Close Menu
    Latest Post

    Trump Reinstates De Minimis Exemption Suspension Despite Supreme Court Ruling

    February 22, 2026

    How Cloudflare Mitigated a Vulnerability in its ACME Validation Logic

    February 21, 2026

    Demis Hassabis and John Jumper Receive Nobel Prize in Chemistry

    February 21, 2026
    Facebook X (Twitter) Instagram
    Trending
    • Trump Reinstates De Minimis Exemption Suspension Despite Supreme Court Ruling
    • How Cloudflare Mitigated a Vulnerability in its ACME Validation Logic
    • Demis Hassabis and John Jumper Receive Nobel Prize in Chemistry
    • How to Cancel Your Google Pixel Watch Fitbit Premium Trial
    • GHD Speed Hair Dryer Review: Powerful Performance and User-Friendly Design
    • An FBI ‘Asset’ Helped Run a Dark Web Site That Sold Fentanyl-Laced Drugs for Years
    • The Next Next Job, a framework for making big career decisions
    • Google Introduces Lyria 3: A Free AI Music Generator for Gemini
    Facebook X (Twitter) Instagram Pinterest Vimeo
    NodeTodayNodeToday
    • Home
    • AI
    • Dev
    • Guides
    • Products
    • Security
    • Startups
    • Tech
    • Tools
    NodeTodayNodeToday
    Home»Security»Microsoft Addresses 59 Vulnerabilities, Including Six Actively Exploited Zero-Days
    Security

    Microsoft Addresses 59 Vulnerabilities, Including Six Actively Exploited Zero-Days

    Samuel AlejandroBy Samuel AlejandroFebruary 18, 2026No Comments5 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    src pnydsw featured
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Image 1

    Microsoft recently issued security updates to resolve 59 vulnerabilities found in its software. Six of these flaws have been actively exploited.

    Among the 59 vulnerabilities, five are categorized as Critical, 52 as Important, and two as Moderate. The patched issues include 25 privilege escalation flaws, 12 remote code execution vulnerabilities, 7 spoofing issues, 6 information disclosure flaws, 5 security feature bypasses, 3 denial-of-service vulnerabilities, and 1 cross-site scripting flaw.

    These updates also supplement three security flaws previously addressed in Microsoft Edge since the release of the January 2026 Patch Tuesday update. One notable fix was for a Moderate vulnerability in Edge for Android (CVE-2026-0391, CVSS score: 6.5) that could enable spoofing via a user interface misrepresentation.

    This month’s updates highlight six vulnerabilities that are currently being actively exploited:

    • CVE-2026-21510 (CVSS score: 8.8) – A protection mechanism failure in Windows Shell that allows an unauthorized attacker to bypass a security feature over a network.
    • CVE-2026-21513 (CVSS score: 8.8) – A protection mechanism failure in MSHTML Framework that allows an unauthorized attacker to bypass a security feature over a network.
    • CVE-2026-21514 (CVSS score: 7.8) – A reliance on untrusted inputs in a security decision in Microsoft Office Word that allows an unauthorized attacker to bypass a security feature locally.
    • CVE-2026-21519 (CVSS score: 7.8) – An access of resource using incompatible type (‘type confusion’) in the Desktop Window Manager that allows an authorized attacker to elevate privileges locally.
    • CVE-2026-21525 (CVSS score: 6.2) – A null pointer dereference in Windows Remote Access Connection Manager that allows an unauthorized attacker to deny service locally.
    • CVE-2026-21533 (CVSS score: 7.8) – An improper privilege management in Windows Remote Desktop that allows an authorized attacker to elevate privileges locally.

    Microsoft’s security teams and Google Threat Intelligence Group (GTIG) are credited with finding and reporting the first three vulnerabilities, which were publicly known at the time of the patch release. Specific details regarding their exploitation or whether they were part of a unified campaign are not yet available.

    According to Jack Bicer, director of vulnerability research at Action1, CVE-2026-21513 is a security feature bypass in the Microsoft MSHTML Framework. This flaw allows attackers to bypass execution prompts when users interact with malicious files, enabling dangerous actions with a single click.

    Satnam Narang, a senior staff research engineer at Tenable, noted similarities between CVE-2026-21513 and CVE-2026-21514 with CVE-2026-21510. The key distinction is that CVE-2026-21513 can be exploited via an HTML file, whereas CVE-2026-21514 requires a Microsoft Office file.

    CVE-2026-21525 is connected to a zero-day vulnerability that ACROS Security’s 0patch service reportedly discovered in December 2025 during an investigation into a related flaw (CVE-2025-59230) in the same component.

    Kev Breen, senior director of cyber threat research at Immersive, explained that CVE-2026-21519 and CVE-2026-21533 are local privilege escalation vulnerabilities. Exploitation requires an attacker to have already accessed a vulnerable host, potentially through a malicious attachment, a remote code execution flaw, or lateral movement from another compromised system.

    Once on a host, these vulnerabilities can be used to elevate privileges to SYSTEM level. This high level of access could allow a threat actor to disable security tools, deploy more malware, or access sensitive data and credentials, potentially leading to a complete domain compromise.

    CrowdStrike, credited for reporting CVE-2026-21533, has not attributed its exploitation to a specific adversary. However, the company anticipates that threat actors possessing exploit binaries will likely increase their efforts to utilize or sell them soon.

    Adam Meyers, head of Counter Adversary Operations at CrowdStrike, stated that the CVE-2026-21533 exploit binary alters a service configuration key, replacing it with an attacker-controlled key. This action could allow adversaries to escalate privileges and add a new user to the Administrator group.

    In response, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added all six vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog. Federal Civilian Executive Branch (FCEB) agencies are mandated to apply these fixes by March 3, 2026.

    This update also includes Microsoft’s deployment of updated Secure Boot certificates. These new certificates replace the original 2011 versions, which are set to expire in late June 2026, and will be installed automatically via the standard monthly Windows update.

    Microsoft stated that if a device does not receive the new Secure Boot certificates before the 2011 certificates expire, it will still function, and existing software will run. However, the device will operate in a degraded security state, limiting its capacity to receive future boot-level protections.

    Without these updates, systems become more vulnerable to new boot-level flaws as they cannot install new mitigations. This could also lead to compatibility problems, preventing newer operating systems, firmware, hardware, or Secure Boot-dependent software from loading.

    Additionally, Microsoft is enhancing Windows’ default protections through two security initiatives: Windows Baseline Security Mode and User Transparency and Consent. These efforts fall under the Secure Future Initiative and Windows Resiliency Initiative.

    Microsoft indicated that Windows Baseline Security Mode will enable runtime integrity safeguards by default. These safeguards will ensure that only properly signed applications, services, and drivers can run, protecting the system from unauthorized modifications.

    User Transparency and Consent, similar to Apple macOS’s Transparency, Consent, and Control (TCC) framework, seeks to standardize security decision-making. The operating system will notify users when applications attempt to access sensitive resources like files, cameras, or microphones, or try to install unwanted software.

    Logan Iyer, a Distinguished Engineer at Microsoft, mentioned that these prompts are designed to be clear and actionable, allowing users to review and modify their choices later. Applications and AI agents will also be required to meet higher transparency standards, providing users and IT administrators with better insight into their activities.

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleA Brief History of Xenopus
    Next Article DJI’s first robovac is an autonomous cleaning drone you can’t trust
    Samuel Alejandro

    Related Posts

    Security

    An FBI ‘Asset’ Helped Run a Dark Web Site That Sold Fentanyl-Laced Drugs for Years

    February 21, 2026
    Security

    Anthropic Introduces Embedded Security Scanning for Claude AI

    February 20, 2026
    Security

    UK Mandates 48-Hour Takedown for Nonconsensual Intimate Images, Tech Firms Face Fines

    February 20, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Latest Post

    ChatGPT Mobile App Surpasses $3 Billion in Consumer Spending

    December 21, 202513 Views

    Creator Tayla Cannon Lands $1.1M Investment for Rebuildr PT Software

    December 21, 202511 Views

    Automate Your iPhone’s Always-On Display for Better Battery Life and Privacy

    December 21, 202510 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    About

    Welcome to NodeToday, your trusted source for the latest updates in Technology, Artificial Intelligence, and Innovation. We are dedicated to delivering accurate, timely, and insightful content that helps readers stay ahead in a fast-evolving digital world.

    At NodeToday, we cover everything from AI breakthroughs and emerging technologies to product launches, software tools, developer news, and practical guides. Our goal is to simplify complex topics and present them in a clear, engaging, and easy-to-understand way for tech enthusiasts, professionals, and beginners alike.

    Latest Post

    Trump Reinstates De Minimis Exemption Suspension Despite Supreme Court Ruling

    February 22, 20260 Views

    How Cloudflare Mitigated a Vulnerability in its ACME Validation Logic

    February 21, 20260 Views

    Demis Hassabis and John Jumper Receive Nobel Prize in Chemistry

    February 21, 20260 Views
    Recent Posts
    • Trump Reinstates De Minimis Exemption Suspension Despite Supreme Court Ruling
    • How Cloudflare Mitigated a Vulnerability in its ACME Validation Logic
    • Demis Hassabis and John Jumper Receive Nobel Prize in Chemistry
    • How to Cancel Your Google Pixel Watch Fitbit Premium Trial
    • GHD Speed Hair Dryer Review: Powerful Performance and User-Friendly Design
    Facebook X (Twitter) Instagram Pinterest
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms & Conditions
    • Disclaimer
    • Cookie Policy
    © 2026 NodeToday.

    Type above and press Enter to search. Press Esc to cancel.