{"id":235387,"date":"2026-04-16T22:21:15","date_gmt":"2026-04-17T03:21:15","guid":{"rendered":"https:\/\/lifeboat.com\/blog\/2026\/04\/new-microsoft-defender-redsun-zero-day-poc-grants-system-privileges"},"modified":"2026-04-16T22:21:15","modified_gmt":"2026-04-17T03:21:15","slug":"new-microsoft-defender-redsun-zero-day-poc-grants-system-privileges","status":"publish","type":"post","link":"https:\/\/lifeboat.com\/blog\/2026\/04\/new-microsoft-defender-redsun-zero-day-poc-grants-system-privileges","title":{"rendered":"New Microsoft Defender \u201cRedSun\u201d zero-day PoC grants SYSTEM privileges"},"content":{"rendered":"<p><a class=\"aligncenter blog-photo\" href=\"https:\/\/lifeboat.com\/blog.images\/new-microsoft-defender-redsun-zero-day-poc-grants-system-privileges.jpg\"><\/a><\/p>\n<p>A researcher known as \u201cChaotic Eclipse\u201d has published a proof-of-concept exploit for a second Microsoft Defender zero-day, dubbed \u201cRedSun,\u201d in the past two weeks, protesting how the company works with cybersecurity researchers.<\/p>\n<p>This exploit is for a local privilege escalation (LPE) flaw that grants SYSTEM privileges in Windows 10, Windows 11, and Windows Server on the latest <a href=\"https:\/\/www.bleepingcomputer.com\/news\/microsoft\/microsoft-april-2026-patch-tuesday-fixes-167-flaws-2-zero-days\/\" target=\"_blank\" rel=\"nofollow noopener\">April Patch Tuesday<\/a> patches, when Windows Defender is enabled.<\/p>\n<p>\u201cWhen Windows Defender realizes that a malicious file has a cloud tag, for whatever stupid and hilarious reason, the antivirus that\u2019s supposed to protect decides that it is a good idea to just rewrite the file it found again to it\u2019s original location,\u201d <a href=\"https:\/\/github.com\/Nightmare-Eclipse\/RedSun\" target=\"_blank\" rel=\"nofollow noopener\">explains the researcher<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A researcher known as \u201cChaotic Eclipse\u201d has published a proof-of-concept exploit for a second Microsoft Defender zero-day, dubbed \u201cRedSun,\u201d in the past two weeks, protesting how the company works with cybersecurity researchers. This exploit is for a local privilege escalation (LPE) flaw that grants SYSTEM privileges in Windows 10, Windows 11, and Windows Server on [\u2026]<\/p>\n","protected":false},"author":427,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[34],"tags":[],"class_list":["post-235387","post","type-post","status-publish","format-standard","hentry","category-cybercrime-malcode"],"_links":{"self":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/235387","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/users\/427"}],"replies":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/comments?post=235387"}],"version-history":[{"count":0,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/235387\/revisions"}],"wp:attachment":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/media?parent=235387"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/categories?post=235387"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/tags?post=235387"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}