April Patch Tuesday: 163 Vulnerabilities, a Wormable TCP/IP RCE, and Two Already-Exploited Flaws

April 2026 Patch TuesdayWormable RCE2 Zero-Days at Release
Total CVEs
163
Critical Severity
8
Headline CVE
CVE-2026-33827
Patch Available
Yes

Microsoft's April 2026 Patch Tuesday is the second-largest single-month release on record, addressing 163 vulnerabilities across Windows, Office, Azure, and associated components. The headliner is CVE-2026-33827, a wormable remote code execution flaw in the Windows TCP/IP stack that can self-propagate across networks with no user interaction required. Two additional CVEs were already under active exploitation when the patches shipped. This is not a normal monthly patching cycle.

Wormable RCE: Patch Immediately

CVE-2026-33827 affects all supported Windows versions on IPv6/IPSec networks. A single unpatched host inside your perimeter can propagate exploitation to adjacent systems without any user action. Patch this before the end of the business day, or disable IPv6 and IKE/IPSec where not operationally required.

The Wormable Vulnerability: CVE-2026-33827

CVE-2026-33827 is a remote code execution vulnerability in the Windows TCP/IP stack, specifically in the handling of IPv6 packets during IKE/IPSec negotiation. An attacker on the same network segment, or reachable over any network path, can send a specially crafted packet sequence to a vulnerable Windows host and achieve code execution at the SYSTEM level with no authentication and no user interaction required.

The "wormable" designation means the vulnerability can be exploited to compromise a machine, then used from that machine to automatically exploit adjacent systems using the same technique. This is the same propagation model that made WannaCry and NotPetya so destructive. Network topology alone does not contain a wormable vulnerability once a single host is compromised inside the perimeter.

IPv6 is enabled by default on all modern Windows versions and cannot be disabled through the standard GUI. IPSec policy enforcement and IKE negotiation run in the kernel. The attack requires no existing foothold: a single packet exchange from any reachable source is sufficient. Microsoft rates this 9.8 CVSS, one of the highest scores in this release.

The Two Exploited Zero-Days

Two additional CVEs were being exploited in active campaigns before Microsoft released patches:

CVE-2026-32202 is a Windows authentication coercion vulnerability. It allows an attacker with network access to force a Windows host to authenticate to an attacker-controlled server, capturing NTLM credentials that can be relayed or cracked. This technique has been a persistent favorite in Active Directory environments for years; this CVE represents a new code path that bypassed existing mitigations. Observed exploitation preceded the April patch cycle by at least two weeks.

CVE-2026-33824 is a remote code execution flaw in the Windows IKE Protocol Extensions service. Unlike CVE-2026-33827, this vulnerability is not self-propagating, but it was under active exploitation by multiple threat groups at the time of patch release. Rapid7 and Tenable both confirmed in-the-wild exploitation targeting VPN gateway infrastructure.

CVE-2026-33827 Worm Propagation Path
1
Initial access via any vector
Attacker gains access to a single host inside the network: phishing, VPN credential, internet-exposed service, or physical access
2
Scan adjacent IPv6 hosts
Compromised host enumerates the local network for Windows systems with IPv6 enabled and reachable IKE/IPSec ports (UDP 500/4500)
3
Send crafted IKE packet sequence
Exploit packet triggers memory corruption in Windows TCP/IP kernel driver; no authentication, no interaction required from the target
4
SYSTEM-level code execution achieved
Exploit delivers shellcode running as SYSTEM; payload installs the same scanning and exploit module on the new host
5
Automated lateral propagation
Each newly compromised host repeats the scan-and-exploit cycle, spreading through the network without further attacker involvement

Scale, Trend, and the AI Factor

163 CVEs in a single month is historically significant. The previous record was 157 in March 2024. The growth in monthly vulnerability count is not random: it reflects an acceleration in automated vulnerability research tooling, including AI-assisted code analysis that can identify classes of bugs faster than traditional manual review.

Security teams are now operating in an environment where the pace of disclosed vulnerabilities is outstripping patch capacity. The average enterprise takes 21 days to patch critical Windows vulnerabilities after release. For a wormable bug in the kernel networking stack, 21 days is an eternity. Prioritization frameworks are not optional anymore; they are a prerequisite for staying above water.

The concentration of IKE/IPSec vulnerabilities in this release, including both CVE-2026-33827 and CVE-2026-33824, suggests that component received particular scrutiny in the research community recently. Expect follow-on findings in the same subsystem. Organizations relying on Windows-native VPN and IPSec for internal network segmentation should assess whether the attack surface justifies the architecture.

Prioritization Framework for This Release

Not all 163 CVEs require the same response cadence. Here is a practical framework for this specific release:

Patch immediately (same day or next business day):

Patch within 72 hours:

Patch within standard monthly cycle:

Mitigation If Patching Is Delayed

For CVE-2026-33827: disable IPv6 on all Windows hosts not operationally requiring it via registry key HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip6\Parameters\DisabledComponents = 0xFF. Also block UDP 500 and 4500 at internal segment boundaries to limit worm propagation. Neither is a substitute for patching.

Patch Velocity Assessment

Most organizations do not know how fast they actually patch critical Windows CVEs versus how fast they think they do. RedEye Security can baseline your current patch cadence and identify the gaps before the next wormable bug drops.

Get an Assessment