Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Microsoft Addresses Six Zero-Day Vulnerabilities in February 2026 Update

Microsoft Addresses Six Zero-Day Vulnerabilities in February 2026 Update

Posted on February 10, 2026 By CWS

Microsoft has reinforced its security measures with the February 2026 Patch Tuesday updates, addressing a total of approximately 60 vulnerabilities. Notably, the updates include fixes for six zero-day vulnerabilities that have been actively exploited, marking a significant step in safeguarding its products.

Details of the Zero-Day Vulnerabilities

The identified zero-day vulnerabilities cover a range of Microsoft products. CVE-2026-21510 is a bypass for Windows SmartScreen and Windows Shell security prompts, exploitable via malicious links. CVE-2026-21514 affects Microsoft 365 and Office by allowing OLE mitigation bypass. Internet Explorer is compromised by CVE-2026-21513, which can be exploited through malicious HTML or LNK files.

Further threats include CVE-2026-21519, linked to Windows Desktop Window Manager for privilege escalation, and CVE-2026-21533, which impacts Windows Remote Desktop Services with potential for privilege escalation to System level. Lastly, CVE-2026-21525 presents a local DoS attack risk via Windows Remote Access Connection Manager.

Discovery and Reporting

Microsoft has acknowledged contributions from various security teams in identifying these vulnerabilities. Google Threat Intelligence Group (GTIG) and Microsoft jointly discovered CVE-2026-21510 and CVE-2026-21514, while CVE-2026-21513 was also a collaborative effort. Microsoft researchers found CVE-2026-21519, with CrowdStrike credited for CVE-2026-21533 and Acros Security for CVE-2026-21525.

These discoveries suggest potential exploitation by similar threat actors, possibly linked to campaigns involving commercial spyware vendors and nation-state hackers. Despite minimal public information on active exploits, the vulnerabilities are flagged as ‘publicly disclosed’ in Microsoft’s advisories.

Comprehensive Patching Efforts

Alongside zero-day fixes, the February 2026 updates address vulnerabilities across Microsoft’s ecosystem, including Azure, Windows Defender, Exchange Server, .NET, GitHub Copilot, Edge, and Power BI. These comprehensive measures reflect Microsoft’s ongoing commitment to enhancing product security.

SecurityWeek has reached out to Acros and CrowdStrike for further insights into potential exploitations of these zero-days and will provide updates as more information becomes available.

The proactive measures taken by Microsoft underscore the importance of timely updates in combating emerging cybersecurity threats, ensuring user protection against sophisticated cyber attacks.

Security Week News Tags:Cybersecurity, Exploit, Microsoft, Office, Patch, security update, Threat Actors, Vulnerabilities, Windows, zero-day

Post navigation

Previous Post: Microsoft’s February 2026 Update Fixes 54 Vulnerabilities
Next Post: Critical XSS Flaw in FortiSandbox Enables Remote Attacks

Related Posts

160,000 Impacted by Wayne Memorial Hospital Data Breach 160,000 Impacted by Wayne Memorial Hospital Data Breach Security Week News
Critical Oracle Identity Manager Flaw Possibly Exploited as Zero-Day Critical Oracle Identity Manager Flaw Possibly Exploited as Zero-Day Security Week News
Scattered Spider Targeting VMware vSphere Environments Scattered Spider Targeting VMware vSphere Environments Security Week News
Militant Groups Are Experimenting With AI, and the Risks Are Expected to Grow Militant Groups Are Experimenting With AI, and the Risks Are Expected to Grow Security Week News
Mercedes F1 Team Principal Toto Wolff Sells 15% Stake to CrowdStrike CEO George Kurtz Mercedes F1 Team Principal Toto Wolff Sells 15% Stake to CrowdStrike CEO George Kurtz Security Week News
Ramnit Malware Infections Spike in OT as Evidence Suggests ICS Shift Ramnit Malware Infections Spike in OT as Evidence Suggests ICS Shift Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News