Defender Under Siege: UnDefend and RedSun Zero-Days Reveal Strategic Erosion of Windows Security Core
Patches for exploited UnDefend and RedSun Defender zero-days highlight targeted attacks on Windows security tooling, with analysis revealing missed connections to EDR evasion campaigns and nation-state patterns.
Microsoft's emergency patches for CVE-2026-41091 (UnDefend privilege escalation via link following) and CVE-2026-45498 (RedSun denial-of-service) in the Antimalware Platform underscore a deliberate adversary focus on neutralizing endpoint detection rather than bypassing it. These flaws, part of the publicly dropped BlueHammer exploit kit last month, allow attackers with local access to elevate to SYSTEM or disrupt scanning entirely—tactics that align with patterns seen in prior campaigns against CrowdStrike and SentinelOne agents. The original SecurityWeek coverage correctly notes in-the-wild exploitation and CISA's KEV addition but misses the operational context: these are not opportunistic bugs but indicators of sophisticated actors, likely nation-state or high-tier ransomware groups, prioritizing persistence inside hardened environments where Defender serves as the last line. Drawing from Mandiant's M-Trends 2025 report on EDR evasion and a recent ESET analysis of similar Defender tampering in APT29 operations, the pattern shows attackers chaining these with living-off-the-land binaries to achieve stealthy lateral movement. CISA's bundling with decade-old flaws like CVE-2008-4250 further signals resource strain, yet the real gap is Microsoft's limited advisory detail on attacker infrastructure or affected sectors, leaving enterprises without clear threat intel for prioritization. This reflects broader power shifts where core Windows tooling becomes a contested domain, eroding trust in default security stacks.
SENTINEL: These Defender compromises mark an acceleration in adversaries systematically dismantling trusted endpoint layers to enable deeper, longer-term access in enterprise networks.
Sources (3)
- [1]Primary Source(https://www.securityweek.com/microsoft-patches-exploited-undefend-and-redsun-defender-zero-days/)
- [2]Related Source(https://www.mandiant.com/resources/m-trends-2025)
- [3]Related Source(https://www.eset.com/intelligence)