Over 60 Software Vendors Release Security Fixes Across Operating Systems, Cloud, and Network Platforms


This week’s global security update wave saw more than 60 software vendors issue important patches to fix vulnerabilities across a wide range of technology stacks. These updates affect major operating systems, cloud services, network infrastructure, productivity software, and enterprise tools. The collective effort underscores the scale and complexity of modern IT environments and the need for ongoing vulnerability management.

Leading the updates, Microsoft rolled out its February 2026 Patch Tuesday security bundle, which includes dozens of fixes for Windows, Office, Azure, and other Microsoft products. The company also addressed six zero-day vulnerabilities that have been actively exploited in the wild.

Microsoft Patch Tuesday: Scope and Risk

Microsoft’s February update fixes approximately 60 vulnerabilities in Windows and related products, including six that were identified as actively exploited by attackers prior to the release. These zero-days affect core components such as Windows Shell, MSHTML, Word, Desktop Window Manager, Remote Access services, and Remote Desktop Services.

Security researchers note that several of these flaws were publicly disclosed before the patch, raising the urgency for enterprises to apply the updates quickly.

“To successfully exploit this vulnerability, an attacker must convince a user to open a malicious link or shortcut file,” Microsoft explained in its advisory for one of the zero-day flaws, referring to CVE-2026-21510.

The six actively exploited zero-days in Microsoft’s February release include:

CVETypePotential Impact
CVE-2026-21510Security feature bypassBypass Windows SmartScreen and Shell prompts
CVE-2026-21513Security feature bypassMSHTML bypass, potential code execution
CVE-2026-21514Security feature bypassOffice OLE mitigations bypass
CVE-2026-21519Privilege escalationDesktop Window Manager
CVE-2026-21533Privilege escalationRemote Desktop Services
CVE-2026-21525Denial of ServiceRemote Access Connection Manager

This Patch Tuesday also marked the start of a phased rollout of updated Secure Boot certificates, which will replace the originals from 2011 due to expiration later in 2026. Microsoft said this rollout will happen gradually to ensure compatibility and minimize disruption.

Adobe and Other Major Vendors Also Patch

Beyond Microsoft, Adobe released security updates for multiple applications, including Audition, After Effects, InDesign Desktop, Substance 3D apps, Bridge, Lightroom Classic, and its DNG SDK. Adobe said it is not aware of exploitation in the wild for the patched flaws.

SAP also published fixes for two critical vulnerabilities that could have serious impacts on enterprise systems:

  • CVE-2026-0488 (CVSS 9.9) — A SQL injection vulnerability in SAP CRM and SAP S/4HANA that allows authenticated attackers to execute arbitrary SQL commands.
  • CVE-2026-0509 (CVSS 9.6) — A missing authorization check in SAP NetWeaver Application Server that permits certain background Remote Function Calls without required permissions.

On the hardware side, Intel and Google collaborated on auditing Trust Domain Extensions (TDX) 1.5, uncovering multiple issues that affect confidential computing features. Google said that while the new features bring enhanced functionality, they also increase the complexity of highly privileged components in the trust base, requiring careful review.

Software Patches From Other Vendors

In addition to updates from Microsoft, Adobe, and SAP, a wide range of companies have issued patches for security flaws in recent weeks. These include industry leaders across enterprise and consumer tech:

  • Cloud and Infrastructure: AWS, Google Cloud
  • Hardware and Chipsets: AMD, Intel, NVIDIA, MediaTek, Qualcomm
  • Networking and Security: Cisco, Fortinet, Check Point, F5
  • Operating Systems and Platforms: Apple, Linux distributions (AlmaLinux, Ubuntu, Red Hat)
  • Application and Dev Tools: GitLab, Spring Framework, Mozilla Firefox
  • Endpoint and Enterprise Services: Citrix, Commvault, Splunk, Zoho ManageEngine
  • Peripherals and Devices: Samsung, HP, Lenovo, ASUS, Canon, Ricoh
  • Industrial and IoT: ABB, Schneider Electric, Rockwell Automation
  • Storage and NAS: QNAP, Synology
  • User Applications: Zoom, Chrome, Google Android and Pixel |

These updates range from critical patches for remote code execution to fixes for privilege escalation, information disclosure, spoofing, and denial-of-service vulnerabilities.

Enterprise Risk and Mitigation

The volume and variety of patches highlight the broad attack surface that modern enterprises must defend. Vulnerabilities can be found in everything from cloud infrastructure and operating systems to productivity software and industrial control systems.

Actionable steps for enterprise security teams:

  • Prioritize critical and actively exploited flaws such as the Microsoft zero-days.
  • Implement automated patch management and testing across systems and platforms.
  • Monitor for unusual behavior following updates to detect regressions or misconfigurations.
  • Review identity and access configurations in cloud services to prevent privilege escalation.
  • Leverage threat intelligence feeds to understand exploitation trends.

Timely patching is one of the most effective defenses against both opportunistic attackers and targeted threat actors.

FAQ: Global Software Patch Wave (February 2026)

Q: How many vendors issued security fixes this cycle?

More than 60 vendors released updates covering OS, cloud, and network platforms.

Q: What was the biggest risk in Microsoft’s patch update?

Six actively exploited zero-day flaws were patched, affecting core Windows components and services.

Q: Are Adobe’s updates addressing active exploitation?

No. Adobe said it is not aware of any in-the-wild exploitation for the vulnerabilities it fixed.

Q: Should enterprises act immediately on these patches?

Yes. Patches that fix zero-days and critical vulnerabilities should be deployed quickly as part of a structured patch management strategy.

Q: What is the Secure Boot certificate update?

Microsoft has begun rolling out updated Secure Boot certificates that will replace the 2011 certificates set to expire in 2026, protecting systems at the firmware level.

Readers help support VPNCentral. We may get a commission if you buy through our links. Tooltip Icon

Read our disclosure page to find out how can you help VPNCentral sustain the editorial team Read more

User forum

0 messages