Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Six New Microsoft Vulnerabilities Added to CISA’s KEV List

Six New Microsoft Vulnerabilities Added to CISA’s KEV List

Posted on February 11, 2026 By CWS

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has expanded its Known Exploited Vulnerabilities (KEV) Catalog by including six zero-day vulnerabilities targeting Microsoft products. This urgent update highlights the ongoing threats posed by nation-state actors and cybercriminals taking advantage of these security gaps. Under Binding Operational Directive (BOD) 22-01, Federal Civilian Executive Branch (FCEB) agencies are required to implement patches by CISA’s set deadlines, while all organizations are encouraged to prioritize remediation to reduce widespread risks.

Understanding the KEV Catalog

Established in 2022 through BOD 22-01, the KEV Catalog is a curated list of Common Vulnerabilities and Exposures (CVEs) that represent a significant risk to federal networks. The catalog is updated based on evidence of active exploitation, sourced from vendor reports, threat intelligence, and incident response activities. The inclusion of these six vulnerabilities emphasizes the persistent security challenges within the Microsoft ecosystem, which are exploited for malicious activities such as ransomware attacks, espionage, and unauthorized network access.

Details of the New Vulnerabilities

The newly added vulnerabilities include CVE-2026-21510, which affects the Windows Shell, potentially allowing attackers to bypass security mechanisms for remote code execution. Similarly, CVE-2026-21513 involves the MSHTML engine, enabling security feature bypasses despite Internet Explorer’s deprecation. CVE-2026-21514 highlights issues in Microsoft Word, where incorrect parsing of untrusted inputs can lead to privilege escalation.

Additionally, CVE-2026-21519 pertains to type confusion in the Desktop Window Manager, facilitating local privilege escalation, while CVE-2026-21525 deals with a NULL pointer dereference in the Remote Access Connection Manager, causing denial-of-service conditions. Lastly, CVE-2026-21533 involves a flaw in Windows Remote Desktop Services, which can allow privilege escalation by granting attackers administrative rights on compromised systems.

Response and Mitigation Strategies

Microsoft has released patches for these vulnerabilities as part of its February 2026 security updates, verifying public exploitation evidence. Organizations should apply these patches through Windows Server Update Services (WSUS) or Intune, and enable automatic updates to ensure timely protection. Detection strategies include hunting for Indicators of Compromise (IOCs) using Endpoint Detection and Response (EDR) solutions, with emerging YARA rules available on GitHub for identifying exploit patterns.

Mitigation measures should include enforcing AppLocker policies, disabling unused Remote Desktop Services, and auditing Office macros. Network segmentation based on Zero Trust principles is also recommended. For long-term security enhancement, organizations are advised to adopt EDR solutions with behavioral analytics and conduct red-team exercises to simulate potential attack scenarios involving these KEV vulnerabilities.

The KEV Catalog now contains over 1,200 entries and is updated weekly. Organizations neglecting these vulnerabilities face increased risks of breaches similar to the 2025 Change Healthcare incident, which was attributed to unpatched KEVs. Stay informed on cybersecurity updates by following us on Google News, LinkedIn, and X. Contact us to feature your cybersecurity stories.

Cyber Security News Tags:CISA, Cybersecurity, FCEB, incident response, KEV catalog, Microsoft, network security, patch management, Ransomware, software updates, threat intelligence, zero-day vulnerabilities

Post navigation

Previous Post: Fortinet Addresses Critical Security Flaws in Latest Update
Next Post: Intel and AMD Patch Over 80 Vulnerabilities in February

Related Posts

New Zip Slip Vulnerability Allows Attackers to Manipulate ZIP Files During Decompression New Zip Slip Vulnerability Allows Attackers to Manipulate ZIP Files During Decompression Cyber Security News
Microsoft Edge Fixes Actively Exploited Chromium Vulnerability Microsoft Edge Fixes Actively Exploited Chromium Vulnerability Cyber Security News
Django Critical Vulnerability Let attackers Execute Malicious SQL Code on Web Servers Django Critical Vulnerability Let attackers Execute Malicious SQL Code on Web Servers Cyber Security News
Threat Actors Using AI Generated Malicious Job Offers to Deploy PureRAT Threat Actors Using AI Generated Malicious Job Offers to Deploy PureRAT Cyber Security News
CISA Warns of Federal Agencies Not Fully Patching Actively Exploited Cisco ASA or Firepower Devices CISA Warns of Federal Agencies Not Fully Patching Actively Exploited Cisco ASA or Firepower Devices Cyber Security News
Red Hat Openshift AI Service Vulnerability Allow Attackers to Take Control of the Infrastructure Red Hat Openshift AI Service Vulnerability Allow Attackers to Take Control of the Infrastructure Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News