Microsoft Patches 6 Actively Exploited Zero-Days in February Patch Tuesday
Microsoft's February 2026 Patch Tuesday addresses 58 vulnerabilities including six actively exploited zero-days affecting Windows, Office, and other core products.
Microsoft released its February 2026 Patch Tuesday updates addressing 58 security vulnerabilities, with six confirmed as actively exploited zero-days. The combination of active exploitation and public disclosure makes this an urgent patch cycle for Windows administrators.
The Six Actively Exploited Vulnerabilities
CVE-2026-21510 and CVE-2026-21513 are security feature bypass vulnerabilities affecting Windows Shell and the MSHTML Framework respectively. Both were publicly disclosed and exploited in the wild before patches became available. CVE-2026-21514 affects Microsoft Word, allowing attackers to bypass security features through specially crafted documents.
Three elevation of privilege vulnerabilities round out the list: CVE-2026-21519 in Desktop Window Manager, CVE-2026-21533 in Windows Remote Desktop Services (reported by CrowdStrike researchers), and CVE-2026-21525 in Windows Remote Access Connection Manager. The latter was discovered by the 0patch research team after finding an exploit in a public malware repository.
Widespread Impact
The vulnerabilities affect multiple Windows versions and core Microsoft applications. The presence of exploits in public malware repositories and active targeting by threat actors underscores the urgency of applying these patches. Security researchers note that attackers are increasingly chaining multiple vulnerabilities together to achieve deeper system compromise.
Deployment Priority
Organizations should prioritize deployment of these updates, particularly for systems exposed to the internet or used by high-value targets. The active exploitation of these flaws means attackers already have working exploits, making unpatched systems immediately vulnerable to attack.
Related Articles
Cloudflare 2026 Threat Report: 230 Billion Daily Blocked Threats and the Rise of Credential Attacks
Cloudflare has published its inaugural annual threat report revealing the company blocks over 230 billion threats daily across 20% of global web traffic. DDoS attacks doubled year-over-year to 47.1 million incidents, with the largest reaching a record 31.4 Tbps, while bots now account for 94% of all login attempts.
HashiCorp Patches Consul Arbitrary File Read Vulnerability in Kubernetes Auth
HashiCorp has released emergency patches for Consul to address CVE-2026-2808, a medium-severity vulnerability allowing arbitrary file reads when Kubernetes authentication is enabled. The fix also adds HTTP server timeouts to prevent Slowloris denial-of-service attacks against Consul agent endpoints.
Let's Encrypt Now Issues Six-Day Certificates and IP Address Certificates via Certbot
Let's Encrypt and the EFF have announced support for six-day (160-hour) certificates and IP address certificates through Certbot 5.3 and 5.4. The ultra-short-lived certificates reduce the impact window of compromised keys by design, while IP address certificates enable HTTPS for services identified by address rather than hostname.