Normal view

Received before yesterday

Microsoft Patch Tuesday February Update Flags Exchange and Azure Vulnerabilities as High-Priority Risks

11 February 2026 at 01:44

Microsoft Patch Tuesday February

Microsoft Patch Tuesday February 2026 addressed 54 vulnerabilities including six zero-days across Windows, Office, Azure services, Exchange Server, and developer tools. The latest patch update, rollout is notable not only for its smaller size but for the presence of six zero-day vulnerabilities that were already being exploited in active attacks before patch availability. As part of the 2026 patch Tuesday, the release carries heightened urgency for enterprise defenders and system administrators. 

Microsoft Patch Tuesday February has Six New Zero-Day Fixes

The most critical aspect of this Microsoft Patch Tuesday February update is the confirmation that six vulnerabilities were under active exploitation. These flaws impact core Windows components and productivity applications widely deployed in enterprise environments.  The actively exploited zero-days are:
  • CVE-2026-21510Windows Shell Security Feature Bypass (Severity: Important; CVSS 7.8) 
  • CVE-2026-21513MSHTML Platform Security Feature Bypass (Important; CVSS 7.5) 
  • CVE-2026-21514Microsoft Word Security Feature Bypass (Important; CVSS 7.8) 
  • CVE-2026-21519Desktop Window Manager Elevation of Privilege (Important; CVSS 7.8) 
  • CVE-2026-21525Windows Remote Access Connection Manager Denial of Service (Important; CVSS 7.5) 
  • CVE-2026-21533Windows Remote Desktop Services Elevation of Privilege (Important; CVSS 7.8) 
CVE-2026-21510 allows attackers to bypass the Mark of the Web (MoTW) mechanism in Windows Shell, preventing users from seeing security warnings on files downloaded from the internet. CVE-2026-21513, affecting the MSHTML engine, enables malicious shortcut or file-based payloads to bypass prompts and execute code without user awareness. CVE-2026-21514 similarly permits crafted Microsoft Word files to evade OLE mitigation protections.  Privilege escalation vulnerabilities are also prominent. CVE-2026-21519 involves a type confusion flaw in the Desktop Window Manager that can grant attackers SYSTEM-level privileges. CVE-2026-21533 affects Windows Remote Desktop Services, allowing authenticated attackers to elevate privileges due to improper privilege handling. Meanwhile, CVE-2026-21525 can trigger a null pointer dereference in Windows Remote Access Connection Manager, leading to denial-of-service conditions by crashing VPN connections. 

Vulnerability Distribution and Impact 

Beyond the zero-days, Microsoft Patch Tuesday resolves a broad range of additional issues. Of the 54 vulnerabilities fixed, Elevation of Privilege (EoP) flaws account for 25. Remote Code Execution (RCE) vulnerabilities total 12, followed by 7 spoofing issues, 6 information disclosure flaws, 5 security feature bypass vulnerabilities, and 3 denial-of-service issues.  High-risk vulnerabilities affecting enterprise infrastructure include: 
  • CVE-2026-21527Microsoft Exchange Server Spoofing Vulnerability (Critical; potential RCE vector) 
  • CVE-2026-23655Azure Container Instances Information Disclosure (Critical) 
  • CVE-2026-21518GitHub Copilot / Visual Studio Remote Code Execution (Important) 
  • CVE-2026-21528Azure IoT SDK Remote Code Execution (Important) 
  • CVE-2026-21531Azure SDK Vulnerability (Important; CVSS 9.8) 
  • CVE-2026-21222Windows Kernel Information Disclosure (Important) 
  • CVE-2026-21249Windows NTLM Spoofing Vulnerability (Moderate) 
  • CVE-2026-21509Microsoft Office Security Feature Bypass (Important) 
Azure-related services received multiple fixes, including Azure Compute Gallery (CVE-2026-21522 and CVE-2026-23655), Azure Function (CVE-2026-21532; CVSS 8.2), Azure Front Door (CVE-2026-24300; CVSS 9.8), Azure Arc (CVE-2026-24302; CVSS 8.6), Azure DevOps Server (CVE-2026-21512), and Azure HDInsights (CVE-2026-21529).   Exchange Server remains a particularly sensitive asset in enterprise networks. CVE-2026-21527 highlights continued risks to messaging infrastructure, which has historically been a prime target for remote code execution and post-exploitation campaigns. 

Additional CVEs and Exploitability Ratings 

The official advisory states: “February 2026 Security Updates. This release consists of the following 59 Microsoft CVEs.” Among them:  Microsoft also republished one non-Microsoft CVE: CVE-2026-1861, associated with Chrome and affecting Chromium-based Microsoft Edge.  Exploitability ratings range from “Exploitation Detected” and “Exploitation More Likely” to “Exploitation Less Likely” and “Exploitation Unlikely.” Most entries include FAQs, but workarounds and mitigations are generally listed as unavailable. 

Lifecycle Notes, Hotpatching, and Known Issues 

The advisory reiterates that Windows 10 and Windows 11 updates are cumulative and available through the Microsoft Update Catalog. Lifecycle timelines are documented in the Windows Lifecycle Facts Sheet. Microsoft is also continuing improvements to Windows Release Notes and provides servicing stack update details under ADV990001.  The Hotpatching feature is now generally available for Windows Server Azure Edition virtual machines. Customers using Windows Server 2008 or Windows Server 2008 R2 must purchase Extended Security Updates to continue receiving patches; additional information is available under 4522133.  Known issues tied to this 2026 Patch Tuesday release include: 
  • KB5075942: Windows Server 2025 Hotpatch 
  • KB5075897: Windows Server 23H2 
  • KB5075899: Windows Server 2025 
  • KB5075906: Windows Server 2022 
Given the confirmed exploitation of multiple zero-days and the concentration of Elevation of Privilege and Remote Code Execution flaws, Microsoft Patch Tuesday 2026 represents a high-priority patch cycle. Organizations are advised to prioritize remediation of the six actively exploited vulnerabilities and critical infrastructure components, and to conduct rapid compatibility testing to reduce operational disruption. 
❌