CISA imposes a two-week deadline on US government agencies to patch the Microsoft Defender BlueHammer zero-day exploit.


  • CISA has added BlueHammer, a Microsoft Defender privilege escalation vulnerability, to its catalog of known exploited vulnerabilities.
  • Federal agencies have until May 6 to correct or halt its use after researchers have confirmed active exploitation in the wild.
  • The disclosure came from “Chaotic Eclipse,” which also revealed two other zero-day defenders, with Huntress Labs linking exploitation attempts to suspicious global infrastructure.

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added BlueHammer to its Catalog of Known Exploited Vulnerabilities (KEVs), giving Federal Civilian Executive Branch (FCEB) agencies a two-week deadline to update or completely stop using the vulnerable software.

BlueHammer is described as an “insufficient access control granularity vulnerability in Microsoft Defender”, which allows unauthorized attackers to elevate privileges locally. It is tracked as CVE-2026-33825 and received a severity score of 7.8/10 (high).

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top