Patch Tuesday, February 2026 Edition

Microsoft Releases Critical Updates for Windows and Other Software

Microsoft has released a batch of updates addressing over 50 security vulnerabilities in its Windows operating systems and other software. Notably, the update includes patches for six “zero-day” vulnerabilities that are currently being exploited by attackers.

Zero-Day Vulnerabilities

The zero-day vulnerabilities include:

  • CVE-2026-21510: A security feature bypass in Windows Shell, allowing a single click on a malicious link to run attacker-controlled content without user consent.
  • CVE-2026-21513: A security bypass bug targeting MSHTML, the default web browser engine in Windows.
  • CVE-2026-21514: Another related security feature bypass issue found in Microsoft Word.
  • CVE-2026-21533: A local privilege escalation flaw affecting Windows Remote Desktop Services, allowing attackers to elevate their privileges to the “SYSTEM” level.
  • CVE-2026-21519: An elevation of privilege vulnerability in the Desktop Window Manager (DWM), a critical component of Windows.
  • CVE-2026-21525: A denial-of-service vulnerability in the Windows Remote Access Connection Manager, which can disrupt corporate network connections.

Additional Security Updates

In addition to these critical vulnerabilities, Microsoft has issued several out-of-band security updates since January’s Patch Tuesday:

  • A fix for a credential prompt failure when attempting remote desktop or remote application connections.
  • Patching of a zero-day security feature bypass vulnerability in Microsoft Office (CVE-2026-21509).

AI Vulnerabilities Addressed

Kev Breen at Immersive notes that this month’s Patch Tuesday includes several fixes for remote code execution vulnerabilities affecting GitHub Copilot and multiple integrated development environments (IDEs), such as VS Code, Visual Studio, and JetBrains products. The relevant CVEs are:

  • CVE-2026-21516
  • CVE-2026-21523
  • CVE-2026-21256

These vulnerabilities stem from a command injection flaw that can be triggered through prompt injection, potentially leading to the execution of malicious code or commands.

Risks and Recommendations

Breen emphasizes that developers are high-value targets for threat actors due to their access to sensitive data such as API keys and secrets. He advises organizations to:

  • Understand the risks associated with AI integration in development workflows.
  • Identify systems and workflows that have access to AI agents.
  • Apply least-privilege principles to minimize potential damage if developer secrets are compromised.

元記事: https://krebsonsecurity.com/2026/02/patch-tuesday-february-2026-edition/