Summary: Microsoft’s February 2026 Patch Tuesday resolves 59 vulnerabilities across Windows, Office, Azure, GitHub Copilot, and other components. February release also resolves 5 vulnerabilities rated “Critical,” including 3 elevation of privilege flaws and two information disclosure bugs.
Elevation of privilege issues once again dominate the update, accounting for nearly half of all vulnerabilities addressed this month.
The February Tuesday patch highlights the importance of any malicious document or link could bypass built-in protections and execute code, giving attackers a foothold inside the system. The exploited CVE’s reveal where security, trust and accountability stop shaping as a tool and become infrastructure that reflects security as prime feature.
| OEM | Microsoft |
| Severity | Critical |
| Date of Announcement | 2026-02-10 |
| No. of Patches | 59 |
| Actively Exploited | Yes |
| Exploited in Wild | Yes |
| Advisory Version | 1.0 |
Overview
The update includes 6 exploited zero-days (like CVE-2026-21510 Windows Shell, CVE-2026-21513 MSHTML), two publicly disclosed, two Critical severity flaws like CVE-2026-21531 Azure SDK RCE (CVSS 9.8), and dominant Elevation of Privilege issues.
Here are the CVE addresses for Microsoft & non-Microsoft:
Breakdown of January 2026 Vulnerabilities
| Vulnerability Name | CVE ID | Product Affected | Severity | CVSS Score |
| Azure SDK for Python Remote Code Execution Vulnerability | CVE-2026-21531 | Azure SDK | Critical | 9.8 |
| Azure Front Door (AFD) Remote Code Execution Vulnerability | CVE-2026-24300 | Azure Front Door | Critical | 9.8 |
| Windows Shell Security Feature Bypass Vulnerability | CVE-2026-21510 | Windows Shell | High | 8.8 |
| MSHTML Framework Security Feature Bypass Vulnerability | CVE-2026-21513 | Internet Explorer/MSHTML | High | 8.8 |
| Microsoft Office Word Security Feature Bypass Vulnerability | CVE-2026-21514 | Microsoft Office Word | High | 7.8 |
| Desktop Window Manager Elevation of Privilege Vulnerability | CVE-2026-21519 | Desktop Window Manager | High | 7.8 |
| Windows Remote Desktop Services Elevation of Privilege Vulnerability | CVE-2026-21533 | Windows Remote Desktop | High | 7.8 |
| Windows Remote Access Connection Manager Denial of Service Vulnerability | CVE-2026-21525 | Windows Remote Access Connection Manager | Moderate | 6.2 |
Technical Summary
Microsoft’s February 2026 Patch Tuesday addresses critical flaws across Windows core components, Office apps, Azure cloud services, and developer tools like GitHub Copilot.
Key issues include:
| CVE ID | System Affected | Vulnerability Details | Impact |
| CVE-2026-21531 | Azure SDK | Remote code execution over network against Azure SDK for Python with no authentication or privileges required | Remote Code Execution |
| CVE-2026-24300 | Azure Front Door | Improper access control allows unauthenticated privilege escalation remotely over network, compromising configurations and backend resources | Elevation of Privilege |
| CVE-2026-21510 | Windows Shell | Bypasses Windows SmartScreen protections via malicious links or shortcut files, allowing evasion of security warnings | Security Feature Bypass |
| CVE-2026-21513 | MSHTML Framework | Bypasses file opening prompts through malicious HTML documents or .lnk shortcuts, evading user notifications | Security Feature Bypass |
| CVE-2026-21514 | Microsoft Office Word | Bypasses built-in document protections when opening specially crafted Office files, excluding preview pane vector | Security Feature Bypass |
| CVE-2026-21519 | Desktop Window Manager | Local authenticated attacker escalates privileges to SYSTEM level through Desktop Window Manager GUI rendering service | Elevation of Privilege |
| CVE-2026-21533 | Windows Remote Desktop | Local authenticated user escalates to SYSTEM privileges via Windows Remote Desktop Services authentication flaw | Elevation of Privilege |
| CVE-2026-21525 | Windows Remote Access Connection Manager | Denial of service crash in RasMan service handling remote desktop connections, exploited in the wild | Denial of Service |
Key Affected Products and Services
The February 2026 updates address vulnerabilities across:
Kernel, HTTP.sys, Hyper-V, GDI+, WinSock, LDAP, Storage, Shell
Excel, Word, Outlook
SDK, Front Door, Compute Gallery, IoT SDK, HDInsights, Function, Arc
GitHub Copilot, Visual Studio
Power BI, Defender for Linux, Exchange Server, Notepad
Remediation:
Here are some recommendations below
Conclusion:
Microsoft’s February 2026 Patch Tuesday resolves numerous vulnerabilities across Windows components, Office applications, Azure cloud services, and developer tools.
With confirmed exploitation in the wild across multiple zero-days, immediate patching prevents ransomware deployment, lateral movement and full system compromise in enterprise environments.
Applying February’s updates as soon as possible, particularly in enterprise environments where privilege escalation and SmartScreen bypass vulnerabilities pose heightened risk.
Systems exposed to phishing campaigns, remote desktop access, or high-risk user behavior should be prioritized.
Beyond vulnerability fixes, Microsoft has also started a significant infrastructure change tied to Secure Boot. The February updates initiate a phased rollout of new Secure Boot certificates, replacing the original certificates issued in 2011 that are set to expire in late June 2026.
As attackers continue to exploit zero-day vulnerabilities at a steady pace, February’s Patch Tuesday serves as another reminder that timely patching remains one of the most effective defenses against real-world cyber threats.
What are the key pointers CISO’s should implement?
As systems get more autonomous, is governance key factor before initiating any response?
Is it important to decide how a system going to function before vulnerabilities are exploited?
References:
Recent Comments