2026年2月11日星期三

Microsoft Monthly Security Update (February 2026)

Microsoft Monthly Security Update (February 2026)

Release Date: 11 Feb 2026

RISK: High Risk

TYPE: Operating Systems - Windows OS

Microsoft has released monthly security update for their products:

 

Vulnerable ProductRisk LevelImpactsNotes
WindowsHigh Risk High RiskElevation of Privilege
Remote Code Execution
Security Restriction Bypass
Denial of Service
Spoofing
Information Disclosure

CVE-2026-21510 is being exploited in the wild. An attacker could bypass Windows SmartScreen and Windows Shell security prompts by exploiting improper handling in Windows Shell components, allowing attacker‑controlled content to execute without user warning or consent. Hence, the risk level of this vulnerability is rated as High Risk.

 

CVE-2026-21513 is being exploited in the wild. Protection mechanism failure in MSHTML Framework allows an unauthorized attacker to bypass a security feature over a network. Hence, the risk level of this vulnerability is rated as High Risk.

 

CVE-2026-21519 is being exploited in the wild. Access of resource using incompatible type ('type confusion') in Desktop Window Manager allows an authorized attacker to elevate privileges locally. Hence, the risk level of this vulnerability is rated as Medium Risk.
 

CVE-2026-21525 is being exploited in the wild. Null pointer dereference in Windows Remote Access Connection Manager allows an unauthorized attacker to deny service locally. Hence, the risk level of this vulnerability is rated as High Risk.

 

CVE-2026-21533 is being exploited in the wild. Improper privilege management in Windows Remote Desktop allows an authorized attacker to elevate privileges locally. Hence, the risk level of this vulnerability is rated as Medium Risk.

Extended Security Updates (ESU)High Risk High RiskElevation of Privilege
Remote Code Execution
Security Restriction Bypass
Spoofing
Denial of Service
Information Disclosure

CVE-2026-21510 is being exploited in the wild. An attacker could bypass Windows SmartScreen and Windows Shell security prompts by exploiting improper handling in Windows Shell components, allowing attacker‑controlled content to execute without user warning or consent. Hence, the risk level of this vulnerability is rated as High Risk.

 

CVE-2026-21513 is being exploited in the wild. Protection mechanism failure in MSHTML Framework allows an unauthorized attacker to bypass a security feature over a network. Hence, the risk level of this vulnerability is rated as High Risk.

 

CVE-2026-21519 is being exploited in the wild. Access of resource using incompatible type ('type confusion') in Desktop Window Manager allows an authorized attacker to elevate privileges locally. Hence, the risk level of this vulnerability is rated as Medium Risk.
 

CVE-2026-21525 is being exploited in the wild. Null pointer dereference in Windows Remote Access Connection Manager allows an unauthorized attacker to deny service locally. Hence, the risk level of this vulnerability is rated as High Risk.

 

CVE-2026-21533 is being exploited in the wild. Improper privilege management in Windows Remote Desktop allows an authorized attacker to elevate privileges locally. Hence, the risk level of this vulnerability is rated as Medium Risk.

Developer ToolsMedium Risk Medium RiskSecurity Restriction Bypass
Spoofing
Remote Code Execution
Elevation of Privilege
 
AzureMedium Risk Medium RiskSpoofing
Information Disclosure
Elevation of Privilege
Remote Code Execution
 
Microsoft OfficeMedium Risk Medium RiskElevation of Privilege
Information Disclosure
Spoofing
Security Restriction Bypass
CVE-2026-21514 is being exploited in the wild. Reliance on untrusted inputs in a security decision in Microsoft Office Word allows an unauthorized attacker to bypass a security feature locally.  Hence, the risk level of this vulnerability is rated as Medium Risk.
SQL ServerMedium Risk Medium RiskRemote Code Execution 
BrowserLow Risk Low RiskSpoofing 
Server SoftwareLow Risk Low RiskSpoofing 
System CenterMedium Risk Medium RiskRemote Code Execution 
OtherMedium Risk Medium RiskRemote Code Execution 
AppsMedium Risk Medium RiskRemote Code Execution 

 

Number of 'Extremely High Risk' product(s): 0

Number of 'High Risk' product(s): 2

Number of 'Medium Risk' product(s): 7

Number of 'Low Risk' product(s): 2

Evaluation of overall 'Risk Level': High Risk


Impact

  • Remote Code Execution
  • Denial of Service
  • Elevation of Privilege
  • Spoofing
  • Security Restriction Bypass
  • Information Disclosure

System / Technologies affected

  • Windows
  • Extended Security Updates (ESU)
  • Developer Tools
  • Azure
  • Microsoft Office
  • SQL Server
  • Browser
  • Server Software
  • System Center
  • Other
  • Apps

Solutions

Before installation of the software, please visit the vendor web-site for more details.

  •  Apply fixes issued by the vendor.

Vulnerability Identifier


Source


Related Link

沒有留言:

發佈留言

微軟每月保安更新 (2026年2月)

微軟每月保安更新 (2026年2月) 發佈日期: 2026年02月11日 風險: 高度風險 類型: 操作系統 - 視窗操作系統 微軟已為產品提供本月保安更新:   受影響產品 風險程度 影響 備註 視窗 高度風險 權限提升 ...