Introduction
Security researchers at Huntress have issued a stark warning about the active, in-the-wild exploitation of three critical zero-day vulnerabilities in Microsoft Defender. In a troubling development, the very tool designed to be the first line of defense on millions of Windows systems has become a pathway for attackers to gain complete control. The flaws, dubbed BlueHammer, RedSun, and UnDefend, were publicly disclosed by a researcher known as Chaotic Eclipse, and threat actors have wasted no time weaponizing them.
While Microsoft has managed to issue a patch for one of the vulnerabilities, BlueHammer, the other two—RedSun and UnDefend—remain unpatched, leaving a massive number of systems exposed to privilege escalation attacks. This situation creates a perilous window of opportunity for adversaries who have already established an initial foothold in a target network.
Technical background: From defender to attacker
All three vulnerabilities are classified as Local Privilege Escalation (LPE) flaws. This means they cannot be used for initial entry into a system. Instead, they are leveraged by an attacker who has already gained low-level access, perhaps through a phishing email or a different software vulnerability. Once inside, the attacker uses these Defender exploits to elevate their permissions to NT AUTHORITY\SYSTEM—the highest level of privilege on a Windows system.
According to the technical details released and subsequent analysis, the vulnerabilities target different components of the Defender suite:
- BlueHammer (Patched - CVE-2026-XXXXX): This was a race condition vulnerability. In simplified terms, an attacker could trick Defender during a file scan, exploiting a tiny window of time between when Defender checked a file's permissions and when it performed an action on it. This allowed the attacker to inject malicious code that would be executed with Defender's elevated privileges. Microsoft addressed this in an out-of-band security update.
- RedSun (Unpatched - CVE-2026-YYYYY): This is a more direct arbitrary file write vulnerability. A core Defender service running as SYSTEM can be manipulated to write a file to any location on the disk. Attackers are reportedly using this to drop a malicious DLL into a trusted system directory. When the system reboots or a specific service restarts, that malicious DLL is loaded and executed with SYSTEM rights.
- UnDefend (Unpatched - CVE-2026-ZZZZZ): The most technically complex of the trio, UnDefend is a memory corruption flaw, likely a use-after-free, within the engine that handles real-time protection. By feeding a specially crafted file to the scanner, an attacker can corrupt the memory of the Defender process (`MsMpEng.exe`) and achieve arbitrary code execution within that high-privilege context.
The swift weaponization of these flaws after their public disclosure highlights a persistent tension within the security community regarding responsible versus full disclosure. While the researcher cited frustrations with Microsoft's response time, the immediate outcome has been the arming of threat actors with potent new tools (The Hacker News, 2026).
Impact assessment: A foundational trust broken
The impact of these vulnerabilities is severe and widespread. Microsoft Defender is the default antivirus and endpoint protection solution on all modern versions of Windows, including Windows 10, Windows 11, and Windows Server. This ubiquity means the attack surface is enormous, spanning consumer laptops, corporate workstations, and critical infrastructure servers.
An attacker who successfully exploits RedSun or UnDefend gains total control over the compromised machine. From this position, they can:
- Disable or manipulate security logs and other security tools to hide their tracks.
- Deploy ransomware across the network.
- Install persistent backdoors or rootkits that survive reboots.
- Steal credentials from memory using tools like Mimikatz to facilitate lateral movement to other systems.
- Exfiltrate sensitive corporate or personal data.
For organizations, this is a worst-case scenario. A security product is built on trust. When that product contains unpatched, actively exploited vulnerabilities, it not only fails to protect the system but actively aids in its compromise. Huntress reports that its Security Operations Center has already observed these exploits being used by multiple threat actors as part of post-exploitation toolkits, indicating that the techniques are already being integrated into standard attack chains.
How to protect yourself
With two of the three vulnerabilities still unpatched, defense requires a multi-layered strategy focused on patching what is possible and detecting what is not. Organizations and individuals should take the following steps immediately.
- Apply the BlueHammer Patch: The first and most urgent step is to ensure all systems have received the security update that addresses BlueHammer (CVE-2026-XXXXX). Check for and install all available Windows Updates immediately.
- Monitor for Indicators of Compromise (IOCs): Since RedSun and UnDefend cannot be patched yet, the focus must shift to detection. Security teams should configure their monitoring tools to look for signs of exploitation. This includes:
- Unusual child processes spawning from Defender's core process, `MsMpEng.exe`, or its EDR component, `MsSense.exe`.
- Suspicious file writes to system directories like `C:\Windows\System32`, especially by processes that should not be doing so.
- Unexpected crashes or restarts of the Microsoft Defender service.
- Changes to Defender's registry keys or exclusions that were not made by an administrator.
- Enforce the Principle of Least Privilege (PoLP): These exploits require an initial compromise. By ensuring that user accounts and applications run with the minimum permissions necessary, you limit an attacker's ability to execute the exploit code in the first place. Avoid using administrative accounts for daily tasks.
- Layer Your Defenses: This incident proves that relying on a single security product is a fragile strategy. Employ a defense-in-depth approach. This includes robust network monitoring, strict firewall rules, and application control policies that prevent unauthorized software from running. Protecting network traffic with a VPN service can also add a layer of encryption, making it harder for attackers to exfiltrate data undetected.
- Keep Defender Definitions Updated: While a full patch for the engine is not yet available, Microsoft can push updated detection signatures through its regular definition updates. These may be able to identify and block the publicly known exploit tools, providing a temporary mitigation. Ensure your Defender anti-malware platform and definitions are updating successfully.
Microsoft is under immense pressure to release patches for RedSun and UnDefend. Until they do, vigilance and proactive threat hunting are the only effective countermeasures against these dangerous exploits.



