Get a free cybersecurity assessment.

February Patch Tuesday: Six Zero-Days Explained

clint-patterson--jCY4oEMA3o-unsplash

Table of Contents

Key Highlights

  • Microsoft has fixed 59 security issues in the February 2026 Patch Tuesday update.
  • This update has fixes for six zero-day security feature flaws that bad actors are now trying to use.
  • Five issues are marked as Critical, and a few in Azure got a CVSS score of 9.8.
  • The update deals with problems like remote code execution, security feature bypass, and privilege escalation.
  • There are 25 fixes for privilege escalation, making it the most common vulnerability this time.
  • Main products that are affected include Windows, Microsoft Office, and key Azure services.

February Patch Tuesday at a Glance: Key Takeaways for IT Managers and SMBs

Six zero-day vulnerabilities are being used against businesses right now. That’s not a forecast. It’s what Microsoft confirmed when they pushed out the February 2026 Patch Tuesday update.

The critical vulnerabilities this month hit the Windows Shell, the MSHTML framework, and remote desktop services. Specifically, all six zero-days give attackers a way past your security: security feature bypass flaws, privilege escalation, and in some cases, remote code execution. For small businesses running their own Windows environments, getting the patch deployed matters.

Here’s the tension, though. Last month, a Windows update caused cloud-backed file apps to stop responding, and Microsoft had to issue an out-of-band patch to fix it. So when we say “patch fast,” we also know that patches sometimes break things. The realistic approach: prioritize what’s actively exploited, test before rolling out broadly, and have a plan for when something doesn’t go smoothly. That’s what good patch management actually looks like. Not just speed, but controlled speed.

Significant Changes for Windows and Cloud Environments This Month

The Windows operating system picked up 32 patches this cycle. These fixes cover the Windows Kernel, the Remote Access Connection Manager, the Desktop Window Manager, and several other core components. Ultimately, the goal across all of them is blocking threat actors from gaining elevated system privileges or disrupting your environment.

On the cloud side, Microsoft also patched two serious Azure vulnerabilities, one in Azure Front Door and one in Azure Arc. Both involved privilege escalation, and the CVSS scores were high. Fortunately, Microsoft already applied these fixes on their end. Your Azure services are protected. No action needed from you, no configuration changes required.

On top of that, there’s also an update to Secure Boot certificates. The original 2011 certificates are expiring in late June 2026, and this update keeps your operating system boot process intact going forward across all Windows devices. Not urgent in the same way as the zero-days, but worth knowing about.

Zero-Day Vulnerability Spotlight: Windows SmartScreen Security Feature Bypass

CVE-2026-21510 is one of the more concerning flaws this month. It’s a security feature bypass in Windows SmartScreen that works through the Windows Shell. Here’s what happens: an attacker crafts a malicious link or shortcut file, and when someone opens it, the usual SmartScreen warning never shows up. Instead, the operating system just runs the content. No user warning. No prompt asking if you’re sure.

That’s what makes this attack vector so effective for phishing. The person clicking doesn’t see anything unusual. They think it’s a normal file or link. Meanwhile, code execution is already happening in the background. The security feature that was supposed to catch it, Windows SmartScreen, got bypassed entirely.

On top of that, this security feature bypass vulnerability has low attack complexity. It does need user interaction (someone has to click), but it doesn’t require technical skill on the attacker’s side. As a result, any business, any size, is a potential target. As Rapid7’s analysis noted, three of the publicly disclosed zero-days this month are all security feature bypasses reported by the same group of researchers, suggesting these may be connected. Microsoft confirmed CVE-2026-21510 was actively exploited before the patch existed, which is exactly why it’s a priority.

Steps to Protect Your Organization from SmartScreen Attacks

Start with the official fix. Apply the February 2026 Windows update to patch CVE-2026-21510. This corrects how Windows Shell components handle the specific input attackers are exploiting. Without this update, this attack vector remains wide open.

However, patching alone only closes the technical gap. This particular flaw relies on someone clicking a malicious link or shortcut file. That means your people are also part of the defense. Make sure your team knows not to open unexpected .lnk files or click links from unfamiliar sources. In addition, check that Mark-of-the-Web protections are functioning correctly in the Windows Shell, and verify your endpoint detection tools are current.

To protect your environment:

  • First, apply the February 2026 Windows update immediately to address CVE-2026-21510.
  • Then, remind users about the risks of opening unexpected shortcut files or unfamiliar links.
  • Also confirm your antivirus and endpoint detection tools are updated and actively monitoring.
  • Build a patch management process that prioritizes actively exploited vulnerabilities first.

Together, the combination matters. Patching stops the technical exploit, while user awareness stops the social engineering that delivers it.

Zero-Day Insight: MSHTML Framework Security Feature Bypass

CVE-2026-21513 is another zero-day being exploited in the wild. This one targets the MSHTML framework, the web rendering engine baked into many Windows applications, including parts of Microsoft Office. An attacker creates a crafted HTML file or shortcut file that, when opened, skips the normal security warning entirely. As a result, remote code execution becomes possible, meaning someone gains control of the target system. Your data, your access, your operations. All exposed.

The CVSS score here is 8.8. High. It does require user interaction, which makes it a natural fit for social engineering. Think phishing emails with a Microsoft Word attachment, a link that looks routine, or a shortcut file shared through what seems like a normal channel. Just like the SmartScreen bypass, the attack complexity is low. The barrier to using this isn’t technical sophistication. It’s just getting someone to open the file.

Microsoft has already confirmed this is being used now. Threat actors are leveraging this security feature bypass for remote code execution on systems where the patch hasn’t landed yet. Furthermore, Tenable’s breakdown confirmed that both the MSHTML and SmartScreen bypasses can be triggered through malicious HTML files or shortcut files, which means phishing remains the primary delivery method. Until you’ve patched, be cautious with Microsoft Office files, shortcut files, and anything that touches the MSHTML framework.

Recommended Patch Actions for SMB Owners

Six zero-day vulnerabilities, all confirmed actively exploited. That’s the reality for February. If your systems aren’t updated, your business is carrying risk that attackers are already targeting.

Your first move should be patch deployment, but not blind patch deployment. After all, January’s Windows update issues proved that rushing patches to production without testing can create its own set of problems. Instead, good small business cybersecurity means having a process, not just a reaction.

Here’s what that looks like in practice: inventory your systems, identify which ones are exposed to the actively exploited flaws, and patch those first. The vulnerabilities with low attack complexity and confirmed exploitation get priority. Before pushing the update to every machine, test it on a handful of non-critical systems. Watch for issues. Once you know it’s stable, then roll out broadly.

Key steps for your patch deployment:

  • First, prioritize the six actively exploited zero-day vulnerabilities above everything else.
  • Next, test each update on non-critical systems before deploying organization-wide.
  • After that, verify that patches applied successfully and the vulnerabilities are actually resolved.
  • If managing this internally feels like a stretch, CyberGlobal Philadelphia can handle tested patch deployment so your business keeps running without the guesswork.

Critical Azure Vulnerabilities with CVSS 9.8: What You Need to Know

Microsoft’s cloud platform had its own share of critical vulnerabilities this month. A few stood out because of severity alone. The kind of flaws that could let attackers escalate privileges or access sensitive information in your cloud environment. The CVSS scores reflect the potential for high impact if these had been exploited at scale.

The practical news: Microsoft already fixed these on their end. As a result, your Azure instances are protected without you doing anything. Microsoft published the CVEs for transparency, which is the right call, but no action is needed on your part. Here’s the summary:

CVE IDDescriptionCVSS Score
CVE-2026-24300Azure Front Door Elevation of Privilege Vulnerability9.8
CVE-2026-24302Azure Arc Elevation of Privilege Vulnerability8.6
CVE-2026-21532Azure Function Information Disclosure Vulnerability8.2

Which Azure Services Are Affected and How Risks Develop

The most severe was CVE-2026-24300 in Azure Front Door, a 9.8 CVSS score. A remote attacker could elevate their access level with no user interaction required. Similarly, CVE-2026-24302 in Azure Arc was about privilege escalation that an unauthorized attacker could trigger without credentials.

Meanwhile, CVE-2026-21532 hit Azure Function. This one was about information disclosure, where threat actors could potentially access private data being processed by the function. Notably, all three had low attack complexity, meaning they weren’t hard to abuse if you knew where to look.

Because these are cloud-side issues, Microsoft remediated them across their global infrastructure. As a result, the risk is already removed from your affected systems. There are no patches to install and no configuration changes to make. The backend updates protect all Azure customers using these services automatically.

Frequently Asked Questions

How can small businesses safely apply February Patch Tuesday updates without service disruption?

Start by testing the official fix on a small group of non-critical systems first. That catches Windows update issues before they hit production. A managed services partner like CyberGlobal Philadelphia can handle testing and patch deployment together, keeping your small business cybersecurity tight without creating downtime.

Are any vulnerabilities from February Patch Tuesday being actively exploited in real-world attacks?

Yes. Six zero-day vulnerabilities patched this month are confirmed actively exploited by threat actors. These include security feature bypass flaws and privilege escalation issues that can lead to remote code execution. Because of this, they represent serious, immediate risk and should be addressed before anything else.

What’s the recommended process for prioritizing which patches to apply first?

Focus on confirmed risk. The six actively exploited zero-day vulnerabilities come first. After those, address remaining critical vulnerabilities, especially any that enable remote code execution or carry high impact scores. The SANS Internet Storm Center’s CVE-by-CVE breakdown is a good reference for sorting by severity.

93% of data breaches occur in less than one minute, yet it takes companies an average of 207 days to identify a breach.

Protect your business now. Contact us to fortify your defenses and stay ahead.