Microsoft February 2026 Patch Tuesday Addresses 6 Zero-Days and 59 Flaws
Summary
Hide ▲
Show ▼
Microsoft's February 2026 Patch Tuesday addresses 59 vulnerabilities, including 6 actively exploited zero-days and 3 publicly disclosed flaws. The updates include fixes for 5 critical vulnerabilities, with three being security feature bypass flaws in various Microsoft products. The zero-days span components such as Windows Shell, MSHTML Framework, Microsoft Word, Desktop Window Manager, Windows Remote Access Connection Manager, and Windows Remote Desktop Services. Microsoft issued an out-of-band patch for one of the zero-days, CVE-2026-21514, highlighting its urgency. The updates also cover a range of other vulnerabilities, including elevation of privilege, security feature bypass, remote code execution, information disclosure, denial of service, and spoofing flaws. Additionally, Microsoft has begun rolling out updated Secure Boot certificates to replace expiring 2011 certificates. Other vendors, including Adobe, BeyondTrust, CISA, Cisco, Fortinet, Google, n8n, and SAP, have also released security updates or advisories.
Timeline
-
10.02.2026 20:51 4 articles · 1d ago
Microsoft February 2026 Patch Tuesday Addresses 6 Zero-Days and 58 Flaws
Microsoft's February 2026 Patch Tuesday addresses 59 vulnerabilities, including 6 actively exploited zero-days and 3 publicly disclosed flaws. The updates include fixes for 5 critical vulnerabilities, with three being security feature bypass flaws in various Microsoft products. The zero-days span components such as Windows Shell, MSHTML Framework, Microsoft Word, Desktop Window Manager, Windows Remote Access Connection Manager, and Windows Remote Desktop Services. Microsoft issued an out-of-band patch for one of the zero-days, CVE-2026-21514, highlighting its urgency. The updates also cover a range of other vulnerabilities, including elevation of privilege, security feature bypass, remote code execution, information disclosure, denial of service, and spoofing flaws. Additionally, Microsoft has begun rolling out updated Secure Boot certificates to replace expiring 2011 certificates. Other vendors, including Adobe, BeyondTrust, CISA, Cisco, Fortinet, Google, n8n, and SAP, have also released security updates or advisories.
Show sources
- Microsoft February 2026 Patch Tuesday fixes 6 zero-days, 58 flaws — www.bleepingcomputer.com — 10.02.2026 20:51
- Microsoft Patches 6 Actively Exploited Zero-Days — www.darkreading.com — 10.02.2026 23:00
- Patch Tuesday, February 2026 Edition — krebsonsecurity.com — 10.02.2026 23:49
- Microsoft Patches 59 Vulnerabilities Including Six Actively Exploited Zero-Days — thehackernews.com — 11.02.2026 12:22
Information Snippets
-
Microsoft's February 2026 Patch Tuesday addresses 58 vulnerabilities, including 6 actively exploited zero-days.
First reported: 10.02.2026 20:514 sources, 4 articlesShow sources
- Microsoft February 2026 Patch Tuesday fixes 6 zero-days, 58 flaws — www.bleepingcomputer.com — 10.02.2026 20:51
- Microsoft Patches 6 Actively Exploited Zero-Days — www.darkreading.com — 10.02.2026 23:00
- Patch Tuesday, February 2026 Edition — krebsonsecurity.com — 10.02.2026 23:49
- Microsoft Patches 59 Vulnerabilities Including Six Actively Exploited Zero-Days — thehackernews.com — 11.02.2026 12:22
-
The updates include fixes for 5 critical vulnerabilities, 3 of which are elevation of privilege flaws and 2 are information disclosure flaws.
First reported: 10.02.2026 20:514 sources, 4 articlesShow sources
- Microsoft February 2026 Patch Tuesday fixes 6 zero-days, 58 flaws — www.bleepingcomputer.com — 10.02.2026 20:51
- Microsoft Patches 6 Actively Exploited Zero-Days — www.darkreading.com — 10.02.2026 23:00
- Patch Tuesday, February 2026 Edition — krebsonsecurity.com — 10.02.2026 23:49
- Microsoft Patches 59 Vulnerabilities Including Six Actively Exploited Zero-Days — thehackernews.com — 11.02.2026 12:22
-
The zero-days include CVE-2026-21510 (Windows Shell Security Feature Bypass), CVE-2026-21513 (MSHTML Framework Security Feature Bypass), CVE-2026-21514 (Microsoft Word Security Feature Bypass), CVE-2026-21519 (Desktop Window Manager Elevation of Privilege), CVE-2026-21525 (Windows Remote Access Connection Manager Denial of Service), and CVE-2026-21533 (Windows Remote Desktop Services Elevation of Privilege).
First reported: 10.02.2026 20:514 sources, 4 articlesShow sources
- Microsoft February 2026 Patch Tuesday fixes 6 zero-days, 58 flaws — www.bleepingcomputer.com — 10.02.2026 20:51
- Microsoft Patches 6 Actively Exploited Zero-Days — www.darkreading.com — 10.02.2026 23:00
- Patch Tuesday, February 2026 Edition — krebsonsecurity.com — 10.02.2026 23:49
- Microsoft Patches 59 Vulnerabilities Including Six Actively Exploited Zero-Days — thehackernews.com — 11.02.2026 12:22
-
Microsoft has begun rolling out updated Secure Boot certificates to replace expiring 2011 certificates.
First reported: 10.02.2026 20:513 sources, 3 articlesShow sources
- Microsoft February 2026 Patch Tuesday fixes 6 zero-days, 58 flaws — www.bleepingcomputer.com — 10.02.2026 20:51
- Patch Tuesday, February 2026 Edition — krebsonsecurity.com — 10.02.2026 23:49
- Microsoft Patches 59 Vulnerabilities Including Six Actively Exploited Zero-Days — thehackernews.com — 11.02.2026 12:22
-
Other vendors, including Adobe, BeyondTrust, CISA, Cisco, Fortinet, Google, n8n, and SAP, have also released security updates or advisories.
First reported: 10.02.2026 20:513 sources, 3 articlesShow sources
- Microsoft February 2026 Patch Tuesday fixes 6 zero-days, 58 flaws — www.bleepingcomputer.com — 10.02.2026 20:51
- Patch Tuesday, February 2026 Edition — krebsonsecurity.com — 10.02.2026 23:49
- Microsoft Patches 59 Vulnerabilities Including Six Actively Exploited Zero-Days — thehackernews.com — 11.02.2026 12:22
-
Microsoft issued an out-of-band patch for CVE-2026-21514, a security feature bypass vulnerability in Microsoft Word.
First reported: 10.02.2026 23:003 sources, 3 articlesShow sources
- Microsoft Patches 6 Actively Exploited Zero-Days — www.darkreading.com — 10.02.2026 23:00
- Patch Tuesday, February 2026 Edition — krebsonsecurity.com — 10.02.2026 23:49
- Microsoft Patches 59 Vulnerabilities Including Six Actively Exploited Zero-Days — thehackernews.com — 11.02.2026 12:22
-
CVE-2026-2150 allows attackers to bypass Windows Shell and Windows SmartScreen protections.
First reported: 10.02.2026 23:003 sources, 3 articlesShow sources
- Microsoft Patches 6 Actively Exploited Zero-Days — www.darkreading.com — 10.02.2026 23:00
- Patch Tuesday, February 2026 Edition — krebsonsecurity.com — 10.02.2026 23:49
- Microsoft Patches 59 Vulnerabilities Including Six Actively Exploited Zero-Days — thehackernews.com — 11.02.2026 12:22
-
CVE-2026-21513 affects Microsoft's MSHTML framework, enabling attackers to execute malicious HTML files.
First reported: 10.02.2026 23:003 sources, 3 articlesShow sources
- Microsoft Patches 6 Actively Exploited Zero-Days — www.darkreading.com — 10.02.2026 23:00
- Patch Tuesday, February 2026 Edition — krebsonsecurity.com — 10.02.2026 23:49
- Microsoft Patches 59 Vulnerabilities Including Six Actively Exploited Zero-Days — thehackernews.com — 11.02.2026 12:22
-
CVE-2026-21525 in Windows Remote Access Connection Manager allows attackers to trigger denial-of-service conditions locally.
First reported: 10.02.2026 23:003 sources, 3 articlesShow sources
- Microsoft Patches 6 Actively Exploited Zero-Days — www.darkreading.com — 10.02.2026 23:00
- Patch Tuesday, February 2026 Edition — krebsonsecurity.com — 10.02.2026 23:49
- Microsoft Patches 59 Vulnerabilities Including Six Actively Exploited Zero-Days — thehackernews.com — 11.02.2026 12:22
-
Microsoft assessed five other CVEs as bugs that attackers are "more likely" to exploit.
First reported: 10.02.2026 23:001 source, 1 articleShow sources
- Microsoft Patches 6 Actively Exploited Zero-Days — www.darkreading.com — 10.02.2026 23:00
-
Microsoft issued several out-of-band security updates since January’s Patch Tuesday, including a fix for a credential prompt failure in remote desktop connections on January 17 and a patch for a zero-day security feature bypass vulnerability (CVE-2026-21509) in Microsoft Office on January 26.
First reported: 10.02.2026 23:491 source, 1 articleShow sources
- Patch Tuesday, February 2026 Edition — krebsonsecurity.com — 10.02.2026 23:49
-
This month’s Patch Tuesday includes several fixes for remote code execution vulnerabilities affecting GitHub Copilot and multiple integrated development environments (IDEs), including VS Code, Visual Studio, and JetBrains products. The relevant CVEs are CVE-2026-21516, CVE-2026-21523, and CVE-2026-21256.
First reported: 10.02.2026 23:491 source, 1 articleShow sources
- Patch Tuesday, February 2026 Edition — krebsonsecurity.com — 10.02.2026 23:49
-
The AI vulnerabilities Microsoft patched this month stem from a command injection flaw that can be triggered through prompt injection, tricking the AI agent into executing malicious code or commands.
First reported: 10.02.2026 23:491 source, 1 articleShow sources
- Patch Tuesday, February 2026 Edition — krebsonsecurity.com — 10.02.2026 23:49
-
Microsoft's February 2026 Patch Tuesday addresses 59 vulnerabilities, including 6 actively exploited zero-days and 3 publicly disclosed flaws.
First reported: 11.02.2026 12:221 source, 1 articleShow sources
- Microsoft Patches 59 Vulnerabilities Including Six Actively Exploited Zero-Days — thehackernews.com — 11.02.2026 12:22
-
The updates include fixes for 5 critical vulnerabilities, 3 of which are security feature bypass flaws and 2 are information disclosure flaws.
First reported: 11.02.2026 12:221 source, 1 articleShow sources
- Microsoft Patches 59 Vulnerabilities Including Six Actively Exploited Zero-Days — thehackernews.com — 11.02.2026 12:22
-
The zero-days include CVE-2026-21510 (Windows Shell Security Feature Bypass), CVE-2026-21513 (MSHTML Framework Security Feature Bypass), CVE-2026-21514 (Microsoft Word Security Feature Bypass), CVE-2026-21519 (Desktop Window Manager Elevation of Privilege), CVE-2026-21525 (Windows Remote Access Connection Manager Denial of Service), and CVE-2026-21533 (Windows Remote Desktop Services Elevation of Privilege).
First reported: 11.02.2026 12:221 source, 1 articleShow sources
- Microsoft Patches 59 Vulnerabilities Including Six Actively Exploited Zero-Days — thehackernews.com — 11.02.2026 12:22
-
Microsoft has begun rolling out updated Secure Boot certificates to replace expiring 2011 certificates.
First reported: 11.02.2026 12:221 source, 1 articleShow sources
- Microsoft Patches 59 Vulnerabilities Including Six Actively Exploited Zero-Days — thehackernews.com — 11.02.2026 12:22
-
Other vendors, including Adobe, BeyondTrust, CISA, Cisco, Fortinet, Google, n8n, and SAP, have also released security updates or advisories.
First reported: 11.02.2026 12:221 source, 1 articleShow sources
- Microsoft Patches 59 Vulnerabilities Including Six Actively Exploited Zero-Days — thehackernews.com — 11.02.2026 12:22
-
Microsoft issued an out-of-band patch for CVE-2026-21514, a security feature bypass vulnerability in Microsoft Word.
First reported: 11.02.2026 12:221 source, 1 articleShow sources
- Microsoft Patches 59 Vulnerabilities Including Six Actively Exploited Zero-Days — thehackernews.com — 11.02.2026 12:22
-
CVE-2026-2150 allows attackers to bypass Windows Shell and Windows SmartScreen protections.
First reported: 11.02.2026 12:221 source, 1 articleShow sources
- Microsoft Patches 59 Vulnerabilities Including Six Actively Exploited Zero-Days — thehackernews.com — 11.02.2026 12:22
-
CVE-2026-21513 affects Microsoft's MSHTML framework, enabling attackers to execute malicious HTML files.
First reported: 11.02.2026 12:221 source, 1 articleShow sources
- Microsoft Patches 59 Vulnerabilities Including Six Actively Exploited Zero-Days — thehackernews.com — 11.02.2026 12:22
-
CVE-2026-21525 in Windows Remote Access Connection Manager allows attackers to trigger denial-of-service conditions locally.
First reported: 11.02.2026 12:221 source, 1 articleShow sources
- Microsoft Patches 59 Vulnerabilities Including Six Actively Exploited Zero-Days — thehackernews.com — 11.02.2026 12:22
-
Microsoft assessed five other CVEs as bugs that attackers are "more likely" to exploit.
First reported: 11.02.2026 12:221 source, 1 articleShow sources
- Microsoft Patches 59 Vulnerabilities Including Six Actively Exploited Zero-Days — thehackernews.com — 11.02.2026 12:22
-
Microsoft issued several out-of-band security updates since January’s Patch Tuesday, including a fix for a credential prompt failure in remote desktop connections on January 17 and a patch for a zero-day security feature bypass vulnerability (CVE-2026-21509) in Microsoft Office on January 26.
First reported: 11.02.2026 12:221 source, 1 articleShow sources
- Microsoft Patches 59 Vulnerabilities Including Six Actively Exploited Zero-Days — thehackernews.com — 11.02.2026 12:22
-
This month’s Patch Tuesday includes several fixes for remote code execution vulnerabilities affecting GitHub Copilot and multiple integrated development environments (IDEs), including VS Code, Visual Studio, and JetBrains products. The relevant CVEs are CVE-2026-21516, CVE-2026-21523, and CVE-2026-21256.
First reported: 11.02.2026 12:221 source, 1 articleShow sources
- Microsoft Patches 59 Vulnerabilities Including Six Actively Exploited Zero-Days — thehackernews.com — 11.02.2026 12:22
-
The AI vulnerabilities Microsoft patched this month stem from a command injection flaw that can be triggered through prompt injection, tricking the AI agent into executing malicious code or commands.
First reported: 11.02.2026 12:221 source, 1 articleShow sources
- Microsoft Patches 59 Vulnerabilities Including Six Actively Exploited Zero-Days — thehackernews.com — 11.02.2026 12:22
Similar Happenings
Cisco Unified Communications RCE Zero-Day Exploited in Attacks
Cisco has patched a critical remote code execution vulnerability (CVE-2026-20045) in its Unified Communications and Webex Calling products, which has been actively exploited in attacks. The flaw, with a CVSS score of 8.2, allows attackers to gain user-level access and escalate privileges to root on affected systems. Cisco has released patches for various versions of the impacted products and urged customers to update immediately. The U.S. CISA has added the vulnerability to its KEV Catalog, requiring federal agencies to patch by February 11, 2026.
Microsoft January 2026 Patch Tuesday Addresses 3 Zero-Days, 114 Flaws
Microsoft's January 2026 Patch Tuesday addressed 114 vulnerabilities, including three zero-days: one actively exploited (CVE-2026-20805) and two publicly disclosed (CVE-2026-21265 and CVE-2023-31096). The updates covered a range of flaw types, with eight classified as 'Critical,' including remote code execution and elevation-of-privilege vulnerabilities. Additionally, Microsoft released emergency out-of-band security updates to patch a high-severity Microsoft Office zero-day vulnerability (CVE-2026-21509) exploited in attacks, affecting multiple Office versions. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added CVE-2026-20805 and CVE-2026-21509 to its Known Exploited Vulnerabilities (KEV) catalog, mandating Federal Civilian Executive Branch (FCEB) agencies to apply the latest fixes by February 3, 2026, and February 16, 2026, respectively. The flaw was discovered by the Microsoft Threat Intelligence Center (MSTIC), the Microsoft Security Response Center (MSRC), and the Office Product Group Security Team, and affects several versions of Microsoft Office 2016, 2019, LTSC 2021, LTSC 2024, and Microsoft 365 Apps for Enterprise.
Critical RCE Flaw in Trend Micro Apex Central On-Prem Windows
Trend Micro has addressed critical vulnerabilities in on-premise Windows versions of Apex Central, including a remote code execution (RCE) flaw (CVE-2025-69258) with a CVSS score of 9.8. The flaw allows unauthenticated remote attackers to execute arbitrary code under SYSTEM context. Two additional flaws (CVE-2025-69259, CVE-2025-69260) with CVSS scores of 7.5 each can cause denial-of-service conditions. The vulnerabilities affect versions below Build 7190 and require physical or remote access to exploit. Apex Central is a web-based management console that helps admins manage multiple Trend Micro products and services, including antivirus, content security, and threat detection. Trend Micro has released Critical Patch Build 7190 to address these vulnerabilities.
Microsoft December 2025 Patch Tuesday addresses 3 zero-days, 56 flaws
Microsoft's December 2025 Patch Tuesday addresses 56 vulnerabilities, including three zero-days. One zero-day (CVE-2025-62221) is actively exploited, allowing privilege escalation in Windows Cloud Files Mini Filter Driver. Two other zero-days (CVE-2025-64671, CVE-2025-54100) are publicly disclosed, affecting GitHub Copilot for JetBrains and PowerShell. The updates also fix 3 critical remote code execution vulnerabilities. Additionally, Microsoft released the KB5071546 extended security update for Windows 10 Enterprise LTSC and ESU program participants, addressing the same vulnerabilities and updating Windows 10 to build 19045.6691 and Windows 10 Enterprise LTSC 2021 to build 19044.6691. The update includes a fix for CVE-2025-54100, a remote code execution zero-day vulnerability in PowerShell, and introduces a confirmation prompt with a security warning for script execution risk when using the Invoke-WebRequest command in PowerShell 5.1. Microsoft patched a total of 1,275 CVEs in 2025, according to data compiled by Fortra. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added CVE-2025-62221 to the Known Exploited Vulnerabilities (KEV) catalog, mandating FCEB agencies to apply the patch by December 30, 2025. The remaining two zero-days, CVE-2025-54100 and CVE-2025-64671, are part of a broader set of security vulnerabilities collectively named IDEsaster, affecting multiple AI coding platforms.
Google Patches Two Exploited Android Framework Vulnerabilities
Google released December 2025 Android security updates addressing 107 vulnerabilities, including two Framework bugs (CVE-2025-48633, CVE-2025-48572) actively exploited in limited, targeted attacks. The updates also fixed a critical Framework flaw (CVE-2025-48631) enabling remote DoS without additional privileges. Patches are available in two levels (2025-12-01, 2025-12-05) for faster manufacturer adoption. The vulnerabilities affect Android versions 13, 14, 15, and 16, and the patches will address 56 additional vulnerabilities affecting Android components in the kernel or third-party components. Similar flaws in the past were used for targeted exploitation by commercial spyware or nation-state operations targeting a small number of high-interest individuals. The updates address four critical-severity fixes for elevation-of-privilege flaws in the Kernel's Pkvm and UOMMU subcomponents, and two critical fixes for Qualcomm-powered devices (CVE-2025-47319 and CVE-2025-47372). Samsung published its security bulletin, including ported fixes from the Google update and vendor-specific fixes. Devices on Android 10 and later may receive some crucial fixes via Google Play system updates. Play Protect can detect and block documented malware and attack chains, so users of any Android version should keep the component up to date and active.