Microsoft Patches Six Actively Exploited Zero-Day Flaws

Article Highlights
Off On

This February’s Patch Tuesday has placed significant pressure on system administrators and cybersecurity teams, as Microsoft released a crucial set of security updates to address a total of 58 vulnerabilities, six of which are zero-day flaws already being actively exploited by malicious actors. This development has triggered an urgent call for immediate patching across organizations to defend against ongoing attacks. The sheer volume and critical nature of these actively exploited vulnerabilities, three of which were publicly disclosed prior to the patch release, create a complex and high-stakes environment for IT professionals. The flaws span multiple categories, from security feature bypasses to elevation of privilege, demonstrating a multifaceted threat landscape that requires a comprehensive and swift response. The situation underscores a persistent challenge in cybersecurity: the race between vendors issuing patches and attackers weaponizing newly discovered vulnerabilities. For businesses, this means the window to apply updates and secure systems is narrower than ever, demanding efficient and prioritized patch management protocols to mitigate the immediate risk of compromise.

Dissecting the Six Zero-Day Vulnerabilities

Among the actively exploited flaws, three were identified as security feature bypass vulnerabilities, each posing a distinct threat by allowing attackers to circumvent built-in Windows protections. The first, tracked as CVE-2026-21510, resides in the Windows Shell and enables an attacker to craft a malicious link or file that bypasses the critical SmartScreen security feature, which is designed to warn users about potentially unsafe content. A second bypass flaw, CVE-2026-21513, affects the MSHTML Framework, the rendering engine for Internet Explorer. An attacker could exploit this by creating a specially crafted file that, when opened, executes malicious code without triggering the expected security prompts, effectively performing its actions silently in the background. The third vulnerability in this category, CVE-2026-21514, targets Microsoft Word. This flaw requires social engineering, as an attacker must convince a victim to open a malicious document. Once opened, the document can bypass security features, leading to further system compromise. These types of vulnerabilities are particularly dangerous as they erode user trust in established security mechanisms and lower the barrier for successful phishing and malware delivery campaigns.

The remaining three zero-days addressed by Microsoft introduce risks of privilege escalation and service disruption. Two of these are Elevation of Privilege (EoP) vulnerabilities, which are highly sought after by attackers to gain deeper control over a compromised system. CVE-2026-21519 affects the Windows Desktop Window Manager (DWM) Core Library and could allow an attacker who has already gained basic user access to escalate their privileges to full SYSTEM control, effectively taking over the machine. Similarly, CVE-2026-21533 is an EoP flaw in Windows Remote Desktop Services that permits a local attacker with low-level privileges to gain higher access rights without any user interaction, making it a potent tool for lateral movement within a network. The final zero-day, CVE-2026-21525, is a denial-of-service (DoS) vulnerability in the Windows Remote Access Connection Manager. An unprivileged local attacker can repeatedly trigger this flaw to cause the service to become unresponsive, leading to persistent disruption for users relying on remote access connections. While not leading to data theft directly, such DoS attacks can cripple business operations and serve as a diversion for other malicious activities.

The Broader Patching Landscape and Severity Ratings

A noteworthy aspect of this month’s release is the classification of the vulnerabilities. Despite all six zero-days being actively exploited, Microsoft did not assign a “critical” severity rating to any of them. This decision highlights a potential divergence between vendor-assigned severity levels and the real-world risk posed by a flaw. In total, only five of the 58 patched vulnerabilities received a critical rating, while Elevation of Privilege was the most common issue, accounting for 25 distinct CVEs. This situation presents a prioritization puzzle for security teams, who often rely on severity ratings to schedule patching. An actively exploited “important” or “moderate” vulnerability can often pose a more immediate threat than a “critical” flaw that is purely theoretical or difficult to exploit. The prevalence of EoP flaws also underscores a common attack chain methodology, where adversaries first gain an initial foothold with low privileges and then use a second vulnerability to escalate access and achieve their objectives, such as deploying ransomware or exfiltrating sensitive data.

Adding to the complexity for IT departments, the security workload this month was not limited to Microsoft products. Enterprise software giant SAP also released a substantial batch of 26 new security notes, two of which carry exceptionally high severity scores. The first, tracked as CVE-2026-0509, is a critical missing authorization check in SAP NetWeaver, earning a CVSS score of 9.6 out of 10. However, the most severe flaw is CVE-2026-0488, a code injection vulnerability present in SAP Customer Relationship Management (CRM) and S/4HANA, which received a near-perfect CVSS score of 9.9. According to security experts, an attacker could exploit this vulnerability by first compromising a standard user account. From there, the flaw could be leveraged to execute unauthorized commands at the database level, granting the attacker complete control over sensitive corporate data, enabling widespread data theft, and causing major disruption to core business operations. This concurrent release of critical patches from another major vendor stretched security resources thin and forced organizations to triage vulnerabilities across different enterprise systems simultaneously.

Reflecting on a Demanding Patch Cycle

The February patch cycle proved to be a significant test for organizational security postures. The convergence of six actively exploited Microsoft zero-days and a set of highly critical SAP vulnerabilities created a complex and urgent patching environment. This period highlighted the critical need for security teams to look beyond simple vendor severity ratings and adopt a risk-based approach that considers active exploitation as a primary factor for prioritization. The incident served as a stark reminder that a vulnerability’s real-world impact is not always reflected in its formal classification. The successful navigation of this challenging landscape depended on the agility of IT departments to assess, test, and deploy numerous patches across disparate systems under tight deadlines. Ultimately, the events of this month reinforced the importance of robust, well-practiced patch management protocols and the necessity of maintaining a vigilant and responsive security strategy in the face of an ever-evolving threat landscape.

Explore more

The Fastest Way to Land a New Job in 2026

Ling-yi Tsai is a distinguished HRTech strategist with over two decades of experience helping organizations and individuals navigate the intersection of human talent and advanced technology. As an expert in HR analytics and recruitment systems, she has a unique vantage point on how the “resume tsunami” of the mid-2020s has fundamentally altered the hiring landscape. Her approach moves beyond simply

Trend Analysis: Autonomous Driving Marketing Regulations

The sleek aesthetic of modern dashboards belies a growing tension between the hyperbolic language of Silicon Valley and the rigid safety mandates of government regulators who are currently redefining the boundaries of commercial speech. The central conflict lies in whether a product name is merely a marketing tool or a critical safety instruction that dictates how a human interacts with

Ecommpay Unveils New Guide to Combat Rising E-commerce Fraud

The sheer scale of digital financial theft has reached a tipping point where traditional defense mechanisms often fail to protect the modern merchant. With the UK payment sector facing a staggering loss of £1.17 billion in 2026, Ecommpay has released a specialized resource titled E-commerce fraud defence: A quick guide for merchants. This initiative aims to equip businesses with the

How Do Unified Platforms Simplify European Payment Scaling?

NavigatingthelabyrinthineregulatoryenvironmentandtechnicalfragmentationoftheEuropeanpaymentlandscaperequiresalevelopfoperationalagilitythatmanytraditionalfinancialinstitutionsstruggletomaintaineffectively. As cross-border commerce continues to accelerate throughout 2026, the demand for seamless account-to-account transactions has forced fintech leaders to rethink their underlying infrastructure. The recent expansion of the strategic partnership between Form3 and the global fintech giant SumUp serves as a landmark example of this shift. By moving beyond their initial collaboration on United Kingdom payment rails, such as

Should You Retrofit or Rebuild Data Centers for AI?

The global landscape of digital infrastructure is currently grappling with a monumental shift as generative models and high-density computing clusters rapidly outpace the thermal and electrical capacities of facilities designed and built just a few years ago. This evolution has forced a critical evaluation of existing assets, pushing operators to decide whether to adapt their current inventory or start from