Microsoft addressed 165 vulnerabilities affecting its various products and underlying systems, including one actively exploited vulnerability in Microsoft Office SharePoint, in this monthβs Patch Tuesday update.Β
βBy my count, this is the second-largest monthly release in Microsoftβs history,β Dustin Childs, head of threat awareness at Trend Microβs Zero Day Initiative, wrote in a blog post Tuesday.
Microsoft didnβt explain why its monthly batch of patches grew so large this month, but Childs noted that many vulnerability programs are experiencing a significant increase in submissions found by artificial intelligence tools. βFor us, our incoming rate has essentially tripled, making triage a challenge, to say the least,β he added.Β
The zero-day vulnerability β CVE-2026-32201 β has a CVSS rating of 6.5 and allows attackers to view sensitive information and make changes to disclosed information. Microsoft said the improper input validation defect in Microsoft Office SharePoint allows unauthenticated attackers to perform spoofing over a network.
The Cybersecurity and Infrastructure Security Agency added the zero-day to its known exploited vulnerabilities catalog shortly after Microsoftβs disclosure.Β
Microsoft also addressed a high-severity vulnerability β CVE-2026-33825 β that was publicly known at the time of release. The vendor said the defect in Microsoft Defender is more likely to be exploited and could allow unauthorized attackers to elevate privileges locally.
βWhat starts as a foothold can quickly become full system domination,β Jack Bicer, director of vulnerability research at Action1, said in a blog post about the vulnerability.Β
βOnce exploited, it allows full control over endpoints, enabling data exfiltration, disabling security tools and lateral movement across networks,β Bicer said.
Proof-of-concept exploit code for the defect is publicly available, which increases the likelihood of exploitation in the wild, he added.
Microsoft disclosed two critical vulnerabilities this month β CVE-2026-33824 affecting Windows IKE Extension and CVE-2026-26149 affecting Microsoft Power Apps β but designated both of the defects as less likely to be exploited.
More than three-quarters of the vulnerabilities disclosed this month are less likely to be exploited, according to Microsoft. Meanwhile, the company designated 19 vulnerabilities as more likely to be exploited.
The full list of vulnerabilities addressed this month is available in Microsoftβs Security Response Center.
The post Microsoft drops its second-largest monthly batch of defects on record appeared first on CyberScoop.