22H2 KB5028185 CVE CVE-2023-35311 8.8 Yes Microsoft Outlook security bypass zero-day; exploited
2023-07-11 22H2 KB5028185 CVE CVE-2023-32046 7.8 Yes Windows MSHTML Platform EoP zero-day; exploited
2023-07-11 22H2 KB5028185 CVE CVE-2023-32049 8.8 Yes Windows SmartScreen bypass zero-day; exploited; 132 total CVEs, 6 zero-days all exploited
2023-07-11 22H2 KB5028185 CVE CVE-2023-36884 8.3 Yes Windows Search RCE / Office HTML RCE; zero-day exploited by Russian RomCom threat actor; no patch initially, later addressed
2023-07-11 22H2 KB5028254 Bug Out-of-band fix released for VPN performance issues from KB5026372; fixed 27 additional bugs
2023-08-08 22H2 KB5029263 CVE CVE-2023-38180 7.5 Yes .NET and Visual Studio DoS zero-day; exploited in the wild
2023-08-08 22H2 KB5029263 CVE CVE-2023-36910 9.8 No Microsoft Message Queuing (MSMQ) RCE; Critical CVSS 9.8; unauthenticated
2023-09-12 22H2 KB5030219 CVE CVE-2023-36761 6.2 Yes Microsoft Word information disclosure; zero-day exploited to steal NTLM hashes
2023-09-12 22H2 KB5030219 CVE CVE-2023-36802 7.8 Yes Microsoft Streaming Service Proxy EoP zero-day; exploited
2023-10-10 22H2 KB5031354 CVE CVE-2023-41763 5.3 Yes Skype for Business EoP zero-day; exploited; leaks internal IP addresses
2023-10-10 22H2 KB5031354 CVE CVE-2023-44487 7.5 Yes HTTP/2 Rapid Reset Attack (industry-wide CVE); Microsoft mitigated IIS, .NET, and Windows Server components
2023-11-14 23H2 KB5032190 CVE CVE-2023-36033 7.8 Yes Windows DWM Core Library EoP zero-day; SYSTEM-level privilege escalation; exploited
2023-11-14 23H2 KB5032190 CVE CVE-2023-36025 8.8 Yes Windows SmartScreen bypass; exploited to deliver Phemedrone Stealer and other malware via malicious .url files
2023-11-14 23H2 KB5032190 CVE CVE-2023-36036 7.8 Yes Windows Cloud Files Mini Filter Driver EoP zero-day; exploited; 57 total CVEs
2023-12-12 23H2 KB5033375 CVE CVE-2023-35628 9.8 No Windows MSHTML Platform RCE; Critical CVSS 9.8; email-based attack vector with no user interaction
2023-12-12 23H2 KB5033375 CVE CVE-2023-36019 9.6 No Microsoft Power Platform Connector spoofing; Critical
2024-01-09 23H2 KB5034123 CVE CVE-2024-20674 9.0 No Windows Kerberos Security Feature Bypass; Critical; CVSS 9.0; allows auth bypass
2024-01-09 23H2 KB5034123 CVE CVE-2024-20700 7.5 No Windows Hyper-V RCE; Critical; race condition exploit
2024-02-13 23H2 KB5034765 CVE CVE-2024-21351 7.6 Yes Windows SmartScreen Security Feature Bypass; zero-day exploited in wild
2024-02-13 23H2 KB5034765 CVE CVE-2024-21412 8.1 Yes Internet Shortcut Files Security Feature Bypass; zero-day; exploited by DarkCasino APT to deliver malware via forged .url files; 73 total CVEs
2024-03-12 23H2 KB5035853 CVE CVE-2024-21334 9.8 No Open Management Infrastructure (OMI) RCE; Critical CVSS 9.8
2024-03-12 23H2 KB5035853 CVE CVE-2024-26198 8.8 No Microsoft Exchange Server RCE
2024-04-09 23H2 KB5036893 CVE CVE-2024-26234 6.7 Yes Proxy Driver Spoofing zero-day; malicious driver signed with valid Microsoft certificate; exploited
2024-04-09 23H2 KB5036893 CVE CVE-2024-29988 8.8 Yes SmartScreen Prompt Security Feature Bypass; zero-day exploited; chained attacks
2024-05-14 23H2 KB5037771 CVE CVE-2024-30051 7.8 Yes Windows DWM Core Library EoP zero-day; exploited; used in QakBot malware campaign
2024-05-14 23H2 KB5037771 CVE CVE-2024-30040 8.8 Yes Windows MSHTML Platform SFB zero-day; exploited; bypasses OLE mitigations in Office
2024-06-11 23H2 KB5039212 CVE CVE-2024-30080 9.8 No Windows Message Queuing (MSMQ) RCE; Critical CVSS 9.8; 51 total CVEs, 18 RCE flaws
2024-06-11 23H2 KB5039212 CVE CVE-2024-30103 8.8 No Microsoft Outlook RCE; Critical; no user interaction required
2024-07-09 23H2 KB5040442 CVE CVE-2024-38080 7.8 Yes Windows Hyper-V EoP zero-day; exploited
2024-07-09 23H2 KB5040442 CVE CVE-2024-38112 7.5 Yes Windows MSHTML Platform Spoofing zero-day; exploited; 142 total CVEs, 4 zero-days
2024-07-09 23H2 KB5040442 Bug CrowdStrike Falcon sensor incident (July 19, separate from Patch Tuesday): faulty content update crashed ~8.5 million Windows systems globally with BSOD; not a Microsoft patch but widely attributed to Windows driver model fragility
2024-08-13 23H2 KB5041585 CVE CVE-2024-38202 7.3 Yes Windows Update Stack EoP; part of "Windows Downdate" attack (CVE-2024-21302 + CVE-2024-38202); allowed downgrading fully patched Windows to re-introduce old vulnerabilities; 9 zero-days in cycle, 6 exploited
2024-08-13 23H2 KB5041585 CVE CVE-2024-21302 6.7 Yes Windows Secure Kernel Mode EoP; paired with CVE-2024-38202 for downgrade attack
2024-08-13 23H2 KB5041585 CVE CVE-2024-38178 7.5 Yes Windows Scripting Engine Memory Corruption RCE zero-day; exploited
2024-08-13 23H2 KB5041585 CVE CVE-2024-38193 7.8 Yes Windows Ancillary Function Driver for WinSock EoP zero-day; exploited
2024-09-10 24H2 KB5043080 CVE CVE-2024-38217 5.4 Yes Windows Mark-of-the-Web (MotW) bypass zero-day; exploited via LNK files; previously exploited before patch
2024-09-10 24H2 KB5043080 CVE CVE-2024-43491 9.8 Yes Windows Update CVSS 9.8 Critical; actively exploited to reverse previous security fixes
2024-09-10 24H2 KB5043080 CVE CVE-2024-38226 7.3 Yes Microsoft Publisher SFB; zero-day exploited
2024-10-08 24H2 KB5044284 CVE CVE-2024-43573 6.5 Yes Windows MSHTML Platform Spoofing zero-day; exploited; 118 total CVEs, 5 zero-days
2024-10-08 24H2 KB5044284 CVE CVE-2024-43572 7.8 Yes Microsoft Management Console (MMC) RCE zero-day; exploited via malicious .msc files
2024-10-08 24H2 KB5044284 CVE CVE-2024-20659 7.1 No Windows Hyper-V Security Feature Bypass; Critical; allows VM guest-to-host escape
2024-11-12 24H2 KB5046617 CVE CVE-2024-43451 6.5 Yes NTLM Hash Disclosure SFB zero-day; minimal user interaction to steal NTLM hash; exploited; 89 total CVEs
2024-11-12 24H2 KB5046617 CVE CVE-2024-49039 8.8 Yes Windows Task Scheduler EoP zero-day; exploited; sandbox escape
2024-11-12 24H2 KB5046617 CVE CVE-2024-43639 9.8 No Windows Kerberos RCE; Critical CVSS 9.8; unauthenticated
2024-12-10 24H2 KB5048667 CVE CVE-2024-49138 7.8 Yes Windows CLFS EoP zero-day; actively exploited; 71 total CVEs, 16 Critical (all RCE)
2024-12-10 24H2 KB5048667 CVE CVE-2024-49112 9.8 No Windows LDAP RCE; Critical CVSS 9.8; unauthenticated; wormable potential
2025-01-14 24H2 KB5050009 CVE CVE-2025-21333 7.8 Yes Windows Hyper-V NT Kernel Integration VSP EoP zero-day; exploited
2025-01-14 24H2 KB5050009 CVE CVE-2025-21334 7.8 Yes Windows Hyper-V NT Kernel Integration VSP EoP zero-day; exploited
2025-01-14 24H2 KB5050009 CVE CVE-2025-21335 7.8 Yes Windows Hyper-V NT Kernel Integration VSP EoP zero-day; exploited; all three Hyper-V zero-days used in active campaigns
2025-01-14 24H2 KB5050009 Bug USB DAC audio broken: KB5050009 (24H2) and KB5050021 (23H2) broke audio output on external USB Digital-to-Analog Converter devices
2025-01-14 24H2 KB5050009 Bug RDP broken in 24H2: Remote Desktop Protocol connections stopped working in Windows 11 24H2 even with RDP service running
2025-02-11 24H2 KB5051987 CVE CVE-2025-21391 7.1 Yes Windows Storage EoP zero-day; exploited; allows deletion of targeted files
2025-02-11 24H2 KB5051987 CVE CVE-2025-21418 7.8 Yes Windows Ancillary Function Driver for WinSock EoP zero-day; exploited; SYSTEM privilege escalation
2025-03-11 24H2 KB5053598 CVE CVE-2025-26633 7.0 Yes Microsoft Management Console (MMC) SFB; exploited by "MSC EvilTwin" trojan loader; used by multiple threat groups; 57 total CVEs, 7 zero-days
2025-03-11 24H2 KB5053598 CVE CVE-2025-24993 7.8 No Windows NTFS Remote Code Execution; memory corruption; affects virtually all Windows systems
2025-03-11 24H2 KB5053598 CVE CVE-2025-24985 7.8 No Windows Fast FAT File System Driver RCE
2025-03-11 24H2 KB5053598 CVE CVE-2025-24983 7.0 Yes Windows Win32 Kernel Subsystem EoP zero-day; exploited
2025-03-11 24H2 KB5053598 Bug March update stuck/looping: KB5053598 installations got stuck at various percentages and entered install-fail-revert loops on some systems
2025-04-08 24H2 KB5055523 CVE CVE-2025-29824 7.8 Yes Windows CLFS EoP zero-day; exploited by RansomEXX ransomware gang for SYSTEM-level access
2025-04-08 24H2 KB5055523 Bug BSOD epidemic: KB5055523 caused SECURE_KERNEL_ERROR blue screens on affected PCs; also impacted KB5053656 and KB5053598; emergency out-of-band fix required
2025-04-08 24H2 KB5055523 Bug Windows Hello broken: Face/iris recognition sign-in stopped working after KB5055523 install
2025-05-13 24H2 KB5058411 CVE CVE-2025-30397 7.5 Yes Windows Scripting Engine Memory Corruption zero-day; exploited in browser-based attacks
2025-05-13 24H2 KB5058411 CVE CVE-2025-29812 9.8 No DirectX Graphics Kernel EoP; Critical CVSS 9.8; no authentication required
2025-06-10 24H2 KB5060829 CVE CVE-2025-29828 9.0 No Schannel Remote Code Execution; Critical; memory corruption in TLS stack
2025-06-10 24H2 KB5060829 CVE CVE-2025-33053 8.8 Yes Windows Internet Shortcut Files RCE zero-day; exploited; MotW bypass chained with phishing
2025-06-10 24H2 KB5060829 CVE CVE-2025-33073 7.8 Yes Windows EoP zero-day; exploited in confirmed attacks
2025-06-10 24H2 KB5060829 Bug False firewall critical errors: Event Viewer flooded with spurious Critical-level Windows Firewall errors; falsely indicated firewall service failure; initial "fix" in July (KB5062553) did not actually resolve the issue
2025-07-08 24H2 KB5062553 Bug Start Menu / Search / Taskbar / Explorer broken after provisioning: After provisioning a PC with cumulative updates from July 2025 onward, SystemSettings, Search, StartMenuExperienceHost, Taskbar, and Explorer experienced crashes and failures
2025-07-08 24H2 KB5062553 Bug BitLocker settings locked: Bug prevented changing BitLocker settings on unmanaged PCs using TPM module; affected all modern TPM-equipped systems
2025-08-12 25H2 KB5063875 Bug Reset and Recovery broken: KB5063875 (23H2) and KB5063709 (Windows 10) broke "Reset this PC" and Windows recovery features; affected systems could not perform factory resets
2025-09-09 25H2 KB5063869 CVE CVE-2025-38044 8.8 Yes Windows LDAP Client RCE; zero-day; exploited remotely without authentication in some configs
2025-10-14 25H2 KB5067144 CVE CVE-2025-53764 9.8 No Windows Remote Desktop Licensing Service RCE; Critical CVSS 9.8; unauthenticated; 172 total CVEs, 6 zero-days
2025-10-14 25H2 KB5067144 CVE CVE-2025-53771 8.1 Yes Windows Kerberos Security Feature Bypass zero-day; exploited
2025-10-14 25H2 KB5067144 CVE CVE-2025-53772 7.8 Yes Windows Task Scheduler EoP zero-day; exploited
2025-10-14 25H2 KB5067144 Bug Call of Duty / Xbox app crash: Black Ops 6 and other Xbox app titles failed to launch; app showed 17-second load then "game crashed" error after this update cycle
2025-11-11 25H2 KB5069616 CVE CVE-2025-62215 8.8 Yes Windows Kernel EoP; actively exploited; SYSTEM-level privilege escalation; 63 total CVEs, 5 Critical
2025-11-11 25H2 KB5069616 CVE CVE-2025-60724 9.8 No Windows GDI (Graphics Device Interface) RCE; Critical CVSS 9.8; unauthenticated
2025-12-09 25H2 KB5071558 CVE CVE-2025-62221 7.8 Yes Windows Cloud Files Mini Filter Driver EoP zero-day; actively exploited; device hijacking possible
2025-12-09 25H2 KB5071558 CVE CVE-2025-64671 8.8 No GitHub Copilot for JetBrains RCE; Critical
2025-12-09 25H2 KB5071558 CVE CVE-2025-54100 8.4 No Windows PowerShell RCE; 57 total CVEs, 3 zero-days
2026-01-13 25H2 KB5074109 CVE CVE-2026-20944 8.4 No Microsoft Office RCE; Critical; one of 6 RCE Critical CVEs; 112 total CVEs, 8 Critical
2026-01-13 25H2 KB5074109 CVE CVE-2026-20854 8.4 No Microsoft Excel RCE; Critical
2026-01-13 25H2 KB5074109 CVE CVE-2026-20957 8.1 No Windows LSASS (Local Security Authority Subsystem Service) RCE; Critical
2026-01-13 25H2 KB5074109 Bug UNMOUNTABLE_BOOT_VOLUME BSOD: KB5074109 caused boot-level BSODs on some commercial/enterprise PCs; systems unable to start; Microsoft issued out-of-band fix
2026-02-10 26H1 KB5076843 CVE CVE-2026-21510 8.8 Yes Windows SmartScreen Security Feature Bypass zero-day; actively exploited
2026-02-10 26H1 KB5076843 CVE CVE-2026-21513 7.5 Yes Windows MSHTML Framework Security Feature Bypass zero-day; exploited
2026-02-10 26H1 KB5076843 CVE CVE-2026-21533 8.8 Yes Remote Desktop Services EoP zero-day; discovered by CrowdStrike; exploited; 6 actively exploited zero-days in this cycle
2026-02-10 26H1 KB5076843 Bug GPU BSOD (KERNEL_SECURITY_CHECK_FAILURE): dxgmms2.sys (DirectX graphics memory management) caused BSOD on specific GPU configurations after this update
2026-02-10 26H1 KB5076843 Bug WPA3 Wi-Fi broken: WPA3-Personal security protocol connections failed to establish after this update; affected modern Wi-Fi hardware
2026-03-10 26H1 KB5079473 CVE CVE-2026-21262 8.8 No SQL Server RCE; publicly disclosed zero-day before patch; 79 total CVEs
2026-03-10 26H1 KB5079473 CVE CVE-2026-26127 7.8 No .NET Framework EoP; publicly disclosed before patch
2026-03-10 26H1 KB5079473 CVE CVE-2026-26803 9.8 No AI-discovered Windows Kernel RCE; CVSS 9.8; first CVE in this cycle found via automated AI vulnerability research
2026-04-14 26H1 KB5083769 CVE CVE-2026-32201 7.5 Yes Microsoft SharePoint Server Spoofing zero-day; actively exploited in the wild; improper input validation leaks sensitive org data
2026-04-14 26H1 KB5083769 CVE CVE-2026-33824 9.8 No Windows IKE (Internet Key Exchange) Service Extensions RCE; Critical CVSS 9.8; unauthenticated; 163–167 total CVEs, 11 Critical
2026-04-14 26H1 KB5083769 CVE CVE-2026-33825 7.8 No Microsoft Defender for Endpoint EoP; Critical
2026-04-14 26H1 KB5083769 CVE CVE-2026-BlueHammer Yes Unpatched "BlueHammer" zero-day: Publicly disclosed kernel privilege escalation exploit; Microsoft acknowledged but did NOT release a patch in the April 2026 cycle; active exploitation ongoing

Summary Statistics

Year Approx Total CVEs Notable Zero-Days Worst CVSSv3 Recurring Bug Themes
2021 (Oct–Dec) ~100 1 (CVE-2021-43890 AppX) 7.1 TPM requirement, UI glitches
2022 ~750 16+ 9.8 (HTTP.sys, NFS) Print Spooler, AMD CPU perf, VPN drops, Printer installs
2023 ~900 18+ 9.8 (SharePoint, MSMQ, MSHTML) VPN breakage (L2TP/IPsec), BlackLotus Secure Boot bypass
2024 ~900 20+ 9.8 (Windows Downdate, LDAP, Kerberos) Downgrade attack, BitLocker, CrowdStrike BSOD incident
2025 ~1,129 41 9.8 (GDI RCE, RDL Service) BSOD epidemic, Windows Hello broken, Reset/Recovery broken, Firewall false errors, Start Menu/Taskbar crashes, USB DAC audio
2026 (Jan–Apr) ~440+ 11+ 9.8 (IKE Service Extensions) Boot BSODs, WPA3 Wi-Fi broken, GPU crashes, unpatched BlueHammer zero-day

Sources


Original Author: admin

Views: 14 (Unique: 9)

Page ID ( Copy Link): page_69ee8d0b342099.61852946-219ff76dde2cf419

Page History (1 revisions):

  • 2026-04-26 22:09:15 (Viewing)