A newly disclosed zero-day vulnerability in Microsoft Defender, dubbed “RedSun,” allows an unprivileged user to escalate privileges to full SYSTEM-level access on fully patched Windows 10, Windows 11, and Windows Server 2019 and later systems, and as of now, remains unpatched.
RedSun is the second zero-day exploit published within a two-week span in April 2026 by the security researcher known as “Chaotic Eclipse” (also referred to as Nightmare-Eclipse on GitHub).
The first exploit, BlueHammer, targeted a different Microsoft Defender local privilege escalation (LPE) flaw and was tracked as CVE-2026-33825, which Microsoft patched as part of April 2026’s Patch Tuesday updates.
RedSun follows the same exploit tradition but introduces an entirely new and independent attack vector, suggesting that Defender’s architectural weaknesses run far deeper than a single isolated flaw.
At the heart of RedSun is a deeply ironic logic flaw inside Windows Defender’s cloud file handling mechanism. When Defender detects a malicious file bearing a cloud tag, rather than simply quarantining or deleting the file, it inexplicably rewrites the file back to its original location. RedSun weaponizes this behavior through the following attack chain:
C:\Windows\System32TieringEngineService.exe — with SYSTEM-level privilegesIndependent security researcher Will Dormann, principal vulnerability analyst at Tharros, confirmed that the exploit works reliably on fully patched Windows 10, Windows 11, and Windows Server 2019 and later.

Any Windows system with Windows Defender enabled and the cldapi.dll component present is potentially vulnerable. Affected platforms include:
The exploit functions with approximately 100% reliability even against systems with the latest April 2026 updates applied, making it particularly dangerous in enterprise environments.
The associated CVE identifier is CVE-2026-33825, carrying a CVSS score of 7.8 (High). The vulnerability is classified under CWE: Insufficient Granularity of Access Control, and its MITRE ATT&CK mapping falls under Privilege Escalation (TA0004).
The full PoC code has not been publicly released by the researcher, though the exploit methodology has been publicly documented on GitHub.
Unlike BlueHammer, which Microsoft addressed in its April 2026 Patch Tuesday cycle, RedSun currently has no available patch. Security teams are advised to monitor for anomalous Defender file write activity, particularly involving cldapi.dll operations targeting C:\Windows\System32, and to implement endpoint detection rules to flag oplock-assisted file redirection behaviors until Microsoft issues a formal fix.
Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.