Resources

Microsoft Patch Tuesday February 2026

Written by Admin | Feb 11, 2026 8:59:59 AM

Yesterday was Patch Tuesday, and Microsoft’s February 2026 release is one security teams should not ignore, particularly with six actively exploited zero-days already being used in real-world attacks.

This month’s update addresses 58 vulnerabilities, including six actively exploited zero-days and three that were publicly disclosed before patches were available. Alongside those, Microsoft fixed five Critical vulnerabilities, made up of three elevation of privilege flaws and two information disclosure issues.

Vulnerability Breakdown

The flaws span multiple categories:

  • 25 Elevation of Privilege
  • 5 Security Feature Bypass
  • 12 Remote Code Execution
  • 6 Information Disclosure
  • 3 Denial of Service
  • 7 Spoofing

As with standard reporting, only vulnerabilities released by Microsoft on Patch Tuesday are counted here. This does not include three Microsoft Edge issues that were addressed earlier this month.

Secure Boot Certificate Rollout Begins

Alongside the vulnerability fixes, Microsoft has started rolling out updated Secure Boot certificates, replacing the original 2011 certificates which expire in late June 2026.

According to Microsoft’s Windows 11 update notes, quality updates now include targeting data to determine whether devices are ready to receive the new certificates. Systems will only receive them once sufficient successful update signals are observed. The aim is a phased and controlled rollout to minimise disruption.

For organisations running mixed or legacy environments, this is one to track carefully over the coming months.

Six Actively Exploited Zero-Days

This month’s most pressing issue is the number of zero-days already being used in the wild. Of the six actively exploited vulnerabilities, three were also publicly disclosed before patches were released.

Microsoft defines a zero-day as either publicly disclosed or actively exploited while no official fix is available.

Here’s what matters.

CVE-2026-21510

Windows Shell Security Feature Bypass

An attacker can bypass Windows SmartScreen and Windows Shell security prompts by convincing a user to open a specially crafted link or shortcut file. Improper handling in Windows Shell components allows attacker-controlled content to execute without the usual warnings.

While details remain limited, this likely involves bypassing Mark of the Web protections. The flaw was discovered by multiple teams including MSTIC, MSRC, the Office Product Group Security Team, Google Threat Intelligence Group, and an anonymous researcher.

CVE-2026-21513

MSHTML Framework Security Feature Bypass

This vulnerability allows an unauthorised attacker to bypass a security feature over a network due to a protection mechanism failure in the MSHTML Framework. Exploitation details have not been released.

It was identified by MSTIC, MSRC, the Office Product Group Security Team, and Google Threat Intelligence Group.

CVE-2026-21514

Microsoft Word Security Feature Bypass

This actively exploited flaw allows attackers to bypass OLE mitigations in Microsoft 365 and Microsoft Office. Exploitation requires convincing a user to open a malicious Office file.

Microsoft confirmed the vulnerability cannot be exploited through the Office Preview Pane. Discovery was again attributed to MSTIC, MSRC, the Office Product Group Security Team, Google Threat Intelligence Group, and an anonymous researcher.

At present, it is unclear whether these three bypass vulnerabilities were exploited as part of the same campaign.

CVE-2026-21519

Desktop Window Manager Elevation of Privilege

Successful exploitation grants SYSTEM privileges. No further technical detail has been disclosed. The issue was identified by MSTIC and MSRC.

CVE-2026-21525

Windows Remote Access Connection Manager Denial of Service

A null pointer dereference vulnerability allows an unauthorised attacker to trigger a local denial of service.

ACROS Security identified the flaw. Their team discovered an exploit in a public malware repository in December 2025 while investigating another vulnerability. At the time, it was a zero-day and was micropatched via 0patch before being reported to Microsoft. There is currently no confirmed attribution regarding exploitation in the wild.

CVE-2026-21533

Windows Remote Desktop Services Elevation of Privilege

This flaw allows an authorised attacker to elevate privileges locally through improper privilege management in Windows Remote Desktop Services.

CrowdStrike’s Advanced Research Team observed exploitation that modifies a service configuration key, enabling attackers to add a new user to the Administrator group. While no specific adversary has been attributed, CrowdStrike expects increased attempts to weaponise or sell the exploit.

Other February 2026 Security Updates

Several additional vendors released security updates this month:

  • Adobe addressed vulnerabilities across Audition, After Effects, InDesign, Substance 3D, Lightroom Classic, and more. None are known to be exploited.
  • BeyondTrust fixed a critical RCE vulnerability in Remote Support and Privileged Remote Access.
  • CISA issued a binding operational directive requiring US federal agencies to remove unsupported network edge devices.
  • Cisco released updates for Secure Web Appliance, Cisco Meeting Management, and other products.
  • Fortinet issued fixes for FortiOS and FortiSandbox.
  • Google published its February Android security bulletin with no security fixes.
  • n8n resolved critical patch bypass vulnerabilities related to CVE-2025-68613.
  • SAP released updates including fixes for two critical vulnerabilities.

Separately, Microsoft has begun rolling out built-in Sysmon functionality in Windows 11 Insider builds. While not a security fix, this will be a welcome addition for many Windows administrators.

What this Means

Six actively exploited zero-days in a single month reinforces a pattern we continue to see. Security feature bypass, privilege escalation, and user interaction driven exploits remain reliable entry points for attackers.

Patch cadence matters. But so does visibility into where exploitation risk intersects with user behaviour, privilege management, and endpoint exposure.

To review the complete list of resolved vulnerabilities and affected systems, you can view the full February 2026 Patch Tuesday report directly via Microsoft’s official advisory.