165 CVEs. Today. That’s nearly double the average Patch Tuesday and it comes with some things that can’t wait until next week’s maintenance window.

Two zero-days confirmed. CVE-2026-32201 in SharePoint is being actively exploited right now. A second one in Microsoft Defender allows SYSTEM-level privilege escalation, but it auto-patches via the Antimalware Platform update, so verify that ran on your endpoints.

Then there’s CVE-2026-20929. Critical Kerberos vulnerability, active directory environments only, allows credential relay attacks by abusing how Windows handles DNS CNAME resolution during authentication. Short version: a network-level attacker can intercept Kerberos tickets and move sideways without needing a password. Patch it, and while you’re at it, disable RC4 for Kerberos and enforce AES-128 or AES-256. RC4 should have been off years ago.

CISA added six flaws to the KEV catalog today. One FortiClient EMS entry has a 48-hour deadline. If you’re a federal agency or run FortiClient EMS, you have until April 16.

Also: one of the CISA additions was patched 14 years ago. Still being exploited by ransomware actors in 2026. Technical debt doesn’t disappear. It just waits.


Full prioritization breakdown and hardening guidance here