Microsoft Patch Tuesday February 2026 – 54 Vulnerabilities Fixed, Including 6 Zero-days


Microsoft Patch Tuesday February 2026

Microsoft released its February 2026 Patch Tuesday updates on February 10, addressing 54 vulnerabilities, including six zero-days across Windows, Office, Azure, and developer tools.

The updates fix issues in products like Windows Remote Desktop Services, Microsoft Defender, Azure services, GitHub Copilot, Visual Studio Code, Microsoft Exchange, and Office apps.

Severity ratings include two Critical flaws and numerous Important ones, with types including remote code execution (RCE), elevation of privilege (EoP), information disclosure, spoofing, denial-of-service (DoS), and security feature bypass. Microsoft assigns customer action as required for all listed CVEs and urges immediate patching.

Vulnerability TypeCount
Remote Code Execution11​
Denial of Service3​
Elevation of Privilege23​
Information Disclosure5​
Security Feature Bypass5​
Spoofing7​
Total54

Zero-Day Vulnerabilities

Six zero-days were patched, marked as publicly disclosed and/or exploited prior to release. These include:

  • CVE-2026-21514: Security feature bypass in Microsoft Office Word.
  • CVE-2026-21513: Security feature bypass in MSHTML Framework.
  • CVE-2026-21510: Security feature bypass in Windows Shell.
  • CVE-2026-21533: EoP in Windows Remote Desktop Services.
  • CVE-2026-21525: DoS in Windows Remote Access Connection Manager.
  • CVE-2026-21519: EoP in Desktop Window Manager.

Attackers could chain these for broader compromise, such as bypassing protections to execute code or escalate privileges.

Critical Vulnerabilities

Two Critical vulnerabilities demand priority:

google

CVE IDTypeAffected ProductCVSS Implication
CVE-2026-23655Information DisclosureAzure Compute Gallery (ACI Confidential Containers)Allows sensitive data leak from confidential workloads.
CVE-2026-21522Elevation of PrivilegeAzure Compute Gallery (ACI Confidential Containers)Enables privilege escalation in container environments.

These Azure flaws highlight risks in cloud-native confidential computing.

RCE flaws pose high risks in cloud and endpoint tools:

  • CVE-2026-21537: RCE in Microsoft Defender for Endpoint Linux Extension.
  • CVE-2026-21531: RCE in Azure SDK for Python.
  • CVE-2026-21523: RCE in GitHub Copilot and Visual Studio Code.
  • CVE-2026-21516: RCE in GitHub Copilot for JetBrains.
  • CVE-2026-21256: RCE in GitHub Copilot and Visual Studio.

Office issues include spoofing in Outlook (CVE-2026-21527, CVE-2026-21260), info disclosure/EoP in Excel (CVE-2026-21261, CVE-2026-21259, CVE-2026-21258), and Word bypass (CVE-2026-21514). Windows sees EoP in HTTP.sys (CVE-2026-21250), Hyper-V bypass (CVE-2026-21255), and storage (CVE-2026-21508).

Azure-specific: Spoofing in HDInsight (CVE-2026-21529), info disclosure in IoT Explorer SDK (CVE-2026-21528). Other: XSS spoofing in Azure DevOps (CVE-2026-21512).

Elevated risks target developers (Copilot/VS Code), enterprises (Azure/Exchange), and endpoints (Windows/Defender). Exploitation could lead to data theft, lateral movement, or full compromise.

The table below summarizes the CVEs found in the provided text, including links to the official Microsoft Security Response Center (MSRC) pages for each vulnerability, along with their impact, severity, and affected product details.

Microsoft Security Updates – February 10, 2026

CVE IDImpactSeverityVulnerability TitleProduct/Component
CVE-2026-23655Information DisclosureCriticalMicrosoft ACI Confidential Containers Information Disclosure VulnerabilityAzure Compute Gallery
CVE-2026-21537Remote Code ExecutionImportantMicrosoft Defender for Endpoint Linux Extension Remote Code Execution VulnerabilityMicrosoft Defender for Linux
CVE-2026-21533Elevation of PrivilegeImportantWindows Remote Desktop Services Elevation of Privilege VulnerabilityWindows Remote Desktop
CVE-2026-21531Remote Code ExecutionImportantAzure SDK for Python Remote Code Execution VulnerabilityAzure SDK
CVE-2026-21529SpoofingImportantAzure HDInsight Spoofing VulnerabilityAzure HDInsights
CVE-2026-21528Information DisclosureImportantAzure IoT Explorer Information Disclosure VulnerabilityAzure IoT SDK
CVE-2026-21527SpoofingImportantMicrosoft Exchange Server Spoofing VulnerabilityMicrosoft Exchange Server
CVE-2026-21525Denial of ServiceModerateWindows Remote Access Connection Manager Denial of Service VulnerabilityWindows Remote Access Connection Manager
CVE-2026-21523Remote Code ExecutionImportantGitHub Copilot and Visual Studio Code Remote Code Execution VulnerabilityGitHub Copilot and Visual Studio
CVE-2026-21522Elevation of PrivilegeCriticalMicrosoft ACI Confidential Containers Elevation of Privilege VulnerabilityAzure Compute Gallery
CVE-2026-21519Elevation of PrivilegeImportantDesktop Window Manager Elevation of Privilege VulnerabilityDesktop Window Manager
CVE-2026-21518Security Feature BypassImportantGitHub Copilot and Visual Studio Code Security Feature Bypass VulnerabilityGitHub Copilot and Visual Studio Code
CVE-2026-21517Elevation of PrivilegeImportantWindows App for Mac Installer Elevation of Privilege VulnerabilityWindows App for Mac
CVE-2026-21516Remote Code ExecutionImportantGitHub Copilot for Jetbrains Remote Code Execution VulnerabilityGithub Copilot
CVE-2026-21514Security Feature BypassImportantMicrosoft Word Security Feature Bypass VulnerabilityMicrosoft Office Word
CVE-2026-21513Security Feature BypassImportantMSHTML Framework Security Feature Bypass VulnerabilityMSHTML Framework
CVE-2026-21512SpoofingImportantAzure DevOps Server Cross-Site Scripting VulnerabilityAzure DevOps Server
CVE-2026-21511SpoofingImportantMicrosoft Outlook Spoofing VulnerabilityMicrosoft Office Outlook
CVE-2026-21510Security Feature BypassImportantWindows Shell Security Feature Bypass VulnerabilityWindows Shell
CVE-2026-21508Elevation of PrivilegeImportantWindows Storage Elevation of Privilege VulnerabilityWindows Storage
CVE-2026-21261Information DisclosureImportantMicrosoft Excel Information Disclosure VulnerabilityMicrosoft Office Excel
CVE-2026-21260SpoofingImportantMicrosoft Outlook Spoofing VulnerabilityMicrosoft Office Outlook
CVE-2026-21259Elevation of PrivilegeImportantMicrosoft Excel Elevation of Privilege VulnerabilityMicrosoft Office Excel
CVE-2026-21258Information DisclosureImportantMicrosoft Excel Information Disclosure VulnerabilityMicrosoft Office Excel
CVE-2026-21257Elevation of PrivilegeImportantGitHub Copilot and Visual Studio Elevation of Privilege VulnerabilityGitHub Copilot and Visual Studio
CVE-2026-21256Remote Code ExecutionImportantGitHub Copilot and Visual Studio Remote Code Execution VulnerabilityGitHub Copilot and Visual Studio
CVE-2026-21255Security Feature BypassImportantWindows Hyper-V Security Feature Bypass VulnerabilityWindows Hyper-V
CVE-2026-21253Elevation of PrivilegeImportantMailslot File System Elevation of Privilege VulnerabilityMailslot File System
CVE-2026-21251Elevation of PrivilegeImportantCluster Client Failover (CCF) Elevation of Privilege VulnerabilityWindows Cluster Client Failover
CVE-2026-21250Elevation of PrivilegeImportantWindows HTTP.sys Elevation of Privilege VulnerabilityWindows HTTP.sys

Prioritize critical and zero-day patches via Windows Update or WSUS; test in staging environments. Enable auto-updates, monitor MSRC for revisions, and audit Azure/Office configs. CISA may add top CVEs to the KEV catalog soon.

Other Patch Tuesday Updates

Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

googlenews



Source link