CISA gives US government agencies two weeks to patch Microsoft Defender BlueHammer zero-day exploit



  • CISA added BlueHammer, a Microsoft Defender privilege escalation flaw, to its catalog of known exploited vulnerabilities.
  • Federal agencies have until May 6 to patch or suspend its use, as researchers confirmed active exploitation in the wild.
  • The revelation came from “Chaotic Eclipse,” which also revealed two other Defender zero-days, in which Huntress Labs links exploitation attempts to suspicious global infrastructure.

The US Cybersecurity and Infrastructure Security Agency (CISA) has added BlueHammer to its catalog of known exploited vulnerabilities (KEV), giving Federal Civil Executive Branch (FCEB) agencies a two-week window to patch or stop using the vulnerable software entirely.

BlueHammer is described as a “insufficient access control granularity in Microsoft Defender” vulnerability, which allows unauthorized attackers to elevate privileges locally. It is being tracked as CVE-2026-33825 and has been assigned a severity score of 7.8/10 (High).

Leave a Comment

Your email address will not be published. Required fields are marked *