Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Windows Notepad Vulnerability Fixed in February Update

Windows Notepad Vulnerability Fixed in February Update

Posted on February 20, 2026 By CWS

Microsoft has addressed a critical security flaw in the Windows Notepad application as part of its February 2026 Patch Tuesday updates. This vulnerability, identified as CVE-2026-20841, poses a significant risk due to its potential for remote code execution.

Discovery and Analysis of the Flaw

The vulnerability was initially discovered by researchers Cristian Papa and Alasdair Gorniak from Delta Obscura, and further analyzed by the TrendAI Research team, including Nikolai Skliarenko and Yazhi Wang. It involves a command injection flaw that can lead to the execution of arbitrary commands on a victim’s computer.

Exploiting this vulnerability requires tricking a user into opening a malicious Markdown file and clicking on a harmful hyperlink, which allows attackers to run commands under the user’s security context.

Technical Details and Impact

The modern Windows Notepad, which is distributed via the Microsoft Store, supports rendering for Markdown files with the .md extension. When such files are opened, Notepad processes their contents and renders links interactively. The flaw is present in the function sub_140170F60(), which interacts with the Windows API call ShellExecuteExW().

This function inadequately filters input, failing to block dangerous protocol URIs like file:// and ms-appinstaller://, which can be used to execute remote or local files without standard security warnings. The vulnerability affects Notepad versions 11.2508 and earlier.

Mitigation and Recommendations

Microsoft has issued a fix for this flaw in Notepad build 11.2510 and later, available through the Microsoft Store. It is crucial for organizations to enable automatic updates and ensure compliance with the latest versions to mitigate potential risks from this vulnerability.

The Zero Day Initiative outlines that exploiting this flaw typically involves delivering a manipulated file via email or social engineering tactics and convincing the user to open it in Notepad. While .md files are not typically associated with Notepad, manual opening triggers Markdown rendering.

There are currently no workarounds for this flaw, and user interaction is required for exploitation. Therefore, users should remain vigilant and update their systems promptly.

For ongoing cybersecurity updates, follow us on Google News, LinkedIn, and X. Contact us to share your cybersecurity stories and insights.

Cyber Security News Tags:CVE-2026-20841, Cybersecurity, GitHub, Markdown, Microsoft, Notepad, Patch Tuesday, protocol handlers, remote code execution, security update, ShellExecuteExW, Vulnerability, Zero Day Initiative

Post navigation

Previous Post: Ransomware Attack Targets Advantest’s Network
Next Post: Critical BeyondTrust Flaw Exploited by Hackers

Related Posts

Lampion Banking Malware Employs ClickFix Lures To Steal Banking Information Lampion Banking Malware Employs ClickFix Lures To Steal Banking Information Cyber Security News
M-Files Vulnerability Let Attacker Capture Session Tokens of Other Active Users M-Files Vulnerability Let Attacker Capture Session Tokens of Other Active Users Cyber Security News
Microsoft PlayReady DRM Used by Netflix, Amazon, and Disney+ Leaked Online Microsoft PlayReady DRM Used by Netflix, Amazon, and Disney+ Leaked Online Cyber Security News
Konfety Android Malware on Google Play Uses ZIP Manipulation to Imitate Legitimate Apps Konfety Android Malware on Google Play Uses ZIP Manipulation to Imitate Legitimate Apps Cyber Security News
Threats Actors Poisoned Bing Search Results to Deliver Bumblebee Malware if User Searched for ‘ManageEngine OpManager’ Threats Actors Poisoned Bing Search Results to Deliver Bumblebee Malware if User Searched for ‘ManageEngine OpManager’ Cyber Security News
Advanced PDFly Malware Variant Utilizes Custom Encryption Advanced PDFly Malware Variant Utilizes Custom Encryption Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • FBI Warns of Ploutus Malware Draining ATMs Nationwide
  • Engineers Charged in Silicon Valley Trade Secrets Case
  • Critical Flaws in VS Code Extensions Threaten Developers
  • Apache Tomcat Security Flaw Allows Constraint Bypass
  • Critical Flaw in BeyondTrust Exploited for Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • FBI Warns of Ploutus Malware Draining ATMs Nationwide
  • Engineers Charged in Silicon Valley Trade Secrets Case
  • Critical Flaws in VS Code Extensions Threaten Developers
  • Apache Tomcat Security Flaw Allows Constraint Bypass
  • Critical Flaw in BeyondTrust Exploited for Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News