CVE-2026-33825

Modified
Published: 14 Apr 2026, 16:57
Last modified:22 Apr 2026, 20:56

Vulnerability Summary

Overall Risk (default)
medium
31/100
CVSS Score
7.8 HIGH
v3.1 (cve.org)
EPSS Score
0.06% LOW
0% probability 0.00%
KEV
Listed
CISA
1 listing
Ransomware
No reports
Public exploits
None found
Dark Web
Not detected

Timeline

14 Apr 2026, 16:57
Published
Vulnerability first disclosed
22 Apr 2026, 00:00
Added to CISA KEV
Microsoft Defender Insufficient Granularity of Access Control Vulnerability
22 Apr 2026, 20:56
Last Modified
Vulnerability information updated
06 May 2026, 00:00
CISA Remediation Due
Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

Description

Insufficient granularity of access control in Microsoft Defender allows an authorized attacker to elevate privileges locally.

CVSS Metrics

  • v3.1HIGHScore: 7.8CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
  • v3.1HIGHScore: 7.8CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

EPSS Trends

Current EPSS score: 0.06% Percentile: 19%

Techniques & Countermeasures

  • CWE-1220Insufficient Granularity of Access Control

    The product implements access controls via a policy or other feature with the intention to disable or restrict accesses (reads and/or writes) to assets in a system from untrusted agents. However, implemented access controls lack required granularity, which renders the control policy too broad because it allows accesses from unauthorized agents to the security-sensitive assets.

Affected Systems

  • microsoftdefender_antimalware_platform

    < 4.18.26030.3011

  • microsoftmicrosoft defender antimalware platform

    ≥ 4.0.0.0, < 4.18.26030.3011

References (2)