Skip to content
NewApp Digest
  • Games
  • Apps
  • Android
  • Mobile
  • Windows
  • PC
  • Antivirus
  • Messenger
  • About
Menu
  • Games
  • Apps
  • Android
  • Mobile
  • Windows
  • PC
  • Antivirus
  • Messenger
  • About
search bot

February 2026 Patch Tuesday includes six actively exploited zero-days

February 12, 2026
  • Users
  • malicious links
  • search
  • download
  • restarting
  • privilege
  • influence
  • vulnerability
  • downloading
  • risks
  • ratings
  • Windows Update
  • threats
  • sandbox
  • icon
  • HTML
  • confidentiality
  • SmartScreen
  • user
  • vulnerabilities
  • exploiting
  • February
  • shell
  • Microsoft
  • remote access
  • links
  • Windows remote desktop
  • Start button
  • code execution
  • shortcuts
  • Trident
  • Patch
  • 1
  • privilege escalation
  • steps
  • Patch Tuesday
  • failure
  • content
  • menu
  • updates
  • documents
  • zero-day
  • zero-day vulnerabilities
  • security updates
  • access
  • computer
  • Remote Access Connection Manager
  • Security
  • desktop
  • files
  • Word
  • Explorer
  • history
  • office
  • protections
  • PC
  • devices
  • processing
  • practice
  • tech giant
  • code
  • exploitation
  • presents
  • availability
  • Microsoft Word
  • bypass
  • return
  • gear
  • exploit
  • security feature
  • report
  • cybersecurity
  • download and install
  • Remote Desktop
  • screen
  • update
  • remote desktop services
  • management
  • escalation
  • attention
  • execution
  • logo
  • Azure
  • feature
  • services
  • crash
  • Browser
  • 8
  • install
  • denial-of-service
  • prompts
  • integrity
  • zero-day exploits
  • Windows PC
  • Settings
  • engine
  • shortcut
  • connection
  • exploits
  • set
  • remote
  • crashing
  • Phishing
  • confusion
  • Windows
  • restart
  • automatic updates
  • rendering
  • impact
  • Internet Explorer
  • interaction
  • window
  • Patch Tuesday updates
  • network
  • delivery
  • Internet
  • cybersecurity risks
  • protection
  • tech
  • user interaction
  • fixes
  • button
  • manager

On the second Tuesday of each month, Microsoft diligently rolls out its security updates, a practice known as “Patch Tuesday.” This month, the tech giant has addressed a total of 59 vulnerabilities, including six critical zero-day exploits that are actively being targeted by attackers.

Overview of the Six Zero-Day Vulnerabilities

Let’s delve into the details of these six zero-days that pose significant risks to users.

Windows Shell Security Feature Bypass Vulnerability

CVE-2026-21510 (CVSS score 8.8 out of 10) highlights a security feature bypass within the Windows Shell. This vulnerability allows an attacker to circumvent Windows SmartScreen and similar security prompts, provided they can convince a user to open a malicious link or shortcut file. While the exploitation occurs over the network, it still necessitates user interaction. By successfully tricking the victim into launching the compromised shortcut, the attacker can evade typical security dialogs, facilitating the delivery and execution of further malicious payloads without raising suspicion.

MSHTML Framework Security Feature Bypass Vulnerability

CVE-2026-21513 (CVSS score 8.8 out of 10) concerns the MSHTML Framework, utilized by Internet Explorer’s Trident rendering engine. This vulnerability is classified as a protection mechanism failure that allows for a security feature bypass over the network. Attackers can exploit this flaw by persuading victims to open a malicious HTML file or crafted shortcut, which, when executed, can weaken or remove normal browser and Office sandbox protections, potentially leading to code execution or phishing attempts.

Microsoft Word Security Feature Bypass Vulnerability

CVE-2026-21514 (CVSS score 5.5 out of 10) targets Microsoft Word, where untrusted inputs can influence security decisions, resulting in a local security feature bypass. To exploit this vulnerability, an attacker must convince a user to open a malicious Word document. If successful, the flawed processing of untrusted input could allow the execution of content that would typically be blocked, thereby compromising the integrity of the system.

Desktop Window Manager Elevation of Privilege Vulnerability

CVE-2026-21519 (CVSS score 7.8 out of 10) presents a local elevation-of-privilege vulnerability within the Windows Desktop Window Manager, caused by type confusion. This flaw allows a locally authenticated attacker with low privileges to gain higher privileges without requiring user interaction. By exploiting this vulnerability, an attacker could potentially achieve SYSTEM privileges, significantly compromising the system’s security.

Windows Remote Access Connection Manager Denial of Service Vulnerability

CVE-2026-21525 (CVSS score 6.2 out of 10) describes a denial-of-service vulnerability in the Windows Remote Access Connection Manager service (RasMan). An unauthenticated local attacker can exploit this flaw with relatively low complexity, leading to a significant impact on service availability without directly compromising confidentiality or integrity. This could result in crashing the service or the system itself, although it does not allow for privilege escalation or code execution.

Windows Remote Desktop Services Elevation of Privilege Vulnerability

CVE-2026-21533 (CVSS score 7.8 out of 10) involves an elevation-of-privilege vulnerability in Windows Remote Desktop Services, stemming from improper privilege management. A local authenticated attacker can exploit this flaw to escalate privileges to SYSTEM without needing user interaction. This exploitation typically involves executing attacker-controlled code on a system equipped with Remote Desktop Services, thereby compromising the system’s confidentiality, integrity, and availability.

Azure Vulnerabilities

Additionally, Azure users should be aware of two critical vulnerabilities with CVSS ratings of 9.8, which warrant immediate attention.

How to Apply Fixes and Check You’re Protected

To ensure your Windows PC remains secure, follow these steps to apply the latest updates:

  1. Open Settings
    • Click the Start button (the Windows logo at the bottom left of your screen).
    • Select Settings (represented by a gear icon).
  2. Go to Windows Update
    • In the Settings window, select Windows Update (usually found at the bottom of the left menu).
  3. Check for updates
    • Click the Check for updates button.
    • Windows will search for the latest Patch Tuesday updates.
    • If you have previously enabled automatic updates, you may see this under Update history:
  4. Download and Install
    • If updates are found, they will begin downloading automatically. Once completed, you’ll see a button labeled Install or Restart now.
    • Click Install if necessary and follow any prompts. Your computer will typically require a restart to finalize the update. If prompted, click Restart now.
  5. Double-check you’re up to date
    • After restarting, return to Windows Update and check again. If it indicates You’re up to date, you are all set!

We don’t just report on threats—we remove them. Cybersecurity risks should never extend beyond a headline. Protect your devices by downloading Malwarebytes today.

Winsage
February 2026 Patch Tuesday includes six actively exploited zero-days

Latest insights and trends in the software universe. From cutting-edge apps to the most engaging games, our collective blog brings you up-to-the-minute news, reviews, and expert analyses.

Facebook-f Twitter
Quick Links
  • Games
  • Apps
  • Android
  • Mobile
  • Windows
  • PC
  • Antivirus
  • Messenger
  • About
  • Games
  • Apps
  • Android
  • Mobile
  • Windows
  • PC
  • Antivirus
  • Messenger
  • About
Get In Touch
  • get@newapp.site