Microsoft Patches 59 Vulnerabilities Including Six Actively Exploited Zero-Days


Microsoft has released its February 2026 Patch Tuesday security updates to fix 59 software vulnerabilities, including six zero-day flaws that have been exploited in the wild. These updates cover Windows, Office, Azure services, and other core Microsoft products.

The flaws span a broad range of risk types. Elevation of privilege bugs make up the largest group, followed by remote code execution, spoofing, information disclosure, denial-of-service, and cross-site scripting issues.

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added all six of the exploited vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog, requiring federal civilian agencies to apply patches by March 3, 2026.

Actively Exploited Zero-Day Vulnerabilities Patched

Microsoft identified six zero-day vulnerabilities that were actively targeted before fixes became available. Some were already publicly disclosed prior to patch release.

CVE IdentifierTypeImpact
CVE-2026-21510Security feature bypassExploits Windows Shell and SmartScreen protection prompts
CVE-2026-21513Security feature bypassAffects MSHTML framework used in web content rendering
CVE-2026-21514Security feature bypassBypasses protections in Microsoft Word
CVE-2026-21519Elevation of privilegeDesktop Window Manager privilege escalation
CVE-2026-21533Elevation of privilegeWindows Remote Desktop Services privilege escalation
CVE-2026-21525Denial of serviceWindows Remote Access Connection Manager DoS

These flaws range from security feature bypasses that let attackers trick systems into running harmful content to elevation of privilege and denial-of-service bugs that can help attackers deepen their control of a compromised system.

Expert Commentary on Exploited Flaws

Security researchers are sounding urgent warnings about the impact of these bugs if left unpatched.

“Security feature bypass vulnerabilities significantly increase the success rate of phishing and malware campaigns,” said Jack Bicer, director of vulnerability research at Action1. “In enterprise environments, this flaw can lead to unauthorized code execution, malware deployment, credential theft, and system compromise.”

Experts note that some of these vulnerabilities, like the MSHTML security bypass, affect components still found in many corporate environments and are frequently targeted through email and web-based social engineering.

Full Patch Breakdown Across Products

The 59 vulnerabilities fixed in this update include a mix of severity levels and affected products:

  • Elevation of Privilege: 25
  • Remote Code Execution: 12
  • Security Feature Bypass: 5
  • Spoofing: 7
  • Information Disclosure: 6
  • Denial-of-Service: 3
  • Cross-Site Scripting: 1

These issues were found across a variety of Microsoft products, including Windows, Office suite components, and cloud platforms such as Azure.

New Secure Boot Certificates and System Protections

Alongside the vulnerability patches, Microsoft is rolling out updated Secure Boot certificates. These new certificates replace the original 2011 certificates set to expire in June 2026. If a device does not receive the updated certificates, it will still boot but will operate in a degraded security state, which could leave it open to future boot-level attacks.

Microsoft explained the reasoning behind this update:
“With this update, Windows quality updates include a broad set of targeting data that identifies devices and their ability to receive new Secure Boot certificates. Devices will receive the new certificates only after they show sufficient successful update signals, which helps ensure a safe and phased rollout,” the company said in its update notes.

The Secure Boot enhancements are part of a broader effort to strengthen Windows integrity at boot time and protect against low-level attacks before the operating system loads.

Windows Baseline Security Mode and User Transparency

Microsoft is also enhancing default protections through initiatives designed to improve runtime integrity and user control.

Windows Baseline Security Mode aims to enable runtime integrity safeguards by default, which allow only properly signed applications to run, reducing risk from tampered or unauthorized software.

User Transparency and Consent will introduce clearer prompts when applications request access to sensitive resources like files or cameras. Microsoft said these changes are intended to give users and administrators better visibility and control over app behavior.

“These prompts are designed to be clear and actionable, and you’ll always have the ability to review and change your choices later,” said Logan Iyer, Distinguished Engineer at Microsoft.

These protections mirror modern consent systems seen in other operating systems, providing a more consistent user experience while maintaining security.

FAQ: February 2026 Patch Tuesday

Q: How many vulnerabilities did Microsoft fix this month?

Microsoft patched 59 vulnerabilities in its February 2026 updates.

Q: How many zero-days were included?

There were six actively exploited zero-day vulnerabilities addressed.

Q: What does ‘security feature bypass’ mean?

A security feature bypass allows attackers to evade built-in protections, such as SmartScreen or OLE mitigations, often by tricking users into opening malicious content.

Q: Are these vulnerabilities being exploited now?

Yes. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added all six to its Known Exploited Vulnerabilities (KEV) catalog, indicating real-world exploitation.

Q: What should organizations do?

Install the February Patch Tuesday updates immediately, update Secure Boot certificates, and review systems for any unusual activity or signs of compromise.

Readers help support VPNCentral. We may get a commission if you buy through our links. Tooltip Icon

Read our disclosure page to find out how can you help VPNCentral sustain the editorial team Read more

User forum

0 messages