Microsoft February 2026 Patch Tuesday fixes 6 zero-days, 58 flaws
12 mins read

Microsoft February 2026 Patch Tuesday fixes 6 zero-days, 58 flaws

Today is Microsoft’s February 2026 Patch Tuesday with security updates for 58 flaws, including 6 actively exploited and three publicly disclosed zero-day vulnerabilities.

This Patch Tuesday also addresses five “Critical” vulnerabilities, 3 of which are elevation of privileges flaws and 2 information disclosure flaws.

The number of bugs in each vulnerability category is listed below:

  • 25 Elevation of Privilege vulnerabilities
  • 5 Security Feature Bypass vulnerabilities
  • 12 Remote Code Execution vulnerabilities
  • 6 Information Disclosure vulnerabilities
  • 3 Denial of Service vulnerabilities
  • 7 Spoofing vulnerabilities

When GeekFeed reports on Patch Tuesday security updates, we only count those released by Microsoft today. Therefore, the number of flaws does not include 3 Microsoft Edge flaws fixed earlier this month.

As part of these updates, Microsoft has also begun to roll out updated Secure Boot certificates to replace the original 2011 certificates that are expiring in late June 2026.

“With this update, Windows quality updates include a broad set of targeting data that identifies devices and their ability to receive new Secure Boot certificates,” explains Microsoft in the Windows 11 update notes.

“Devices will receive the new certificates only after they show sufficient successful update signals, which helps ensures a safe and phased rollout.”

To learn more about the non-security updates released today, you can review our dedicated articles on the Windows 11 KB5077181 & KB5075941 cumulative updates and the Windows 10 KB5075912 extended security update.

6 actively exploited zero-days

This month’s Patch Tuesday fixes six actively exploited vulnerabilities, three of which are publicly disclosed.

Microsoft classifies a zero-day flaw as publicly disclosed or actively exploited while no official fix is available.

The six actively exploited zero-days are:

CVE-2026-21510 – Windows Shell Security Feature Bypass Vulnerability

Microsoft has patched an actively exploited Windows security feature bypass that can be triggered by opening a specially crafted link or shortcut file.

“To successfully exploit this vulnerability, an attacker must convince a user to open a malicious link or shortcut file.” explains Microsoft.

“An attacker could bypass Windows SmartScreen and Windows Shell security prompts by exploiting improper handling in Windows Shell components, allowing attacker‑controlled content to execute without user warning or consent,” continued Microsoft.

While Microsoft has not shared further details, it likely allows attackers to bypass the Mark of the Web (MoTW) security warnings.

Microsoft has attributed the discovery of the flaw to Microsoft Threat Intelligence Center (MSTIC), Microsoft Security Response Center (MSRC), Office Product Group Security Team, Google Threat Intelligence Group, and an anonymous researcher.

CVE-2026-21513 – MSHTML Framework Security Feature Bypass Vulnerability

Microsoft has patched an actively exploited MSHTML security feature bypass flaw in Windows.

“Protection mechanism failure in MSHTML Framework allows an unauthorized attacker to bypass a security feature over a network,” explains Microsoft.

There are no details on how this was exploited.

This flaw was once again attributed to Microsoft Threat Intelligence Center (MSTIC), Microsoft Security Response Center (MSRC), Office Product Group Security Team, and Google Threat Intelligence Group.

CVE-2026-21514 – Microsoft Word Security Feature Bypass Vulnerability

Microsoft has patched a security feature bypass flaw in Microsoft Word that is actively exploited.

“An attacker must send a user a malicious Office file and convince them to open it,” warns Microsoft’s advisory.

“This update addresses a vulnerability that bypasses OLE mitigations in Microsoft 365 and Microsoft Office which protect users from vulnerable COM/OLE control,” continues Microsoft.

Microsoft says that the flaw cannot be exploited in the Office Preview Pane.

The flaw was again attributed to Microsoft Threat Intelligence Center (MSTIC), Microsoft Security Response Center (MSRC), Office Product Group Security Team, Google Threat Intelligence Group, and an anonymous researcher.

As no details have been released, it is unclear if CVE-2026-21510, CVE-2026-21513, and CVE-2026-21514 were exploited in the same campaign.

CVE-2026-21519 – Desktop Window Manager Elevation of Privilege Vulnerability

Microsoft has patched an actively exploited elevation of privileges flaw in the Desktop Window Manager.

“An attacker who successfully exploited this vulnerability could gain SYSTEM privileges,” warns Microsoft.

No details have been shared on how it was exploited.

Microsoft has attributed the discovery of the flaw to Microsoft Threat Intelligence Center (MSTIC) & Microsoft Security Response Center (MSRC).

CVE-2026-21525 – Windows Remote Access Connection Manager Denial of Service Vulnerability

Microsoft fixed an actively exploited denial of service flaw in the Windows Remote Access Connection Manager.

“Null pointer dereference in Windows Remote Access Connection Manager allows an unauthorized attacker to deny service locally,’ explains Microsoft.

Microsoft has attributed the discovery of the flaw to the ACROS Security team with 0patch.

ACROS CEO Mitja Kolsek told GeekFeed that the exploit was found in a public malware repository but is unsure how it is being exploited in attacks.

“We found an exploit for this issue in December 2025 in a public malware repository while searching for an exploit for CVE-2025-59230,” Kolsek told GeekFeed.

“This issue turned out to be a 0day at the time, so we patched it (blog.0patch.com/2025/12/free-micropatches-for-windows-remote.html) and reported it to Microsoft. We don’t have any information on it having been exploited, but the quality of the combined exploit for both issues suggested professional work.”

CVE-2026-21533 – Windows Remote Desktop Services Elevation of Privilege Vulnerability

Microsoft has fixed an elevation of privileges in Windows Remote Desktop Services.

“Improper privilege management in Windows Remote Desktop allows an authorized attacker to elevate privileges locally,” explains Microsoft.

Microsoft has attributed the discovery of the flaw to the Advanced Research Team at CrowdStrike.

CrowdStrike told GeekFeed that the exploit they observed allows threat actors to add a new user to the Administrator group.

“The CVE-2026-21533 exploit binary modifies a service configuration key, replacing it with an attacker-controlled key, which could enable adversaries to escalate privileges to add a new user to the Administrator group,” Adam Meyers, Head of Counter Adversary Operations, CrowdStrike, told GeekFeed.

“While CrowdStrike does not currently attribute this activity to a specific target or adversary, threat actors possessing the exploit binaries will likely accelerate their attempts to use or sell CVE-2026-21533 in the near term.”

Of the six zero-days, CVE-2026-21513, CVE-2026-21510, and CVE-2026-21514 were publicly disclosed.

Recent updates from other companies

Other vendors who released updates or advisories in February 2026 include:

While not a security update, Microsoft has started rolling out built-in Sysmon functionality in Windows 11 insider builds, which many Windows admins will find useful.

The February 2026 Patch Tuesday Security Updates

Below is the complete list of resolved vulnerabilities in the February 2026 Patch Tuesday updates.

TagCVE IDCVE TitleSeverity
.NETCVE-2026-21218.NET Spoofing VulnerabilityImportant
Azure ArcCVE-2026-24302Azure Arc Elevation of Privilege VulnerabilityCritical
Azure Compute GalleryCVE-2026-23655Microsoft ACI Confidential Containers Information Disclosure VulnerabilityCritical
Azure Compute GalleryCVE-2026-21522Microsoft ACI Confidential Containers Elevation of Privilege VulnerabilityCritical
Azure DevOps ServerCVE-2026-21512Azure DevOps Server Cross-Site Scripting VulnerabilityImportant
Azure Front Door (AFD)CVE-2026-24300Azure Front Door Elevation of Privilege VulnerabilityCritical
Azure FunctionCVE-2026-21532Azure Function Information Disclosure VulnerabilityCritical
Azure HDInsightsCVE-2026-21529Azure HDInsight Spoofing VulnerabilityImportant
Azure IoT SDKCVE-2026-21528Azure IoT Explorer Information Disclosure VulnerabilityImportant
Azure LocalCVE-2026-21228Azure Local Remote Code Execution VulnerabilityImportant
Azure SDKCVE-2026-21531Azure SDK for Python Remote Code Execution VulnerabilityImportant
Desktop Window ManagerCVE-2026-21519Desktop Window Manager Elevation of Privilege VulnerabilityImportant
Github CopilotCVE-2026-21516GitHub Copilot for Jetbrains Remote Code Execution VulnerabilityImportant
GitHub Copilot and Visual StudioCVE-2026-21523GitHub Copilot and Visual Studio Code Remote Code Execution VulnerabilityImportant
GitHub Copilot and Visual StudioCVE-2026-21256GitHub Copilot and Visual Studio Remote Code Execution VulnerabilityImportant
GitHub Copilot and Visual StudioCVE-2026-21257GitHub Copilot and Visual Studio Elevation of Privilege VulnerabilityImportant
GitHub Copilot and Visual Studio CodeCVE-2026-21518GitHub Copilot and Visual Studio Code Security Feature Bypass VulnerabilityImportant
Mailslot File SystemCVE-2026-21253Mailslot File System Elevation of Privilege VulnerabilityImportant
Microsoft Defender for LinuxCVE-2026-21537Microsoft Defender for Endpoint Linux Extension Remote Code Execution VulnerabilityImportant
Microsoft Edge (Chromium-based)CVE-2026-1861Chromium: CVE-2026-1861 Heap buffer overflow in libvpxUnknown
Microsoft Edge (Chromium-based)CVE-2026-1862Chromium: CVE-2026-1862 Type Confusion in V8Unknown
Microsoft Edge for AndroidCVE-2026-0391Microsoft Edge (Chromium-based) for Android Spoofing VulnerabilityModerate
Microsoft Exchange ServerCVE-2026-21527Microsoft Exchange Server Spoofing VulnerabilityImportant
Microsoft Graphics ComponentCVE-2026-21246Windows Graphics Component Elevation of Privilege VulnerabilityImportant
Microsoft Graphics ComponentCVE-2026-21235Windows Graphics Component Elevation of Privilege VulnerabilityImportant
Microsoft Office ExcelCVE-2026-21261Microsoft Excel Information Disclosure VulnerabilityImportant
Microsoft Office ExcelCVE-2026-21258Microsoft Excel Information Disclosure VulnerabilityImportant
Microsoft Office ExcelCVE-2026-21259Microsoft Excel Elevation of Privilege VulnerabilityImportant
Microsoft Office OutlookCVE-2026-21260Microsoft Outlook Spoofing VulnerabilityImportant
Microsoft Office OutlookCVE-2026-21511Microsoft Outlook Spoofing VulnerabilityImportant
Microsoft Office WordCVE-2026-21514Microsoft Word Security Feature Bypass VulnerabilityImportant
MSHTML FrameworkCVE-2026-21513MSHTML Framework Security Feature Bypass VulnerabilityImportant
Power BICVE-2026-21229Power BI Remote Code Execution VulnerabilityImportant
Role: Windows Hyper-VCVE-2026-21244Windows Hyper-V Remote Code Execution VulnerabilityImportant
Role: Windows Hyper-VCVE-2026-21255Windows Hyper-V Security Feature Bypass VulnerabilityImportant
Role: Windows Hyper-VCVE-2026-21248Windows Hyper-V Remote Code Execution VulnerabilityImportant
Role: Windows Hyper-VCVE-2026-21247Windows Hyper-V Remote Code Execution VulnerabilityImportant
Windows Ancillary Function Driver for WinSockCVE-2026-21236Windows Ancillary Function Driver for WinSock Elevation of Privilege VulnerabilityImportant
Windows Ancillary Function Driver for WinSockCVE-2026-21241Windows Ancillary Function Driver for WinSock Elevation of Privilege VulnerabilityImportant
Windows Ancillary Function Driver for WinSockCVE-2026-21238Windows Ancillary Function Driver for WinSock Elevation of Privilege VulnerabilityImportant
Windows App for MacCVE-2026-21517Windows App for Mac Installer Elevation of Privilege VulnerabilityImportant
Windows Cluster Client FailoverCVE-2026-21251Cluster Client Failover (CCF) Elevation of Privilege VulnerabilityImportant
Windows Connected Devices Platform ServiceCVE-2026-21234Windows Connected Devices Platform Service Elevation of Privilege VulnerabilityImportant
Windows GDI+CVE-2026-20846GDI+ Denial of Service VulnerabilityImportant
Windows HTTP.sysCVE-2026-21240Windows HTTP.sys Elevation of Privilege VulnerabilityImportant
Windows HTTP.sysCVE-2026-21250Windows HTTP.sys Elevation of Privilege VulnerabilityImportant
Windows HTTP.sysCVE-2026-21232Windows HTTP.sys Elevation of Privilege VulnerabilityImportant
Windows KernelCVE-2026-21231Windows Kernel Elevation of Privilege VulnerabilityImportant
Windows KernelCVE-2026-21222Windows Kernel Information Disclosure VulnerabilityImportant
Windows KernelCVE-2026-21239Windows Kernel Elevation of Privilege VulnerabilityImportant
Windows KernelCVE-2026-21245Windows Kernel Elevation of Privilege VulnerabilityImportant
Windows LDAP – Lightweight Directory Access ProtocolCVE-2026-21243Windows Lightweight Directory Access Protocol (LDAP) Denial of Service VulnerabilityImportant
Windows Notepad AppCVE-2026-20841Windows Notepad App Remote Code Execution VulnerabilityImportant
Windows NTLMCVE-2026-21249Windows NTLM Spoofing VulnerabilityImportant
Windows Remote Access Connection ManagerCVE-2026-21525Windows Remote Access Connection Manager Denial of Service VulnerabilityModerate
Windows Remote DesktopCVE-2026-21533Windows Remote Desktop Services Elevation of Privilege VulnerabilityImportant
Windows ShellCVE-2026-21510Windows Shell Security Feature Bypass VulnerabilityImportant
Windows StorageCVE-2026-21508Windows Storage Elevation of Privilege VulnerabilityImportant
Windows Subsystem for LinuxCVE-2026-21237Windows Subsystem for Linux Elevation of Privilege VulnerabilityImportant
Windows Subsystem for LinuxCVE-2026-21242Windows Subsystem for Linux Elevation of Privilege VulnerabilityImportant
Windows Win32K – GRFXCVE-2023-2804Red Hat, Inc. CVE-2023-2804: Heap Based Overflow libjpeg-turboImportant

Leave a Reply

Your email address will not be published. Required fields are marked *