Microsoft Patches Six Actively Exploited Zero-Day Flaws

Article Highlights
Off On

This February’s Patch Tuesday has placed significant pressure on system administrators and cybersecurity teams, as Microsoft released a crucial set of security updates to address a total of 58 vulnerabilities, six of which are zero-day flaws already being actively exploited by malicious actors. This development has triggered an urgent call for immediate patching across organizations to defend against ongoing attacks. The sheer volume and critical nature of these actively exploited vulnerabilities, three of which were publicly disclosed prior to the patch release, create a complex and high-stakes environment for IT professionals. The flaws span multiple categories, from security feature bypasses to elevation of privilege, demonstrating a multifaceted threat landscape that requires a comprehensive and swift response. The situation underscores a persistent challenge in cybersecurity: the race between vendors issuing patches and attackers weaponizing newly discovered vulnerabilities. For businesses, this means the window to apply updates and secure systems is narrower than ever, demanding efficient and prioritized patch management protocols to mitigate the immediate risk of compromise.

Dissecting the Six Zero-Day Vulnerabilities

Among the actively exploited flaws, three were identified as security feature bypass vulnerabilities, each posing a distinct threat by allowing attackers to circumvent built-in Windows protections. The first, tracked as CVE-2026-21510, resides in the Windows Shell and enables an attacker to craft a malicious link or file that bypasses the critical SmartScreen security feature, which is designed to warn users about potentially unsafe content. A second bypass flaw, CVE-2026-21513, affects the MSHTML Framework, the rendering engine for Internet Explorer. An attacker could exploit this by creating a specially crafted file that, when opened, executes malicious code without triggering the expected security prompts, effectively performing its actions silently in the background. The third vulnerability in this category, CVE-2026-21514, targets Microsoft Word. This flaw requires social engineering, as an attacker must convince a victim to open a malicious document. Once opened, the document can bypass security features, leading to further system compromise. These types of vulnerabilities are particularly dangerous as they erode user trust in established security mechanisms and lower the barrier for successful phishing and malware delivery campaigns.

The remaining three zero-days addressed by Microsoft introduce risks of privilege escalation and service disruption. Two of these are Elevation of Privilege (EoP) vulnerabilities, which are highly sought after by attackers to gain deeper control over a compromised system. CVE-2026-21519 affects the Windows Desktop Window Manager (DWM) Core Library and could allow an attacker who has already gained basic user access to escalate their privileges to full SYSTEM control, effectively taking over the machine. Similarly, CVE-2026-21533 is an EoP flaw in Windows Remote Desktop Services that permits a local attacker with low-level privileges to gain higher access rights without any user interaction, making it a potent tool for lateral movement within a network. The final zero-day, CVE-2026-21525, is a denial-of-service (DoS) vulnerability in the Windows Remote Access Connection Manager. An unprivileged local attacker can repeatedly trigger this flaw to cause the service to become unresponsive, leading to persistent disruption for users relying on remote access connections. While not leading to data theft directly, such DoS attacks can cripple business operations and serve as a diversion for other malicious activities.

The Broader Patching Landscape and Severity Ratings

A noteworthy aspect of this month’s release is the classification of the vulnerabilities. Despite all six zero-days being actively exploited, Microsoft did not assign a “critical” severity rating to any of them. This decision highlights a potential divergence between vendor-assigned severity levels and the real-world risk posed by a flaw. In total, only five of the 58 patched vulnerabilities received a critical rating, while Elevation of Privilege was the most common issue, accounting for 25 distinct CVEs. This situation presents a prioritization puzzle for security teams, who often rely on severity ratings to schedule patching. An actively exploited “important” or “moderate” vulnerability can often pose a more immediate threat than a “critical” flaw that is purely theoretical or difficult to exploit. The prevalence of EoP flaws also underscores a common attack chain methodology, where adversaries first gain an initial foothold with low privileges and then use a second vulnerability to escalate access and achieve their objectives, such as deploying ransomware or exfiltrating sensitive data.

Adding to the complexity for IT departments, the security workload this month was not limited to Microsoft products. Enterprise software giant SAP also released a substantial batch of 26 new security notes, two of which carry exceptionally high severity scores. The first, tracked as CVE-2026-0509, is a critical missing authorization check in SAP NetWeaver, earning a CVSS score of 9.6 out of 10. However, the most severe flaw is CVE-2026-0488, a code injection vulnerability present in SAP Customer Relationship Management (CRM) and S/4HANA, which received a near-perfect CVSS score of 9.9. According to security experts, an attacker could exploit this vulnerability by first compromising a standard user account. From there, the flaw could be leveraged to execute unauthorized commands at the database level, granting the attacker complete control over sensitive corporate data, enabling widespread data theft, and causing major disruption to core business operations. This concurrent release of critical patches from another major vendor stretched security resources thin and forced organizations to triage vulnerabilities across different enterprise systems simultaneously.

Reflecting on a Demanding Patch Cycle

The February patch cycle proved to be a significant test for organizational security postures. The convergence of six actively exploited Microsoft zero-days and a set of highly critical SAP vulnerabilities created a complex and urgent patching environment. This period highlighted the critical need for security teams to look beyond simple vendor severity ratings and adopt a risk-based approach that considers active exploitation as a primary factor for prioritization. The incident served as a stark reminder that a vulnerability’s real-world impact is not always reflected in its formal classification. The successful navigation of this challenging landscape depended on the agility of IT departments to assess, test, and deploy numerous patches across disparate systems under tight deadlines. Ultimately, the events of this month reinforced the importance of robust, well-practiced patch management protocols and the necessity of maintaining a vigilant and responsive security strategy in the face of an ever-evolving threat landscape.

Explore more

Agile Robots and Google DeepMind Partner for AI Automation

The sight of a robotic arm fluidly adjusting its grip to accommodate a fragile, oddly shaped component marks the end of an age defined by rigid, pre-programmed industrial machinery. While traditional automation relied on thousands of lines of static code to perform a single repetitive motion, a new alliance between Agile Robots and Google DeepMind is introducing a cognitive layer

The Rise of Careerfishing and Professional Deception in Hiring

The digital age has ushered in a sophisticated era of professional masquerading where jobseekers utilize carefully curated fictions to bypass traditional recruitment filters and secure roles for which they lack genuine qualifications. This phenomenon, increasingly known as careerfishing, mirrors the deceptive nature of online dating scams but targets the high-stakes world of corporate talent acquisition. It represents a deliberate, calculated

How Is HealthTech Redefining the Future of Talent Acquisition?

A single line of inefficient code in a modern clinical algorithm no longer just causes a screen to freeze; it can delay a life-saving diagnosis or disrupt the delicate flow of a decentralized clinical trial. In the high-stakes world of healthcare technology, the traditional boundaries of recruitment are dissolving as the industry shifts from a focus on static technical skills

AI Literacy Becomes the Fastest Growing Skill in HR

The traditional image of a human resources professional buried under a mountain of paper resumes and manual spreadsheets has vanished, replaced by a new breed of data-fluent strategist. Recent LinkedIn data reveals that AI-related competencies are now the fastest-growing additions to HR profiles across the globe, signaling a radical departure from the administrative roots of the profession. This surge in

Custom CRM Transforms Pharmaceutical Supply Chain Operations

A single delayed shipment of temperature-sensitive medicine can ripple through a healthcare network, yet many distributors still rely on the fragile logic of disconnected spreadsheets to manage their complex global inventories. In the high-stakes world of pharmaceutical logistics, the movement of life-saving goods requires more than just a warehouse; it demands a digital nervous system capable of tracking every pill