Microsoft’s February 2026 Patch Tuesday includes security updates for 58 vulnerabilities, with a heavy concentration of zero-days. Six vulnerabilities were actively exploited in the wild, three of which were also publicly disclosed prior to patching. Five vulnerabilities are classified as critical, including three elevation of privilege flaws and two information disclosure issues.
Breakdown of Vulnerabilities
- 25 Elevation of Privilege vulnerabilities
- 12 Remote Code Execution vulnerabilities
- 7 Spoofing vulnerabilities
- 6 Information Disclosure vulnerabilities
- 5 Security Feature Bypass vulnerabilities
- 3 Denial of Service vulnerabilities
These totals do not include three Microsoft Edge vulnerabilities that were addressed earlier in the month. Alongside the security fixes, Microsoft has begun a phased rollout of updated Secure Boot certificates to replace certificates issued in 2011 that expire in late June 2026. Certificate deployment is gated by device health and update telemetry to reduce the risk of disruption during rollout. Non-security updates released this month include Windows 11 KB5077181 and KB5075941, as well as the Windows 10 KB5075912 Extended Security Update.
Zero-Day Vulnerabilities
February’s Patch Tuesday addresses six actively exploited zero-days, three of which had already been publicly disclosed.
CVE-2026-21510 | Windows Shell Security Feature Bypass Vulnerability
This vulnerability allows attackers to bypass Windows Shell security protections by tricking a user into opening a specially crafted link or shortcut file. Exploitation enables attacker-controlled content to execute without SmartScreen or shell-based warnings, suggesting a bypass of Mark of the Web protections. Discovery is attributed to Microsoft Threat Intelligence Center, Microsoft Security Response Center, the Office Product Group Security Team, Google Threat Intelligence Group, and an anonymous researcher.
CVE-2026-21513 | MSHTML Framework Security Feature Bypass Vulnerability
An actively exploited security feature bypass in the MSHTML framework allows attackers to bypass protections over a network. Microsoft has not released technical exploitation details. Attribution mirrors CVE-2026-21510, with involvement from Microsoft and Google threat intelligence teams.
CVE-2026-21514 | Microsoft Word Security Feature Bypass Vulnerability
This actively exploited flaw bypasses OLE mitigations in Microsoft Word and Microsoft 365. Attackers must convince a user to open a malicious Office document. Microsoft notes the vulnerability cannot be exploited through the Preview Pane. Attribution again includes Microsoft threat teams, Google Threat Intelligence Group, and an anonymous researcher.
CVE-2026-21519 | Desktop Window Manager Elevation of Privilege Vulnerability
This vulnerability allows local attackers to gain SYSTEM privileges through exploitation of the Desktop Window Manager. No exploitation details have been shared publicly. The issue was identified by Microsoft Threat Intelligence Center and Microsoft Security Response Center.
CVE-2026-21525 | Windows Remote Access Connection Manager Denial of Service Vulnerability
An actively exploited denial of service vulnerability caused by a null pointer dereference allows attackers to crash affected systems locally. The flaw was discovered by the 0patch vulnerability research team. Microsoft has not disclosed exploitation context.
CVE-2026-21533 | Windows Remote Desktop Services Elevation of Privilege Vulnerability
This vulnerability enables authorized attackers to elevate privileges locally due to improper privilege management in Windows Remote Desktop Services. Discovery is attributed to CrowdStrike’s Advanced Research Team. No additional exploitation details are available.
Other Critical Vulnerabilities
Beyond the zero-days, Microsoft patched several high-impact vulnerabilities across Windows components that could enable privilege escalation or sensitive data exposure once initial access is obtained. These flaws increase risk in environments where attackers already have a foothold and should be treated as priority fixes.
Adobe and Other Vendor Updates
Other vendors releasing security updates in February 2026 include:
- Adobe released updates for Audition, After Effects, InDesign, Lightroom Classic, and multiple Substance 3D products, with no active exploitation reported.
- BeyondTrust patched a critical remote code execution vulnerability affecting Remote Support and Privileged Remote Access software.
- CISA issued a new binding operational directive requiring removal of unsupported network edge devices across federal environments.
- Cisco released updates for Secure Web Appliance, Cisco Meeting Management, and additional products.
- Fortinet issued security updates for FortiOS and FortiSandbox.
- Google published the February Android security bulletin with no fixes included.
- n8n patched critical issues that bypassed protections added for a previously fixed RCE vulnerability.
- SAP released February updates addressing multiple products, including two critical vulnerabilities.
- Microsoft began rolling out built-in Sysmon functionality to Windows 11 Insider builds, providing native endpoint visibility capabilities for administrators.
Recommendations for Users and Administrators
The concentration of actively exploited zero-days in this release makes rapid patching a priority. Organizations should focus on systems handling user-facing content, Office documents, Remote Desktop Services, and Desktop Window Manager components, where multiple exploitation paths exist.
Security teams should also monitor Secure Boot certificate rollout status, confirm compatibility across hardware platforms, and review third-party advisories where critical remote access or identity tooling is in use. February’s update cycle underscores ongoing attacker focus on security feature bypasses and post-compromise privilege escalation paths.
Full technical details and patch links are available in Microsoft’s Security Update Guide.
How Can Netizen Help?
Founded in 2013, Netizen is an award-winning technology firm that develops and leverages cutting-edge solutions to create a more secure, integrated, and automated digital environment for government, defense, and commercial clients worldwide. Our innovative solutions transform complex cybersecurity and technology challenges into strategic advantages by delivering mission-critical capabilities that safeguard and optimize clients’ digital infrastructure. One example of this is our popular “CISO-as-a-Service” offering that enables organizations of any size to access executive level cybersecurity expertise at a fraction of the cost of hiring internally.
Netizen also operates a state-of-the-art 24x7x365 Security Operations Center (SOC) that delivers comprehensive cybersecurity monitoring solutions for defense, government, and commercial clients. Our service portfolio includes cybersecurity assessments and advisory, hosted SIEM and EDR/XDR solutions, software assurance, penetration testing, cybersecurity engineering, and compliance audit support. We specialize in serving organizations that operate within some of the world’s most highly sensitive and tightly regulated environments where unwavering security, strict compliance, technical excellence, and operational maturity are non-negotiable requirements. Our proven track record in these domains positions us as the premier trusted partner for organizations where technology reliability and security cannot be compromised.
Netizen holds ISO 27001, ISO 9001, ISO 20000-1, and CMMI Level III SVC registrations demonstrating the maturity of our operations. We are a proud Service-Disabled Veteran-Owned Small Business (SDVOSB) certified by U.S. Small Business Administration (SBA) that has been named multiple times to the Inc. 5000 and Vet 100 lists of the most successful and fastest-growing private companies in the nation. Netizen has also been named a national “Best Workplace” by Inc. Magazine, a multiple awardee of the U.S. Department of Labor HIRE Vets Platinum Medallion for veteran hiring and retention, the Lehigh Valley Business of the Year and Veteran-Owned Business of the Year, and the recipient of dozens of other awards and accolades for innovation, community support, working environment, and growth.
Looking for expert guidance to secure, automate, and streamline your IT infrastructure and operations? Start the conversation today.















You must be logged in to post a comment.