CVE-2026-33825
Modified
Published: 14 Apr 2026, 16:57
Last modified:22 Apr 2026, 20:56
Vulnerability Summary
Overall Risk (default)
medium
31/100 CVSS Score
7.8 HIGH
v3.1 (cve.org)
EPSS Score
0.06% LOW
0% probability 0.00%
KEV
Listed
CISA
1 listing
Ransomware
No reports
Public exploits
None found
Dark Web
Not detected
Timeline
14 Apr 2026, 16:57
Published
Vulnerability first disclosed
22 Apr 2026, 00:00
Added to CISA KEV
Microsoft Defender Insufficient Granularity of Access Control Vulnerability
22 Apr 2026, 20:56
Last Modified
Vulnerability information updated
06 May 2026, 00:00
CISA Remediation Due
Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
Description
Insufficient granularity of access control in Microsoft Defender allows an authorized attacker to elevate privileges locally.
CVSS Metrics
- v3.1•HIGH•Score: 7.8CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
- v3.1•HIGH•Score: 7.8CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Trends
Current EPSS score: 0.06%• Percentile: 19%
Techniques & Countermeasures
- CWE-1220•Insufficient Granularity of Access Control
The product implements access controls via a policy or other feature with the intention to disable or restrict accesses (reads and/or writes) to assets in a system from untrusted agents. However, implemented access controls lack required granularity, which renders the control policy too broad because it allows accesses from unauthorized agents to the security-sensitive assets.
Affected Systems
- microsoft•defender_antimalware_platform
< 4.18.26030.3011
- microsoft•microsoft defender antimalware platform
≥ 4.0.0.0, < 4.18.26030.3011