Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Microsoft Addresses Six Zero-Day Vulnerabilities in February 2026 Update

Microsoft Addresses Six Zero-Day Vulnerabilities in February 2026 Update

Posted on February 10, 2026 By CWS

Microsoft has reinforced its security measures with the February 2026 Patch Tuesday updates, addressing a total of approximately 60 vulnerabilities. Notably, the updates include fixes for six zero-day vulnerabilities that have been actively exploited, marking a significant step in safeguarding its products.

Details of the Zero-Day Vulnerabilities

The identified zero-day vulnerabilities cover a range of Microsoft products. CVE-2026-21510 is a bypass for Windows SmartScreen and Windows Shell security prompts, exploitable via malicious links. CVE-2026-21514 affects Microsoft 365 and Office by allowing OLE mitigation bypass. Internet Explorer is compromised by CVE-2026-21513, which can be exploited through malicious HTML or LNK files.

Further threats include CVE-2026-21519, linked to Windows Desktop Window Manager for privilege escalation, and CVE-2026-21533, which impacts Windows Remote Desktop Services with potential for privilege escalation to System level. Lastly, CVE-2026-21525 presents a local DoS attack risk via Windows Remote Access Connection Manager.

Discovery and Reporting

Microsoft has acknowledged contributions from various security teams in identifying these vulnerabilities. Google Threat Intelligence Group (GTIG) and Microsoft jointly discovered CVE-2026-21510 and CVE-2026-21514, while CVE-2026-21513 was also a collaborative effort. Microsoft researchers found CVE-2026-21519, with CrowdStrike credited for CVE-2026-21533 and Acros Security for CVE-2026-21525.

These discoveries suggest potential exploitation by similar threat actors, possibly linked to campaigns involving commercial spyware vendors and nation-state hackers. Despite minimal public information on active exploits, the vulnerabilities are flagged as ‘publicly disclosed’ in Microsoft’s advisories.

Comprehensive Patching Efforts

Alongside zero-day fixes, the February 2026 updates address vulnerabilities across Microsoft’s ecosystem, including Azure, Windows Defender, Exchange Server, .NET, GitHub Copilot, Edge, and Power BI. These comprehensive measures reflect Microsoft’s ongoing commitment to enhancing product security.

SecurityWeek has reached out to Acros and CrowdStrike for further insights into potential exploitations of these zero-days and will provide updates as more information becomes available.

The proactive measures taken by Microsoft underscore the importance of timely updates in combating emerging cybersecurity threats, ensuring user protection against sophisticated cyber attacks.

Security Week News Tags:Cybersecurity, Exploit, Microsoft, Office, Patch, security update, Threat Actors, Vulnerabilities, Windows, zero-day

Post navigation

Previous Post: Microsoft’s February 2026 Update Fixes 54 Vulnerabilities
Next Post: Critical XSS Flaw in FortiSandbox Enables Remote Attacks

Related Posts

Recent SAP S/4HANA Vulnerability Exploited in Attacks Recent SAP S/4HANA Vulnerability Exploited in Attacks Security Week News
In Other News: Critical Zoom Flaw, City’s Water Threatened by Hack, 0 Billion OT Cyber Risk In Other News: Critical Zoom Flaw, City’s Water Threatened by Hack, $330 Billion OT Cyber Risk Security Week News
Chrome 142 Update Patches Exploited Zero-Day Chrome 142 Update Patches Exploited Zero-Day Security Week News
Many Attacks Aimed at EU Targeted OT, Says Cybersecurity Agency Many Attacks Aimed at EU Targeted OT, Says Cybersecurity Agency Security Week News
Chrome, Edge Extensions Caught Stealing ChatGPT Sessions Chrome, Edge Extensions Caught Stealing ChatGPT Sessions Security Week News
Steelmaker Nucor Says Hackers Stole Data in Recent Attack Steelmaker Nucor Says Hackers Stole Data in Recent Attack Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • North Korea-Linked UNC1069 Targets Crypto with AI Attacks
  • GitLab Releases Critical Security Updates to Fix Vulnerabilities
  • Critical Windows Notepad Flaw Enables Remote Code Execution
  • Critical RDS Vulnerability Patched Amid Active Exploits
  • TeamPCP’s Cloud Exploitation Transforms Cybercrime

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • North Korea-Linked UNC1069 Targets Crypto with AI Attacks
  • GitLab Releases Critical Security Updates to Fix Vulnerabilities
  • Critical Windows Notepad Flaw Enables Remote Code Execution
  • Critical RDS Vulnerability Patched Amid Active Exploits
  • TeamPCP’s Cloud Exploitation Transforms Cybercrime

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark