Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Six New Microsoft Vulnerabilities Added to CISA’s KEV List

Six New Microsoft Vulnerabilities Added to CISA’s KEV List

Posted on February 11, 2026 By CWS

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has expanded its Known Exploited Vulnerabilities (KEV) Catalog by including six zero-day vulnerabilities targeting Microsoft products. This urgent update highlights the ongoing threats posed by nation-state actors and cybercriminals taking advantage of these security gaps. Under Binding Operational Directive (BOD) 22-01, Federal Civilian Executive Branch (FCEB) agencies are required to implement patches by CISA’s set deadlines, while all organizations are encouraged to prioritize remediation to reduce widespread risks.

Understanding the KEV Catalog

Established in 2022 through BOD 22-01, the KEV Catalog is a curated list of Common Vulnerabilities and Exposures (CVEs) that represent a significant risk to federal networks. The catalog is updated based on evidence of active exploitation, sourced from vendor reports, threat intelligence, and incident response activities. The inclusion of these six vulnerabilities emphasizes the persistent security challenges within the Microsoft ecosystem, which are exploited for malicious activities such as ransomware attacks, espionage, and unauthorized network access.

Details of the New Vulnerabilities

The newly added vulnerabilities include CVE-2026-21510, which affects the Windows Shell, potentially allowing attackers to bypass security mechanisms for remote code execution. Similarly, CVE-2026-21513 involves the MSHTML engine, enabling security feature bypasses despite Internet Explorer’s deprecation. CVE-2026-21514 highlights issues in Microsoft Word, where incorrect parsing of untrusted inputs can lead to privilege escalation.

Additionally, CVE-2026-21519 pertains to type confusion in the Desktop Window Manager, facilitating local privilege escalation, while CVE-2026-21525 deals with a NULL pointer dereference in the Remote Access Connection Manager, causing denial-of-service conditions. Lastly, CVE-2026-21533 involves a flaw in Windows Remote Desktop Services, which can allow privilege escalation by granting attackers administrative rights on compromised systems.

Response and Mitigation Strategies

Microsoft has released patches for these vulnerabilities as part of its February 2026 security updates, verifying public exploitation evidence. Organizations should apply these patches through Windows Server Update Services (WSUS) or Intune, and enable automatic updates to ensure timely protection. Detection strategies include hunting for Indicators of Compromise (IOCs) using Endpoint Detection and Response (EDR) solutions, with emerging YARA rules available on GitHub for identifying exploit patterns.

Mitigation measures should include enforcing AppLocker policies, disabling unused Remote Desktop Services, and auditing Office macros. Network segmentation based on Zero Trust principles is also recommended. For long-term security enhancement, organizations are advised to adopt EDR solutions with behavioral analytics and conduct red-team exercises to simulate potential attack scenarios involving these KEV vulnerabilities.

The KEV Catalog now contains over 1,200 entries and is updated weekly. Organizations neglecting these vulnerabilities face increased risks of breaches similar to the 2025 Change Healthcare incident, which was attributed to unpatched KEVs. Stay informed on cybersecurity updates by following us on Google News, LinkedIn, and X. Contact us to feature your cybersecurity stories.

Cyber Security News Tags:CISA, Cybersecurity, FCEB, incident response, KEV catalog, Microsoft, network security, patch management, Ransomware, software updates, threat intelligence, zero-day vulnerabilities

Post navigation

Previous Post: Fortinet Addresses Critical Security Flaws in Latest Update
Next Post: Intel and AMD Patch Over 80 Vulnerabilities in February

Related Posts

Microsoft Windows 11 Insider Preview Build 26200.5600 Released Microsoft Windows 11 Insider Preview Build 26200.5600 Released Cyber Security News
Threat Actors Leverages DeepSeek-R1 Popularity to Attack Users Running Windows Devices Threat Actors Leverages DeepSeek-R1 Popularity to Attack Users Running Windows Devices Cyber Security News
PoC Exploit Released for Fortinet 0-Day Vulnerability that Allows Remote Code Execution PoC Exploit Released for Fortinet 0-Day Vulnerability that Allows Remote Code Execution Cyber Security News
Critical Windows Flaw Allows SYSTEM Level Access Critical Windows Flaw Allows SYSTEM Level Access Cyber Security News
Darknet Market Archetyp Dismantled by Authorities in Joint Action ‘Operation Deep Sentinel’ Darknet Market Archetyp Dismantled by Authorities in Joint Action ‘Operation Deep Sentinel’ Cyber Security News
Key Cybersecurity Vendors to Watch at RSA 2026 Key Cybersecurity Vendors to Watch at RSA 2026 Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Top Fraud Detection Tools for 2026
  • Microsoft Urges Action on Critical Windows Updates
  • Citrix NetScaler Threat: Immediate Action Required
  • Iranian Hackers Compromise FBI Director’s Email, Attack Stryker
  • Stocks in Cybersecurity Dip as Anthropic Tests Cutting-Edge AI

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Top Fraud Detection Tools for 2026
  • Microsoft Urges Action on Critical Windows Updates
  • Citrix NetScaler Threat: Immediate Action Required
  • Iranian Hackers Compromise FBI Director’s Email, Attack Stryker
  • Stocks in Cybersecurity Dip as Anthropic Tests Cutting-Edge AI

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark