Microsoft February 2026 Patch Tuesday Fixes 6 Zero-Days, 58 Security Flaws

Spread the love

Microsoft February 2026 Patch Tuesday Fixes 6 Zero-Days, 58 Security Flaws

Redmond, Washington — Microsoft has released its February 2026 Patch Tuesday security update, addressing a total of 58 vulnerabilities across Windows, Office and other key products — including six actively exploited zero-day vulnerabilities that were being used by attackers before patches were available.

This month’s update is notable both for the sheer number of flaws fixed and for the urgency of some of the issues, with multiple vulnerabilities already leveraged in real-world attacks and several publicly disclosed before being patched.

🔒 Six Actively Exploited Zero-Day Vulnerabilities

Among the patches are six zero-day vulnerabilities that Microsoft confirmed were actively exploited in the wild. Three of these had been publicly disclosed prior to the update:

  • CVE-2026-21510 — Windows Shell Security Feature Bypass: Attackers could bypass SmartScreen and Shell warnings by convincing users to open malicious links or shortcut files.
  • CVE-2026-21513 — MSHTML Framework Security Bypass: A flaw in the MSHTML rendering engine allowed attackers to bypass security protections when malicious HTML or link files are opened.
  • CVE-2026-21514 — Microsoft Word Security Bypass: Malicious Office files could evade built-in protections, executing unsafe code when opened.
  • CVE-2026-21519 — Desktop Window Manager Privilege Escalation: Local attackers could elevate privileges to SYSTEM level.
  • CVE-2026-21525 — Windows Remote Access Connection Manager DoS: A denial-of-service flaw allowing attackers with local access to disrupt system connectivity.
  • CVE-2026-21533 — Windows Remote Desktop Services Privilege Escalation: This flaw enabled attackers to elevate privileges within Remote Desktop Services.

Security experts say the prominence of zero-days — particularly those that bypass security prompts and protections — makes this update urgent for both enterprise and home users.

🛡️ Other Vulnerabilities and Fixes

Beyond the zero-days, Microsoft patched a broad range of other serious flaws:

  • 25 elevation of privilege vulnerabilities
  • 12 remote code execution vulnerabilities
  • 5 security feature bypass vulnerabilities
  • 6 information disclosure flaws
  • 3 denial of service vulnerabilities
  • 7 spoofing vulnerabilities

In addition, five vulnerabilities were rated “Critical” — a designation indicating potential for severe impact if exploited, particularly in enterprise environments.

🔄 Rolling Out Updated Secure Boot Certificates

As part of this Patch Tuesday, Microsoft also began the phased rollout of updated Secure Boot certificates to replace legacy certificates expiring later this year. This transition aims to maintain trusted boot processes on Windows devices and prevent malware persistence during system startup.

📌 What Users Should Do

Microsoft and security analysts recommend that all users and administrators install the February updates immediately, especially on systems exposed to the internet or handling untrusted files and email attachments. Immediate patching is crucial to block exploitation of the zero-day flaws that were already being actively abused by attackers.

The February 2026 Patch Tuesday Security Updates

Below is the complete list of resolved vulnerabilities in the February 2026 Patch Tuesday updates.

To access the full description of each vulnerability and the systems it affects, you can view the full report here.

TagCVE IDCVE TitleSeverity
.NETCVE-2026-21218.NET Spoofing VulnerabilityImportant
Azure ArcCVE-2026-24302Azure Arc Elevation of Privilege VulnerabilityCritical
Azure Compute GalleryCVE-2026-23655Microsoft ACI Confidential Containers Information Disclosure VulnerabilityCritical
Azure Compute GalleryCVE-2026-21522Microsoft ACI Confidential Containers Elevation of Privilege VulnerabilityCritical
Azure DevOps ServerCVE-2026-21512Azure DevOps Server Cross-Site Scripting VulnerabilityImportant
Azure Front Door (AFD)CVE-2026-24300Azure Front Door Elevation of Privilege VulnerabilityCritical
Azure FunctionCVE-2026-21532Azure Function Information Disclosure VulnerabilityCritical
Azure HDInsightsCVE-2026-21529Azure HDInsight Spoofing VulnerabilityImportant
Azure IoT SDKCVE-2026-21528Azure IoT Explorer Information Disclosure VulnerabilityImportant
Azure LocalCVE-2026-21228Azure Local Remote Code Execution VulnerabilityImportant
Azure SDKCVE-2026-21531Azure SDK for Python Remote Code Execution VulnerabilityImportant
Desktop Window ManagerCVE-2026-21519Desktop Window Manager Elevation of Privilege VulnerabilityImportant
Github CopilotCVE-2026-21516GitHub Copilot for Jetbrains Remote Code Execution VulnerabilityImportant
GitHub Copilot and Visual StudioCVE-2026-21523GitHub Copilot and Visual Studio Code Remote Code Execution VulnerabilityImportant
GitHub Copilot and Visual StudioCVE-2026-21256GitHub Copilot and Visual Studio Remote Code Execution VulnerabilityImportant
GitHub Copilot and Visual StudioCVE-2026-21257GitHub Copilot and Visual Studio Elevation of Privilege VulnerabilityImportant
GitHub Copilot and Visual Studio CodeCVE-2026-21518GitHub Copilot and Visual Studio Code Security Feature Bypass VulnerabilityImportant
Mailslot File SystemCVE-2026-21253Mailslot File System Elevation of Privilege VulnerabilityImportant
Microsoft Defender for LinuxCVE-2026-21537Microsoft Defender for Endpoint Linux Extension Remote Code Execution VulnerabilityImportant
Microsoft Edge (Chromium-based)CVE-2026-1861Chromium: CVE-2026-1861 Heap buffer overflow in libvpxUnknown
Microsoft Edge (Chromium-based)CVE-2026-1862Chromium: CVE-2026-1862 Type Confusion in V8Unknown
Microsoft Edge for AndroidCVE-2026-0391Microsoft Edge (Chromium-based) for Android Spoofing VulnerabilityModerate
Microsoft Exchange ServerCVE-2026-21527Microsoft Exchange Server Spoofing VulnerabilityImportant
Microsoft Graphics ComponentCVE-2026-21246Windows Graphics Component Elevation of Privilege VulnerabilityImportant
Microsoft Graphics ComponentCVE-2026-21235Windows Graphics Component Elevation of Privilege VulnerabilityImportant
Microsoft Office ExcelCVE-2026-21261Microsoft Excel Information Disclosure VulnerabilityImportant
Microsoft Office ExcelCVE-2026-21258Microsoft Excel Information Disclosure VulnerabilityImportant
Microsoft Office ExcelCVE-2026-21259Microsoft Excel Elevation of Privilege VulnerabilityImportant
Microsoft Office OutlookCVE-2026-21260Microsoft Outlook Spoofing VulnerabilityImportant
Microsoft Office OutlookCVE-2026-21511Microsoft Outlook Spoofing VulnerabilityImportant
Microsoft Office WordCVE-2026-21514Microsoft Word Security Feature Bypass VulnerabilityImportant
MSHTML FrameworkCVE-2026-21513MSHTML Framework Security Feature Bypass VulnerabilityImportant
Power BICVE-2026-21229Power BI Remote Code Execution VulnerabilityImportant
Role: Windows Hyper-VCVE-2026-21244Windows Hyper-V Remote Code Execution VulnerabilityImportant
Role: Windows Hyper-VCVE-2026-21255Windows Hyper-V Security Feature Bypass VulnerabilityImportant
Role: Windows Hyper-VCVE-2026-21248Windows Hyper-V Remote Code Execution VulnerabilityImportant
Role: Windows Hyper-VCVE-2026-21247Windows Hyper-V Remote Code Execution VulnerabilityImportant
Windows Ancillary Function Driver for WinSockCVE-2026-21236Windows Ancillary Function Driver for WinSock Elevation of Privilege VulnerabilityImportant
Windows Ancillary Function Driver for WinSockCVE-2026-21241Windows Ancillary Function Driver for WinSock Elevation of Privilege VulnerabilityImportant
Windows Ancillary Function Driver for WinSockCVE-2026-21238Windows Ancillary Function Driver for WinSock Elevation of Privilege VulnerabilityImportant
Windows App for MacCVE-2026-21517Windows App for Mac Installer Elevation of Privilege VulnerabilityImportant
Windows Cluster Client FailoverCVE-2026-21251Cluster Client Failover (CCF) Elevation of Privilege VulnerabilityImportant
Windows Connected Devices Platform ServiceCVE-2026-21234Windows Connected Devices Platform Service Elevation of Privilege VulnerabilityImportant
Windows GDI+CVE-2026-20846GDI+ Denial of Service VulnerabilityImportant
Windows HTTP.sysCVE-2026-21240Windows HTTP.sys Elevation of Privilege VulnerabilityImportant
Windows HTTP.sysCVE-2026-21250Windows HTTP.sys Elevation of Privilege VulnerabilityImportant
Windows HTTP.sysCVE-2026-21232Windows HTTP.sys Elevation of Privilege VulnerabilityImportant
Windows KernelCVE-2026-21231Windows Kernel Elevation of Privilege VulnerabilityImportant
Windows KernelCVE-2026-21222Windows Kernel Information Disclosure VulnerabilityImportant
Windows KernelCVE-2026-21239Windows Kernel Elevation of Privilege VulnerabilityImportant
Windows KernelCVE-2026-21245Windows Kernel Elevation of Privilege VulnerabilityImportant
Windows LDAP – Lightweight Directory Access ProtocolCVE-2026-21243Windows Lightweight Directory Access Protocol (LDAP) Denial of Service VulnerabilityImportant
Windows Notepad AppCVE-2026-20841Windows Notepad App Remote Code Execution VulnerabilityImportant
Windows NTLMCVE-2026-21249Windows NTLM Spoofing VulnerabilityImportant
Windows Remote Access Connection ManagerCVE-2026-21525Windows Remote Access Connection Manager Denial of Service VulnerabilityModerate
Windows Remote DesktopCVE-2026-21533Windows Remote Desktop Services Elevation of Privilege VulnerabilityImportant
Windows ShellCVE-2026-21510Windows Shell Security Feature Bypass VulnerabilityImportant
Windows StorageCVE-2026-21508Windows Storage Elevation of Privilege VulnerabilityImportant
Windows Subsystem for LinuxCVE-2026-21237Windows Subsystem for Linux Elevation of Privilege VulnerabilityImportant
Windows Subsystem for LinuxCVE-2026-21242Windows Subsystem for Linux Elevation of Privilege VulnerabilityImportant
Windows Win32K – GRFXCVE-2023-2804Red Hat, Inc. CVE-2023-2804: Heap Based Overflow libjpeg-turboImportant

Don’t forget to follow us @bigblogreport.com or www.bigblogreport.com

Similar Posts

Leave a Reply

Your email address will not be published. Required fields are marked *