Advisory

Microsoft February 2026 Patch Tuesday Fixes 58 Vulnerabilities, Six actively Exploited Flaws

Take action: This is an urgent update. Six zero-day vulnerabilities are actively exploited in the wild, three of which are publicly disclosed. Patch your Windows Operating Systems and Microsoft Office ASAP. Then review the advisory for Azure, Exchange Server, GitHub Copilot, and other Microsoft products and components you use.


Learn More

Microsoft fixed 58 security flaws in its February 2026 Patch Tuesday update. This release includes five critical bugs and six zero-day vulnerabilities, all of which are actively exploited in the wild. Three of the zero-days were also publicly disclosed.

The update patches flaws in Windows, Office, Azure, Exchange Server, .NET, GitHub Copilot, Edge, and Power BI that allow attackers to run code, bypass security features, or gain higher privileges.

Actively exploited flaws:

  • CVE-2026-21510 - Windows Shell Security Feature Bypass Vulnerability. Actively exploited by convincing a user to open a malicious link or shortcut file. An attacker could bypass Windows SmartScreen and Windows Shell security prompts through improper handling in Windows Shell components, allowing attacker-controlled content to execute without user warning or consent. This likely allows attackers to bypass Mark of the Web (MoTW) security warnings.
  • CVE-2026-21513 - MSHTML Framework Security Feature Bypass Vulnerability. Actively exploited to bypass security controls and potentially execute code by convincing a victim to open a malicious HTML or LNK file. A protection mechanism failure in the MSHTML Framework allows an unauthorized attacker to bypass a security feature over a network.
  • CVE-2026-21514 - Microsoft Word Security Feature Bypass Vulnerability. Actively exploited by sending a user a malicious Office file and convincing them to open it. This vulnerability bypasses OLE mitigations in Microsoft 365 and Microsoft Office which protect users from vulnerable COM/OLE controls. Cannot be exploited in the Office Preview Pane.
  • CVE-2026-21519 - Desktop Window Manager Elevation of Privilege Vulnerability. Actively exploited to gain SYSTEM privileges. No details have been shared on how it was exploited.
  • CVE-2026-21525 - Windows Remote Access Connection Manager Denial of Service Vulnerability. Actively exploited via a null pointer dereference that allows an unauthorized attacker to deny service locally. No details have been shared on how this flaw was exploited in attacks.
  • CVE-2026-21533 - Windows Remote Desktop Services Elevation of Privilege Vulnerability. Actively exploited through improper privilege management that allows an authorized attacker to elevate privileges locally. No details have been shared on how it was exploited. 

Note: CVE-2026-21510, CVE-2026-21513, and CVE-2026-21514 were all discovered in part by Google Threat Intelligence Group, suggesting these vulnerabilities may have been exploited by the same threat actors or in the same campaign. Google has been tracking attacks conducted by commercial spyware vendors, state-sponsored APTs, and profit-driven cybercriminals.

Critical patched flaws:

  • CVE-2026-24302 - Azure Arc Elevation of Privilege Vulnerability
  • CVE-2026-23655 - Microsoft ACI Confidential Containers Information Disclosure Vulnerability
  • CVE-2026-21522 - Microsoft ACI Confidential Containers Elevation of Privilege Vulnerability
  • CVE-2026-24300 - Azure Front Door Elevation of Privilege Vulnerability
  • CVE-2026-21532 - Azure Function Information Disclosure Vulnerability

The patch cycle includes:

  • 25 Elevation of Privilege vulnerabilities
  • 5 Security Feature Bypass vulnerabilities
  • 12 Remote Code Execution vulnerabilities
  • 6 Information Disclosure vulnerabilities
  • 3 Denial of Service vulnerabilities
  • 7 Spoofing vulnerabilities

As part of these updates, Microsoft has also begun rolling out updated Secure Boot certificates to replace the original 2011 certificates expiring in late June 2026.

Full patch list

TagCVE IDCVE TitleSeverity
.NETCVE-2026-21218.NET Spoofing VulnerabilityImportant
Azure ArcCVE-2026-24302Azure Arc Elevation of Privilege VulnerabilityCritical
Azure Compute GalleryCVE-2026-23655Microsoft ACI Confidential Containers Information Disclosure VulnerabilityCritical
Azure Compute GalleryCVE-2026-21522Microsoft ACI Confidential Containers Elevation of Privilege VulnerabilityCritical
Azure DevOps ServerCVE-2026-21512Azure DevOps Server Cross-Site Scripting VulnerabilityImportant
Azure Front Door (AFD)CVE-2026-24300Azure Front Door Elevation of Privilege VulnerabilityCritical
Azure FunctionCVE-2026-21532Azure Function Information Disclosure VulnerabilityCritical
Azure HDInsightsCVE-2026-21529Azure HDInsight Spoofing VulnerabilityImportant
Azure IoT SDKCVE-2026-21528Azure IoT Explorer Information Disclosure VulnerabilityImportant
Azure LocalCVE-2026-21228Azure Local Remote Code Execution VulnerabilityImportant
Azure SDKCVE-2026-21531Azure SDK for Python Remote Code Execution VulnerabilityImportant
Desktop Window ManagerCVE-2026-21519Desktop Window Manager Elevation of Privilege VulnerabilityImportant
Github CopilotCVE-2026-21516GitHub Copilot for Jetbrains Remote Code Execution VulnerabilityImportant
GitHub Copilot and Visual StudioCVE-2026-21523GitHub Copilot and Visual Studio Code Remote Code Execution VulnerabilityImportant
GitHub Copilot and Visual StudioCVE-2026-21256GitHub Copilot and Visual Studio Remote Code Execution VulnerabilityImportant
GitHub Copilot and Visual StudioCVE-2026-21257GitHub Copilot and Visual Studio Elevation of Privilege VulnerabilityImportant
GitHub Copilot and Visual Studio CodeCVE-2026-21518GitHub Copilot and Visual Studio Code Security Feature Bypass VulnerabilityImportant
Mailslot File SystemCVE-2026-21253Mailslot File System Elevation of Privilege VulnerabilityImportant
Microsoft Defender for LinuxCVE-2026-21537Microsoft Defender for Endpoint Linux Extension Remote Code Execution VulnerabilityImportant
Microsoft Edge (Chromium-based)CVE-2026-1861Chromium: CVE-2026-1861 Heap buffer overflow in libvpxUnknown
Microsoft Edge (Chromium-based)CVE-2026-1862Chromium: CVE-2026-1862 Type Confusion in V8Unknown
Microsoft Edge for AndroidCVE-2026-0391Microsoft Edge (Chromium-based) for Android Spoofing VulnerabilityModerate
Microsoft Exchange ServerCVE-2026-21527Microsoft Exchange Server Spoofing VulnerabilityImportant
Microsoft Graphics ComponentCVE-2026-21246Windows Graphics Component Elevation of Privilege VulnerabilityImportant
Microsoft Graphics ComponentCVE-2026-21235Windows Graphics Component Elevation of Privilege VulnerabilityImportant
Microsoft Office ExcelCVE-2026-21261Microsoft Excel Information Disclosure VulnerabilityImportant
Microsoft Office ExcelCVE-2026-21258Microsoft Excel Information Disclosure VulnerabilityImportant
Microsoft Office ExcelCVE-2026-21259Microsoft Excel Elevation of Privilege VulnerabilityImportant
Microsoft Office OutlookCVE-2026-21260Microsoft Outlook Spoofing VulnerabilityImportant
Microsoft Office OutlookCVE-2026-21511Microsoft Outlook Spoofing VulnerabilityImportant
Microsoft Office WordCVE-2026-21514Microsoft Word Security Feature Bypass VulnerabilityImportant
MSHTML FrameworkCVE-2026-21513MSHTML Framework Security Feature Bypass VulnerabilityImportant
Power BICVE-2026-21229Power BI Remote Code Execution VulnerabilityImportant
Role: Windows Hyper-VCVE-2026-21244Windows Hyper-V Remote Code Execution VulnerabilityImportant
Role: Windows Hyper-VCVE-2026-21255Windows Hyper-V Security Feature Bypass VulnerabilityImportant
Role: Windows Hyper-VCVE-2026-21248Windows Hyper-V Remote Code Execution VulnerabilityImportant
Role: Windows Hyper-VCVE-2026-21247Windows Hyper-V Remote Code Execution VulnerabilityImportant
Windows Ancillary Function Driver for WinSockCVE-2026-21236Windows Ancillary Function Driver for WinSock Elevation of Privilege VulnerabilityImportant
Windows Ancillary Function Driver for WinSockCVE-2026-21241Windows Ancillary Function Driver for WinSock Elevation of Privilege VulnerabilityImportant
Windows Ancillary Function Driver for WinSockCVE-2026-21238Windows Ancillary Function Driver for WinSock Elevation of Privilege VulnerabilityImportant
Windows App for MacCVE-2026-21517Windows App for Mac Installer Elevation of Privilege VulnerabilityImportant
Windows Cluster Client FailoverCVE-2026-21251Cluster Client Failover (CCF) Elevation of Privilege VulnerabilityImportant
Windows Connected Devices Platform ServiceCVE-2026-21234Windows Connected Devices Platform Service Elevation of Privilege VulnerabilityImportant
Windows GDI+CVE-2026-20846GDI+ Denial of Service VulnerabilityImportant
Windows HTTP.sysCVE-2026-21240Windows HTTP.sys Elevation of Privilege VulnerabilityImportant
Windows HTTP.sysCVE-2026-21250Windows HTTP.sys Elevation of Privilege VulnerabilityImportant
Windows HTTP.sysCVE-2026-21232Windows HTTP.sys Elevation of Privilege VulnerabilityImportant
Windows KernelCVE-2026-21231Windows Kernel Elevation of Privilege VulnerabilityImportant
Windows KernelCVE-2026-21222Windows Kernel Information Disclosure VulnerabilityImportant
Windows KernelCVE-2026-21239Windows Kernel Elevation of Privilege VulnerabilityImportant
Windows KernelCVE-2026-21245Windows Kernel Elevation of Privilege VulnerabilityImportant
Windows LDAP - Lightweight Directory Access ProtocolCVE-2026-21243Windows Lightweight Directory Access Protocol (LDAP) Denial of Service VulnerabilityImportant
Windows Notepad AppCVE-2026-20841Windows Notepad App Remote Code Execution VulnerabilityImportant
Windows NTLMCVE-2026-21249Windows NTLM Spoofing VulnerabilityImportant
Windows Remote Access Connection ManagerCVE-2026-21525Windows Remote Access Connection Manager Denial of Service VulnerabilityModerate
Windows Remote DesktopCVE-2026-21533Windows Remote Desktop Services Elevation of Privilege VulnerabilityImportant
Windows ShellCVE-2026-21510Windows Shell Security Feature Bypass VulnerabilityImportant
Windows StorageCVE-2026-21508Windows Storage Elevation of Privilege VulnerabilityImportant
Windows Subsystem for LinuxCVE-2026-21237Windows Subsystem for Linux Elevation of Privilege VulnerabilityImportant
Windows Subsystem for LinuxCVE-2026-21242Windows Subsystem for Linux Elevation of Privilege VulnerabilityImportant
Windows Win32K - GRFXCVE-2023-2804Red Hat, Inc. CVE-2023-2804: Heap Based Overflow libjpeg-turboImportant
Microsoft February 2026 Patch Tuesday Fixes 58 Vulnerabilities, Six actively Exploited Flaws