Patch Tuesday

Today is Microsoft’s February 2026 Patch Tuesday with security updates for 58 flaws, including 6 actively exploited and three publicly disclosed zero-day vulnerabilities.

This Patch Tuesday also addresses five “Critical” vulnerabilities, 3 of which are elevation of privileges flaws and 2 information disclosure flaws.

The number of bugs in each vulnerability category is listed below:

Wiz

  • 25 Elevation of Privilege vulnerabilities
  • 5 Security Feature Bypass vulnerabilities
  • 12 Remote Code Execution vulnerabilities
  • 6 Information Disclosure vulnerabilities
  • 3 Denial of Service vulnerabilities
  • 7 Spoofing vulnerabilities

When BleepingComputer reports on Patch Tuesday security updates, we only count those released by Microsoft today. Therefore, the number of flaws does not include 3 Microsoft Edge flaws fixed earlier this month.

As part of these updates, Microsoft has also begun to roll out updated Secure Boot certificates to replace the original 2011 certificates that are expiring in late June 2026.

“With this update, Windows quality updates include a broad set of targeting data that identifies devices and their ability to receive new Secure Boot certificates,” explains Microsoft in the Windows 11 update notes.

“Devices will receive the new certificates only after they show sufficient successful update signals, which helps ensures a safe and phased rollout.”

To learn more about the non-security updates released today, you can review our dedicated articles on the Windows 11 KB5077181 & KB5075941 cumulative updates and the Windows 10 KB5075912 extended security update.

6 actively exploited zero-days

This month’s Patch Tuesday fixes six actively exploited vulnerabilities, three of which are publicly disclosed.

Microsoft classifies a zero-day flaw as publicly disclosed or actively exploited while no official fix is available.

The six actively exploited zero-days are:

CVE-2026-21510 – Windows Shell Security Feature Bypass Vulnerability

Microsoft has patched an actively exploited Windows security feature bypass that can be triggered by opening a specially crafted link or shortcut file.

“To successfully exploit this vulnerability, an attacker must convince a user to open a malicious link or shortcut file.” explains Microsoft.

“An attacker could bypass Windows SmartScreen and Windows Shell security prompts by exploiting improper handling in Windows Shell components, allowing attacker‑controlled content to execute without user warning or consent,” continued Microsoft.

While Microsoft has not shared further details, it likely allows attackers to bypass the Mark of the Web (MoTW) security warnings.

Microsoft has attributed the discovery of the flaw to Microsoft Threat Intelligence Center (MSTIC), Microsoft Security Response Center (MSRC), Office Product Group Security Team, Google Threat Intelligence Group, and an anonymous researcher.

CVE-2026-21513 – MSHTML Framework Security Feature Bypass Vulnerability

Microsoft has patched an actively exploited MSHTML security feature bypass flaw in Windows.

“Protection mechanism failure in MSHTML Framework allows an unauthorized attacker to bypass a security feature over a network,” explains Microsoft.

There are no details on how this was exploited.

This flaw was once again attributed to Microsoft Threat Intelligence Center (MSTIC), Microsoft Security Response Center (MSRC), Office Product Group Security Team, and Google Threat Intelligence Group.

CVE-2026-21514 – Microsoft Word Security Feature Bypass Vulnerability

Microsoft has patched a security feature bypass flaw in Microsoft Word that is actively exploited.

“An attacker must send a user a malicious Office file and convince them to open it,” warns Microsoft’s advisory.

“This update addresses a vulnerability that bypasses OLE mitigations in Microsoft 365 and Microsoft Office which protect users from vulnerable COM/OLE control,” continues Microsoft.

Microsoft says that the flaw cannot be exploited in the Office Preview Pane.

The flaw was again attributed to Microsoft Threat Intelligence Center (MSTIC), Microsoft Security Response Center (MSRC), Office Product Group Security Team, Google Threat Intelligence Group, and an anonymous researcher.

As no details have been released, it is unclear if CVE-2026-21510, CVE-2026-21513, and CVE-2026-21514 were exploited in the same campaign.

CVE-2026-21519 – Desktop Window Manager Elevation of Privilege Vulnerability

Microsoft has patched an actively exploited elevation of privileges flaw in the Desktop Window Manager.

“An attacker who successfully exploited this vulnerability could gain SYSTEM privileges,” warns Microsoft.

No details have been shared on how it was exploited.

Microsoft has attributed the discovery of the flaw to Microsoft Threat Intelligence Center (MSTIC) & Microsoft Security Response Center (MSRC).

CVE-2026-21525 – Windows Remote Access Connection Manager Denial of Service Vulnerability

Microsoft fixed an actively exploited denial of service flaw in the Windows Remote Access Connection Manager.

“Null pointer dereference in Windows Remote Access Connection Manager allows an unauthorized attacker to deny service locally,’ explains Microsoft.

Microsoft has attributed the discovery of the flaw to the ACROS Security team with 0patch.

ACROS CEO Mitja Kolsek told BleepingComputer that the exploit was found in a public malware repository but is unsure how it is being exploited in attacks.

“We found an exploit for this issue in December 2025 in a public malware repository while searching for an exploit for CVE-2025-59230,” Kolsek told BleepingComputer.

“This issue turned out to be a 0day at the time, so we patched it (blog.0patch.com/2025/12/free-micropatches-for-windows-remote.html) and reported it to Microsoft. We don’t have any information on it having been exploited, but the quality of the combined exploit for both issues suggested professional work.”

CVE-2026-21533 – Windows Remote Desktop Services Elevation of Privilege Vulnerability

Microsoft has fixed an elevation of privileges in Windows Remote Desktop Services.

“Improper privilege management in Windows Remote Desktop allows an authorized attacker to elevate privileges locally,” explains Microsoft.

Microsoft has attributed the discovery of the flaw to the Advanced Research Team at CrowdStrike.

CrowdStrike told BleepingComputer that the exploit they observed allows threat actors to add a new user to the Administrator group.

“The CVE-2026-21533 exploit binary modifies a service configuration key, replacing it with an attacker-controlled key, which could enable adversaries to escalate privileges to add a new user to the Administrator group,” Adam Meyers, Head of Counter Adversary Operations, CrowdStrike, told BleepingComputer.

“While CrowdStrike does not currently attribute this activity to a specific target or adversary, threat actors possessing the exploit binaries will likely accelerate their attempts to use or sell CVE-2026-21533 in the near term.”

Of the six zero-days, CVE-2026-21513, CVE-2026-21510, and CVE-2026-21514 were publicly disclosed.

Recent updates from other companies

Other vendors who released updates or advisories in February 2026 include:

While not a security update, Microsoft has started rolling out built-in Sysmon functionality in Windows 11 insider builds, which many Windows admins will find useful.

The February 2026 Patch Tuesday Security Updates

Below is the complete list of resolved vulnerabilities in the February 2026 Patch Tuesday updates.

To access the full description of each vulnerability and the systems it affects, you can view the full report here.

Tag
CVE ID
CVE Title
Severity
.NET

CVE-2026-21218

.NET Spoofing Vulnerability

Important


Azure Arc

CVE-2026-24302

Azure Arc Elevation of Privilege Vulnerability

Critical


Azure Compute Gallery

CVE-2026-23655

Microsoft ACI Confidential Containers Information Disclosure Vulnerability

Critical


Azure Compute Gallery

CVE-2026-21522

Microsoft ACI Confidential Containers Elevation of Privilege Vulnerability

Critical


Azure DevOps Server

CVE-2026-21512

Azure DevOps Server Cross-Site Scripting Vulnerability

Important


Azure Front Door (AFD)

CVE-2026-24300

Azure Front Door Elevation of Privilege Vulnerability

Critical


Azure Function

CVE-2026-21532

Azure Function Information Disclosure Vulnerability

Critical


Azure HDInsights

CVE-2026-21529

Azure HDInsight Spoofing Vulnerability

Important


Azure IoT SDK

CVE-2026-21528

Azure IoT Explorer Information Disclosure Vulnerability

Important


Azure Local

CVE-2026-21228

Azure Local Remote Code Execution Vulnerability

Important


Azure SDK

CVE-2026-21531

Azure SDK for Python Remote Code Execution Vulnerability

Important


Desktop Window Manager

CVE-2026-21519

Desktop Window Manager Elevation of Privilege Vulnerability

Important


Github Copilot

CVE-2026-21516

GitHub Copilot for Jetbrains Remote Code Execution Vulnerability

Important


GitHub Copilot and Visual Studio

CVE-2026-21523

GitHub Copilot and Visual Studio Code Remote Code Execution Vulnerability

Important


GitHub Copilot and Visual Studio

CVE-2026-21256

GitHub Copilot and Visual Studio Remote Code Execution Vulnerability

Important


GitHub Copilot and Visual Studio

CVE-2026-21257

GitHub Copilot and Visual Studio Elevation of Privilege Vulnerability

Important


GitHub Copilot and Visual Studio Code

CVE-2026-21518

GitHub Copilot and Visual Studio Code Security Feature Bypass Vulnerability

Important


Mailslot File System

CVE-2026-21253

Mailslot File System Elevation of Privilege Vulnerability

Important


Microsoft Defender for Linux

CVE-2026-21537

Microsoft Defender for Endpoint Linux Extension Remote Code Execution Vulnerability

Important


Microsoft Edge (Chromium-based)

CVE-2026-1861

Chromium: CVE-2026-1861 Heap buffer overflow in libvpx

Unknown


Microsoft Edge (Chromium-based)

CVE-2026-1862

Chromium: CVE-2026-1862 Type Confusion in V8

Unknown


Microsoft Edge for Android

CVE-2026-0391

Microsoft Edge (Chromium-based) for Android Spoofing Vulnerability

Moderate


Microsoft Exchange Server

CVE-2026-21527

Microsoft Exchange Server Spoofing Vulnerability

Important


Microsoft Graphics Component

CVE-2026-21246

Windows Graphics Component Elevation of Privilege Vulnerability

Important


Microsoft Graphics Component

CVE-2026-21235

Windows Graphics Component Elevation of Privilege Vulnerability

Important


Microsoft Office Excel

CVE-2026-21261

Microsoft Excel Information Disclosure Vulnerability

Important


Microsoft Office Excel

CVE-2026-21258

Microsoft Excel Information Disclosure Vulnerability

Important


Microsoft Office Excel

CVE-2026-21259

Microsoft Excel Elevation of Privilege Vulnerability

Important


Microsoft Office Outlook

CVE-2026-21260

Microsoft Outlook Spoofing Vulnerability

Important


Microsoft Office Outlook

CVE-2026-21511

Microsoft Outlook Spoofing Vulnerability

Important


Microsoft Office Word

CVE-2026-21514

Microsoft Word Security Feature Bypass Vulnerability

Important


MSHTML Framework

CVE-2026-21513

MSHTML Framework Security Feature Bypass Vulnerability

Important


Power BI

CVE-2026-21229

Power BI Remote Code Execution Vulnerability

Important


Role: Windows Hyper-V

CVE-2026-21244

Windows Hyper-V Remote Code Execution Vulnerability

Important


Role: Windows Hyper-V

CVE-2026-21255

Windows Hyper-V Security Feature Bypass Vulnerability

Important


Role: Windows Hyper-V

CVE-2026-21248

Windows Hyper-V Remote Code Execution Vulnerability

Important


Role: Windows Hyper-V

CVE-2026-21247

Windows Hyper-V Remote Code Execution Vulnerability

Important


Windows Ancillary Function Driver for WinSock

CVE-2026-21236

Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability

Important


Windows Ancillary Function Driver for WinSock

CVE-2026-21241

Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability

Important


Windows Ancillary Function Driver for WinSock

CVE-2026-21238

Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability

Important


Windows App for Mac

CVE-2026-21517

Windows App for Mac Installer Elevation of Privilege Vulnerability

Important


Windows Cluster Client Failover

CVE-2026-21251

Cluster Client Failover (CCF) Elevation of Privilege Vulnerability

Important


Windows Connected Devices Platform Service

CVE-2026-21234

Windows Connected Devices Platform Service Elevation of Privilege Vulnerability

Important


Windows GDI+

CVE-2026-20846

GDI+ Denial of Service Vulnerability

Important


Windows HTTP.sys

CVE-2026-21240

Windows HTTP.sys Elevation of Privilege Vulnerability

Important


Windows HTTP.sys

CVE-2026-21250

Windows HTTP.sys Elevation of Privilege Vulnerability

Important


Windows HTTP.sys

CVE-2026-21232

Windows HTTP.sys Elevation of Privilege Vulnerability

Important


Windows Kernel

CVE-2026-21231

Windows Kernel Elevation of Privilege Vulnerability

Important


Windows Kernel

CVE-2026-21222

Windows Kernel Information Disclosure Vulnerability

Important


Windows Kernel

CVE-2026-21239

Windows Kernel Elevation of Privilege Vulnerability

Important


Windows Kernel

CVE-2026-21245

Windows Kernel Elevation of Privilege Vulnerability

Important


Windows LDAP – Lightweight Directory Access Protocol

CVE-2026-21243

Windows Lightweight Directory Access Protocol (LDAP) Denial of Service Vulnerability

Important


Windows Notepad App

CVE-2026-20841

Windows Notepad App Remote Code Execution Vulnerability

Important


Windows NTLM

CVE-2026-21249

Windows NTLM Spoofing Vulnerability

Important


Windows Remote Access Connection Manager

CVE-2026-21525

Windows Remote Access Connection Manager Denial of Service Vulnerability

Moderate


Windows Remote Desktop

CVE-2026-21533

Windows Remote Desktop Services Elevation of Privilege Vulnerability

Important


Windows Shell

CVE-2026-21510

Windows Shell Security Feature Bypass Vulnerability

Important


Windows Storage

CVE-2026-21508

Windows Storage Elevation of Privilege Vulnerability

Important


Windows Subsystem for Linux

CVE-2026-21237

Windows Subsystem for Linux Elevation of Privilege Vulnerability

Important


Windows Subsystem for Linux

CVE-2026-21242

Windows Subsystem for Linux Elevation of Privilege Vulnerability

Important


Windows Win32K – GRFX

CVE-2023-2804

Red Hat, Inc. CVE-2023-2804: Heap Based Overflow libjpeg-turbo

Important


Update 2/10/26: Added information about how CVE-2026-21533 and CVE-2026-21525 are exploited.


tines

Modern IT infrastructure moves faster than manual workflows can handle.

In this new Tines guide, learn how your team can reduce hidden manual delays, improve reliability through automated response, and build and scale intelligent workflows on top of tools you already use.

Get the guide