By falco365 · Published April 22, 2026

CVE-2026-33825 'BlueHammer': local privesc in Windows Defender

A race condition in Windows Defender's threat remediation engine (CVSS 7.8) lets a local attacker escalate to SYSTEM. Publicly disclosed April 7, 2026 alongside a working proof-of-concept.

CVE-2026-33825 'BlueHammer': local privesc in Windows Defender
Analysis

On April 7, 2026 researchers published CVE-2026-33825, nicknamed BlueHammer, alongside a fully functional proof-of-concept exploit. The vulnerability is a time-of-check to time-of-use (TOCTOU) race condition inside Windows Defender's threat remediation engine. A local unprivileged user can win the race consistently enough to get arbitrary file operations executed in the SYSTEM context — effectively, a full local privilege escalation from any shell on the host.

The uncomfortable symmetry

BlueHammer arrives alongside a second researcher publication, RedSun, that demonstrates chaining CVE-2026-33825 with a low-privileged RCE (anything from a browser sandbox escape to a Microsoft Office macro) to go from "attacker has code execution as a normal user" to "attacker owns the host." That chain is the thing defenders worry about, because it removes the final remaining mitigation for a large class of malware: the fact that a non-admin user account should limit the blast radius.

A race condition in the code path that removes threats is particularly uncomfortable. The remediation engine runs with SYSTEM privileges because it needs to delete files the user cannot. CVE-2026-33825 is a reminder that every elevated code path is a potential target — including the code paths whose entire purpose is "make the machine safer."

Who is exposed
  • Every Windows 10 and Windows 11 host running Defender as its real-time AV — which is nearly all of them in default configurations.
  • Windows Server instances with Defender enabled, including AD domain controllers.
  • VDI / RDS environments where many low-trust users share a host — a BlueHammer PoC on a shared machine is an immediate cross-user escalation risk.
A public local-privesc in Windows Defender is the kind of bug that shows up in commodity malware within days. The pipeline from researcher blog post → Metasploit module → criminal loader is well-worn.
Mitigation

Microsoft's April 2026 security update addresses CVE-2026-33825 via a Defender engine update pushed through the normal AV definitions channel. That channel updates faster than Patch Tuesday — most hosts receive the fix within 48 hours of release, independent of the OS update cadence. Verify:

  • Confirm engine version. Run Get-MpComputerStatus and check the AMEngineVersion field against Microsoft's fixed-version guidance.
  • Force a definition update on hosts where the automatic update channel is throttled: Update-MpSignature.
  • Audit for suspicious SYSTEM-context file operations originating from the Defender process tree around the time the PoC was released. Host-based EDR with process-ancestry visibility is the tool for this.
  • For shared-tenant hosts (VDI, RDS, build agents), prioritize verification of the engine update before releasing the host back to users.
The broader pattern

Defender is not the first AV to have a local privesc, and it will not be the last. The lesson is not "turn off your AV" — the AV is still net-defensive against a much larger threat population. The lesson is that every privileged component requires the same threat modelling as the rest of the attack surface. Security tools are not exempt from being an attack surface. They are, in many environments, the most interesting one to an attacker who has already gotten a toehold.