
| Threat Type | Actively Exploited Zero-Day Vulnerabilities in Windows and Microsoft Products (Security Feature Bypasses & Elevation of Privilege) |
|---|---|
| Severity | Critical (CVSS 7.5–8.8; 6 Zero-Days Actively Exploited; Multiple Added to CISA KEV Catalog on February 10, 2026) |
| Affected Systems | Windows 10/11, Windows Server 2016–2022; Microsoft Office / Microsoft 365; MSHTML, Desktop Window Manager, Remote Desktop Services, and related components |
| Attack Vector | Network / Local (Phishing links/files, malicious .lnk / Office docs, local authenticated escalation); User interaction often required for initial bypasses |
| Exploitation Status | Actively Exploited in the Wild (6 zero-days confirmed; CVE-2026-21510, CVE-2026-21513, CVE-2026-21514, CVE-2026-21519, CVE-2026-21533 added to CISA KEV on Feb 10, 2026) |
| Mitigation Availability | Patches released February 10, 2026 (Patch Tuesday); Apply via Windows Update / WSUS immediately |
| Core Mechanism | Security feature bypasses (SmartScreen, OLE protections, MSHTML) + local privilege escalation to SYSTEM level |
| Preview Pane Safety | Safe for most (e.g., CVE-2026-21514 not exploitable via Preview Pane); But user interaction (clicking links/files) remains high-risk vector |
Microsoft released its February 2026 Patch Tuesday security updates on February 10, 2026, addressing a total of 58 vulnerabilities across Windows, Office, Azure, Edge, Exchange, and other products. Among these are six zero-day vulnerabilities confirmed to be actively exploited in the wild, with several publicly disclosed before patches became available.
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) acted swiftly, adding multiple of these vulnerabilities — including CVE-2026-21510, CVE-2026-21513, CVE-2026-21514, CVE-2026-21519, and CVE-2026-21533 — to its Known Exploited Vulnerabilities (KEV) catalog on the same day. This rapid inclusion signals that real-world attacks are already occurring and that organizations face immediate risk if they do not apply the patches as soon as possible.
For broader context on the accelerating threat landscape, see our 2026 Cybersecurity Trends analysis.
The February 2026 Patch Tuesday release is one of the most urgent in recent memory. Of the 58 vulnerabilities fixed, six were zero-days under active exploitation. Three of these were publicly known prior to patching, dramatically increasing the likelihood of widespread abuse. CISA’s KEV catalog additions mean federal civilian agencies have until March 3, 2026 to apply mitigations — but every organization, regardless of sector, should treat these as emergency fixes.
These vulnerabilities primarily enable two dangerous outcomes:
Combined with common delivery methods like phishing emails containing malicious .lnk files, Office documents, or HTML content, these flaws provide attackers with reliable paths to initial compromise, persistence, and lateral movement.
Microsoft, security researchers, and threat intelligence providers have confirmed active in-the-wild exploitation of all six zero-days listed above. CISA’s addition of CVE-2026-21510, CVE-2026-21513, CVE-2026-21514, CVE-2026-21519, CVE-2026-21533 (and potentially others) to the KEV catalog on February 10, 2026, is based on credible evidence of real-world attacks. Likely actors include ransomware groups, financially motivated cybercriminals, and possibly advanced persistent threats.
Common indicators of compromise include:
The February 2026 Patch Tuesday release is a critical wake-up call: six actively exploited zero-days, several now formally listed in CISA’s Known Exploited Vulnerabilities catalog, targeting the core of Windows and Office functionality. These are not theoretical risks — adversaries are using them in real attacks right now.
Patch immediately. Hunt for signs of compromise. Strengthen layered defenses. Every hour of delay increases the chance of successful exploitation. ByteVanguard will continue monitoring this threat landscape — stay informed with our updates and threat intelligence reports.
Follow us on X • © 2026 ByteVanguard • Independent Cyber Threat Intelligence

| Threat Type | Actively Exploited Zero-Day Vulnerabilities in Windows and Microsoft Products (Security Feature Bypasses & Elevation of Privilege) |
|---|---|
| Severity | Critical (CVSS 7.5–8.8; 6 Zero-Days Actively Exploited; Multiple Added to CISA KEV Catalog on February 10, 2026) |
| Affected Systems | Windows 10/11, Windows Server 2016–2022; Microsoft Office / Microsoft 365; MSHTML, Desktop Window Manager, Remote Desktop Services, and related components |
| Attack Vector | Network / Local (Phishing links/files, malicious .lnk / Office docs, local authenticated escalation); User interaction often required for initial bypasses |
| Exploitation Status | Actively Exploited in the Wild (6 zero-days confirmed; CVE-2026-21510, CVE-2026-21513, CVE-2026-21514, CVE-2026-21519, CVE-2026-21533 added to CISA KEV on Feb 10, 2026) |
| Mitigation Availability | Patches released February 10, 2026 (Patch Tuesday); Apply via Windows Update / WSUS immediately |
| Core Mechanism | Security feature bypasses (SmartScreen, OLE protections, MSHTML) + local privilege escalation to SYSTEM level |
| Preview Pane Safety | Safe for most (e.g., CVE-2026-21514 not exploitable via Preview Pane); But user interaction (clicking links/files) remains high-risk vector |
Microsoft released its February 2026 Patch Tuesday security updates on February 10, 2026, addressing a total of 58 vulnerabilities across Windows, Office, Azure, Edge, Exchange, and other products. Among these are six zero-day vulnerabilities confirmed to be actively exploited in the wild, with several publicly disclosed before patches became available.
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) acted swiftly, adding multiple of these vulnerabilities — including CVE-2026-21510, CVE-2026-21513, CVE-2026-21514, CVE-2026-21519, and CVE-2026-21533 — to its Known Exploited Vulnerabilities (KEV) catalog on the same day. This rapid inclusion signals that real-world attacks are already occurring and that organizations face immediate risk if they do not apply the patches as soon as possible.
For broader context on the accelerating threat landscape, see our 2026 Cybersecurity Trends analysis.
The February 2026 Patch Tuesday release is one of the most urgent in recent memory. Of the 58 vulnerabilities fixed, six were zero-days under active exploitation. Three of these were publicly known prior to patching, dramatically increasing the likelihood of widespread abuse. CISA’s KEV catalog additions mean federal civilian agencies have until March 3, 2026 to apply mitigations — but every organization, regardless of sector, should treat these as emergency fixes.
These vulnerabilities primarily enable two dangerous outcomes:
Combined with common delivery methods like phishing emails containing malicious .lnk files, Office documents, or HTML content, these flaws provide attackers with reliable paths to initial compromise, persistence, and lateral movement.
Microsoft, security researchers, and threat intelligence providers have confirmed active in-the-wild exploitation of all six zero-days listed above. CISA’s addition of CVE-2026-21510, CVE-2026-21513, CVE-2026-21514, CVE-2026-21519, CVE-2026-21533 (and potentially others) to the KEV catalog on February 10, 2026, is based on credible evidence of real-world attacks. Likely actors include ransomware groups, financially motivated cybercriminals, and possibly advanced persistent threats.
Common indicators of compromise include:
The February 2026 Patch Tuesday release is a critical wake-up call: six actively exploited zero-days, several now formally listed in CISA’s Known Exploited Vulnerabilities catalog, targeting the core of Windows and Office functionality. These are not theoretical risks — adversaries are using them in real attacks right now.
Patch immediately. Hunt for signs of compromise. Strengthen layered defenses. Every hour of delay increases the chance of successful exploitation. ByteVanguard will continue monitoring this threat landscape — stay informed with our updates and threat intelligence reports.
Follow us on X • © 2026 ByteVanguard • Independent Cyber Threat Intelligence