Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Microsoft Addresses Six Zero-Day Vulnerabilities in February 2026 Update

Microsoft Addresses Six Zero-Day Vulnerabilities in February 2026 Update

Posted on February 10, 2026 By CWS

Microsoft has reinforced its security measures with the February 2026 Patch Tuesday updates, addressing a total of approximately 60 vulnerabilities. Notably, the updates include fixes for six zero-day vulnerabilities that have been actively exploited, marking a significant step in safeguarding its products.

Details of the Zero-Day Vulnerabilities

The identified zero-day vulnerabilities cover a range of Microsoft products. CVE-2026-21510 is a bypass for Windows SmartScreen and Windows Shell security prompts, exploitable via malicious links. CVE-2026-21514 affects Microsoft 365 and Office by allowing OLE mitigation bypass. Internet Explorer is compromised by CVE-2026-21513, which can be exploited through malicious HTML or LNK files.

Further threats include CVE-2026-21519, linked to Windows Desktop Window Manager for privilege escalation, and CVE-2026-21533, which impacts Windows Remote Desktop Services with potential for privilege escalation to System level. Lastly, CVE-2026-21525 presents a local DoS attack risk via Windows Remote Access Connection Manager.

Discovery and Reporting

Microsoft has acknowledged contributions from various security teams in identifying these vulnerabilities. Google Threat Intelligence Group (GTIG) and Microsoft jointly discovered CVE-2026-21510 and CVE-2026-21514, while CVE-2026-21513 was also a collaborative effort. Microsoft researchers found CVE-2026-21519, with CrowdStrike credited for CVE-2026-21533 and Acros Security for CVE-2026-21525.

These discoveries suggest potential exploitation by similar threat actors, possibly linked to campaigns involving commercial spyware vendors and nation-state hackers. Despite minimal public information on active exploits, the vulnerabilities are flagged as ‘publicly disclosed’ in Microsoft’s advisories.

Comprehensive Patching Efforts

Alongside zero-day fixes, the February 2026 updates address vulnerabilities across Microsoft’s ecosystem, including Azure, Windows Defender, Exchange Server, .NET, GitHub Copilot, Edge, and Power BI. These comprehensive measures reflect Microsoft’s ongoing commitment to enhancing product security.

SecurityWeek has reached out to Acros and CrowdStrike for further insights into potential exploitations of these zero-days and will provide updates as more information becomes available.

The proactive measures taken by Microsoft underscore the importance of timely updates in combating emerging cybersecurity threats, ensuring user protection against sophisticated cyber attacks.

Security Week News Tags:Cybersecurity, Exploit, Microsoft, Office, Patch, security update, Threat Actors, Vulnerabilities, Windows, zero-day

Post navigation

Previous Post: Microsoft’s February 2026 Update Fixes 54 Vulnerabilities
Next Post: Critical XSS Flaw in FortiSandbox Enables Remote Attacks

Related Posts

766,000 Impacted by Data Breach at Dealership Software Provider Motility 766,000 Impacted by Data Breach at Dealership Software Provider Motility Security Week News
Critical Apache Tika Vulnerability Leads to XXE Injection Critical Apache Tika Vulnerability Leads to XXE Injection Security Week News
UK Government Acknowledges It Is Investigating Cyber Incident After Media Reports UK Government Acknowledges It Is Investigating Cyber Incident After Media Reports Security Week News
Opti Raises  Million for Identity Security Platform Opti Raises $20 Million for Identity Security Platform Security Week News
Echo Raises M in Seed Funding for Vulnerability-Free Container Images Echo Raises $15M in Seed Funding for Vulnerability-Free Container Images Security Week News
Hackers Exploit Sitecore Zero-Day for Malware Delivery Hackers Exploit Sitecore Zero-Day for Malware Delivery Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Critical Vulnerabilities Found in Intel’s TDX by Google
  • Socelars Malware Targets Windows for Data Theft
  • Siemens, Schneider, and Others Address ICS Vulnerabilities
  • North Korea-Linked UNC1069 Targets Crypto with AI Attacks
  • GitLab Releases Critical Security Updates to Fix Vulnerabilities

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Critical Vulnerabilities Found in Intel’s TDX by Google
  • Socelars Malware Targets Windows for Data Theft
  • Siemens, Schneider, and Others Address ICS Vulnerabilities
  • North Korea-Linked UNC1069 Targets Crypto with AI Attacks
  • GitLab Releases Critical Security Updates to Fix Vulnerabilities

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark