Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Six New Microsoft Vulnerabilities Added to CISA’s KEV List

Six New Microsoft Vulnerabilities Added to CISA’s KEV List

Posted on February 11, 2026 By CWS

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has expanded its Known Exploited Vulnerabilities (KEV) Catalog by including six zero-day vulnerabilities targeting Microsoft products. This urgent update highlights the ongoing threats posed by nation-state actors and cybercriminals taking advantage of these security gaps. Under Binding Operational Directive (BOD) 22-01, Federal Civilian Executive Branch (FCEB) agencies are required to implement patches by CISA’s set deadlines, while all organizations are encouraged to prioritize remediation to reduce widespread risks.

Understanding the KEV Catalog

Established in 2022 through BOD 22-01, the KEV Catalog is a curated list of Common Vulnerabilities and Exposures (CVEs) that represent a significant risk to federal networks. The catalog is updated based on evidence of active exploitation, sourced from vendor reports, threat intelligence, and incident response activities. The inclusion of these six vulnerabilities emphasizes the persistent security challenges within the Microsoft ecosystem, which are exploited for malicious activities such as ransomware attacks, espionage, and unauthorized network access.

Details of the New Vulnerabilities

The newly added vulnerabilities include CVE-2026-21510, which affects the Windows Shell, potentially allowing attackers to bypass security mechanisms for remote code execution. Similarly, CVE-2026-21513 involves the MSHTML engine, enabling security feature bypasses despite Internet Explorer’s deprecation. CVE-2026-21514 highlights issues in Microsoft Word, where incorrect parsing of untrusted inputs can lead to privilege escalation.

Additionally, CVE-2026-21519 pertains to type confusion in the Desktop Window Manager, facilitating local privilege escalation, while CVE-2026-21525 deals with a NULL pointer dereference in the Remote Access Connection Manager, causing denial-of-service conditions. Lastly, CVE-2026-21533 involves a flaw in Windows Remote Desktop Services, which can allow privilege escalation by granting attackers administrative rights on compromised systems.

Response and Mitigation Strategies

Microsoft has released patches for these vulnerabilities as part of its February 2026 security updates, verifying public exploitation evidence. Organizations should apply these patches through Windows Server Update Services (WSUS) or Intune, and enable automatic updates to ensure timely protection. Detection strategies include hunting for Indicators of Compromise (IOCs) using Endpoint Detection and Response (EDR) solutions, with emerging YARA rules available on GitHub for identifying exploit patterns.

Mitigation measures should include enforcing AppLocker policies, disabling unused Remote Desktop Services, and auditing Office macros. Network segmentation based on Zero Trust principles is also recommended. For long-term security enhancement, organizations are advised to adopt EDR solutions with behavioral analytics and conduct red-team exercises to simulate potential attack scenarios involving these KEV vulnerabilities.

The KEV Catalog now contains over 1,200 entries and is updated weekly. Organizations neglecting these vulnerabilities face increased risks of breaches similar to the 2025 Change Healthcare incident, which was attributed to unpatched KEVs. Stay informed on cybersecurity updates by following us on Google News, LinkedIn, and X. Contact us to feature your cybersecurity stories.

Cyber Security News Tags:CISA, Cybersecurity, FCEB, incident response, KEV catalog, Microsoft, network security, patch management, Ransomware, software updates, threat intelligence, zero-day vulnerabilities

Post navigation

Previous Post: Fortinet Addresses Critical Security Flaws in Latest Update
Next Post: Intel and AMD Patch Over 80 Vulnerabilities in February

Related Posts

How to Use Threat Intelligence to Enhance Cybersecurity Operations How to Use Threat Intelligence to Enhance Cybersecurity Operations Cyber Security News
New Attack Technique Tricks AI Browsers Using a Simple ‘#’ New Attack Technique Tricks AI Browsers Using a Simple ‘#’ Cyber Security News
TP-Link Network Video Recorder Vulnerability Let Attackers Execute Arbitrary Commands TP-Link Network Video Recorder Vulnerability Let Attackers Execute Arbitrary Commands Cyber Security News
ChatGPT Agent Bypasses Cloudflare “I am not a robot” Verification Checks ChatGPT Agent Bypasses Cloudflare “I am not a robot” Verification Checks Cyber Security News
Cloudflare Global Outage Breaks Internet Cloudflare Global Outage Breaks Internet Cyber Security News
SonicWall Confirms State-Sponsored Hackers Behind the Massive Firewall Backup Breach SonicWall Confirms State-Sponsored Hackers Behind the Massive Firewall Backup Breach Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • SSHStalker Botnet Utilizes IRC to Control Legacy Linux Systems
  • Microsoft Addresses Teams Assignment Issues After Update Glitch
  • Data Breach at Conduent Exposes Volvo Group Employees
  • Crypto-Mining Risks in Fortune 500 Cloud Systems Revealed
  • Microsoft’s Critical Windows 11 Updates Enhance Security

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • SSHStalker Botnet Utilizes IRC to Control Legacy Linux Systems
  • Microsoft Addresses Teams Assignment Issues After Update Glitch
  • Data Breach at Conduent Exposes Volvo Group Employees
  • Crypto-Mining Risks in Fortune 500 Cloud Systems Revealed
  • Microsoft’s Critical Windows 11 Updates Enhance Security

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark