CISA gives US government agencies two weeks to patch Microsoft Defender BlueHammer zero-day exploit


  • CISA added BlueHammer, a Microsoft Defender privilege escalation flaw, to its catalog of known exploited vulnerabilities.
  • Federal agencies have until May 6 to patch or stop the use when scientists confirmed active exploitation in the wild.
  • The revelation came from “Chaotic Eclipse,” which also revealed two other Defender zero-days, with Huntress Labs linking exploit attempts to suspicious global infrastructure.

The US Cybersecurity and Infrastructure Security Agency (CISA) has added BlueHammer to its catalog of known exploited vulnerabilities (KEV), giving Federal Civilian Executive Branch (FCEB) agencies a two-week deadline to patch or completely stop using the vulnerable software.

BlueHammer is described as an “insufficient granularity of access control in Microsoft Defender” that allows unauthorized attackers to elevate privileges locally. It is tracked as CVE-2026-33825 and received a severity score of 7.8/10 (high).

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top