“Security is not a product, but a process.”— Bruce Schneier. This month’s release for US Windows environments underscores that idea.
This February Patch Tuesday fixes 59 CVEs. The bulletin lists 5 Critical, 52 Important, and 2 Moderate issues. The vendor also confirmed six actively exploited zero-days, which raises immediate concern for defenders.
Real-world attacker use makes response urgent. Enterprises with large Windows footprints must weigh timelines for rolling updates. The most risk concentrates in feature bypass, privilege escalation, and remote code execution flaws.
Readers will get an at-a-glance CVE count, a sense of where risk concentrates, and which products are most impacted. Some public exploitation details remain limited. Partners shared severity ratings, but full attack details are still emerging.
Operational relevance: prioritize patches based on exposure, assess business risk like credential theft or endpoint takeover, and map changes to compliance needs in the United States.
Key Takeaways
- February Patch Tuesday fixes 59 CVEs with varied severity.
- Six issues are confirmed as actively exploited, increasing urgency.
- Risk centers on bypass, escalation, and remote code execution flaws.
- Public exploitation details are limited; prioritize high-risk systems now.
- Follow patch timelines to reduce business and compliance exposure.
What February 2026 Patch Tuesday Means for Windows Security in the United States
February’s monthly security release reshapes priorities for US Windows administrators. IT and security teams must translate the bulletin into actionable work across endpoints, servers, and Active Directory estates.
Severity snapshot: 5 Critical, 52 Important, and 2 Moderate issues. Treat Critical items as immediate patch-or-mitigate tasks for exposed systems, while Important fixes enter the next maintenance window with elevated priority.

At-a-glance numbers and where risk concentrates
Elevations of privilege account for the largest share (25), followed by remote code execution (12) and security feature bypass (5). Other categories include spoofing, information disclosure, denial of service, and cross-site scripting.
Privilege issues matter because attackers often use local escalation to reach SYSTEM and disable defenses. Security feature bypass flaws raise phishing success by hiding prompts or security dialogs. Remote code execution remains high-impact, but in many exploit chains it pairs with local escalation or bypass to increase impact.
- Prioritize exposed RDP and hybrid work endpoints.
- Focus hardening in Active Directory and domain-joined servers.
- Adjust vulnerability management cycles to address Critical fixes first.
Microsoft Patches 59 Vulnerabilities Including Six Actively Exploited Zero-Days
Several user-facing components and system services contain security feature bypasses and local elevation paths that attackers chain together. These issues target link handling, HTML rendering, Office content, and core windowing and access services.
Windows Shell — CVE-2026-21510: a protection failure can suppress SmartScreen-style prompts when a user opens a malicious link or shortcut. That quiet bypass lets follow-on payloads run with less chance of detection.
MSHTML framework — CVE-2026-21513: MSHTML is the core HTML renderer. Crafted HTML or .lnk files can bypass execution prompts, improving the success rate of phishing-to-execution flows.
Microsoft Word — CVE-2026-21514: an untrusted input in a security decision lets a malicious Office file bypass protections for embedded content. User interaction — opening the document — is required.
Desktop Window Manager — CVE-2026-21519: a type confusion bug enables local elevation of privilege. After an initial foothold, attackers can leverage this to reach higher system rights without extra user action.
Remote access connection manager (RasMan) — CVE-2026-21525: a null pointer issue causes denial of service. The impact is availability disruption rather than direct data theft.
Windows Remote Desktop Services — CVE-2026-21533: improper privilege management allowed an exploit to alter a service configuration key, enabling privilege escalation and potential local admin creation.
What’s known about exploitation: details remain limited. Reported attacks often require social engineering — opening links, HTML or shortcut files, or documents — and defenders should assume chained activity: bypass → execution → escalation.

| Component | CVE | Impact | Notes |
|---|---|---|---|
| Windows Shell | CVE-2026-21510 | Security feature bypass (SmartScreen suppression) | Quiet delivery of payloads after link/shortcut open |
| MSHTML framework | CVE-2026-21513 | Security feature bypass via crafted HTML/.lnk | Increases phishing-to-execution likelihood |
| Microsoft Word | CVE-2026-21514 | Security decision bypass for embedded content | User must open malicious file |
| Desktop Window Manager | CVE-2026-21519 | Local elevation (type confusion) | Can escalate privileges to SYSTEM after initial compromise |
How Attackers Are Using Feature Bypass and Privilege Escalation to Increase Impact
A quiet suppression of security prompts can turn a simple phishing click into full code execution.
Security feature bypass bugs remove the friction that stops users from opening dangerous files or links. When warnings are gone, phishing and malicious attachments convert at much higher rates. That first step often yields reliable initial code execution.
Security feature bypass as a doorway to payload delivery
Feature bypass in Windows Shell, MSHTML, and Word lowers user friction. Attackers follow suppression with loaders, stealers, or ransomware. The result is predictable execution and faster compromise.
Local elevation of privilege as the second stage
After a foothold, adversaries use local elevation to gain higher privileges. CVE-2026-21519 and CVE-2026-21533 are clear examples: local bugs let attackers reach SYSTEM and disable defenses. That step turns a single compromised user into a broader system threat.
Remote access and why services attract rapid interest
Remote desktop and remote access services are plentiful in enterprise setups. They let attackers move laterally, persist, and expand control. CrowdStrike noted targeting of US and Canada using CVE-2026-21533 binaries since Dec 24, 2025, so prioritize patching and detection for these services now.
Severity Breakdown and Affected Microsoft Products Across This Release
Administrators should map fixes to host roles first, because escalation and execution flaws dominate this cycle.

Severity snapshot: the release covers 5 Critical items, with the remainder classed as Important or Moderate. Treat Critical as immediate patch-or-mitigate work; Important items enter the next maintenance window with higher priority.
Flaw taxonomy and post-patch validation
Leading categories are elevation of privilege (25) and remote code execution (12). Other flaw types include spoofing, information disclosure, denial of service, and cross-site scripting.
After applying fixes, validate service stability, authentication flows, endpoint protections, and remote access logs.
Products and inventory guidance
Windows desktop and Windows Server families saw the most changes. Extended Security Update (ESU) releases also received a large share of fixes.
- Inventory by OS version, server role, and exposed services (RDP, remote access manager, common desktop apps).
- Prioritize RDP-enabled hosts and domain controllers for immediate attention.
- Link severity clusters to data protection: EoP plus RCE elevates risk to credentials, sensitive data, and continuity.
| Category | Count | Action |
|---|---|---|
| Elevation of Privilege | 25 | Patch first; review admin tokens |
| Remote Code Execution | 12 | Mitigate exposed services; apply updates |
| Other (DoS, Spoof, Disclosure) | 22 | Schedule by business impact |
Additional Updates Beyond Windows: Edge and Azure Cloud Vulnerabilities to Note
Beyond OS fixes, browser and cloud updates this cycle demand attention from defenders.
Security teams should scan past the desktop: modern workflows rely on a browser and cloud services that handle identity, routing, and sensitive data.

Edge fixes since January and why the Android spoofing issue matters
Three browser flaws were addressed after January. One notable flaw, CVE-2026-0391 (Moderate, CVSS 6.5), affects Edge for Android.
The issue enables network spoofing through UI misrepresentation. A user can be tricked into trusting a fake prompt or site. That increases phishing success and credential capture.
Azure critical issues and what “cloud remediated” means
February reporting flagged high-severity cloud issues such as an Azure Front Door CVE with near-critical impact and other platform flaws that affect routing and control planes.
Cloud remediated means the vendor deployed backend fixes so customers often do not need to install an update. Still, teams must review advisories, validate configuration, and check logs.
- Remember browser updates follow a rapid cadence and mobile installs lag; plan targeted communications.
- Confirm tenant health advisories, validate identity and access controls, and ensure monitoring covers platform-level changes for data protection.
CISA KEV Catalog Deadline and Industry Signals on Active Exploitation
CISA’s KEV addition signals a public emergency response window for defenders across government and industry.
What changed: CISA added all six exploited zero-days to the Known Exploited Vulnerabilities catalog and set a March 3, 2026 remediation deadline for Federal Civilian Executive Branch agencies.
The KEV listing tells US organizations that these flaws are actively exploited and require urgent handling. For non-federal teams, the deadline is a strong benchmark for internal patch SLAs and risk acceptance timelines.
- Reporting roles: the vendor and GTIG reported three public CVEs; CrowdStrike reported another and observed targeting of US and Canada since Dec 24, 2025.
- Publicly known issues usually let more attackers copy or buy exploit tooling faster than non-disclosed flaws.
- Once details are public, exploitation often scales quickly as actors replicate chains or monetize access.
| Signal | What it means | Action |
|---|---|---|
| KEV listing | Confirmed active exploitation | Prioritize fixes and mitigations |
| March 3, 2026 deadline | Federal remediation timeline | Use as internal SLA benchmark |
| Public disclosure | Higher attacker interest | Harden detection for windows remote and remote desktop services |
Risk tie-back: feature bypasses raise execution rates and privilege flaws enable SYSTEM-level control. Treat these themes as top priorities during patch tuesday follow-up and incident triage.
Conclusion
Admins should treat this update cycle as a reset point for endpoint and service hardening. Rapid patch and verification work reduces risk to windows hosts and the broader system estate.
Key risk recap: feature bypasses lower user-visible warnings and smooth the path to code execution. Privilege escalation can turn a small foothold into full system control and threaten sensitive data.
Close-out checklist: apply OS and component updates, validate windows remote and remote access exposure, and confirm monitoring for post-exploitation behavior.
Also note the Secure Boot certificate transition. Devices that miss this monthly update may enter a degraded security state that limits future boot protections. The move toward baseline defaults and clearer consent prompts shows how security controls are evolving to reduce silent bypass and boost transparency.
FAQ
What does the February 2026 Patch Tuesday release address?
The update fixes a broad set of flaws across Windows and related components, focusing on privilege escalation, remote code execution, and security feature bypass. It also includes fixes for browser and cloud components such as Edge and Azure services. Administrators should prioritize updates that reduce remote access and privilege risks.
Which Windows components are highlighted in this round of fixes?
Key components include the Windows Shell, MSHTML framework, Microsoft Word, Desktop Window Manager, Remote Access Connection Manager (RasMan), and Remote Desktop Services. These areas received patches for bypass and elevation issues as well as denial-of-service and type confusion flaws.
Are any of the flaws being actively exploited in the wild?
Yes. Several of the addressed issues were confirmed as actively exploited before the fixes shipped. Public details are limited, and some exploits require user interaction or a chained sequence of actions. Organizations should update promptly to block known exploitation paths.
How do security feature bypass vulnerabilities increase attacker impact?
Bypass flaws can disable or circumvent protections such as SmartScreen or file-blocking behaviors. Attackers use these bypasses to deliver payloads or to make malicious content appear safe, which can lead to subsequent code execution or persistence when combined with other vulnerabilities.
What role does local elevation of privilege play in modern attacks?
Local elevation of privilege often serves as a second stage after initial access. Once an attacker gains limited execution, a privilege escalation flaw lets them run higher-privileged code, install services, or move laterally. Patching elevation bugs reduces the attack surface for post-compromise activity.
Why are remote access and Remote Desktop vulnerabilities particularly critical?
Remote access services expose endpoints that attackers can target from the network. Flaws in Remote Desktop or RasMan can allow denial-of-service, privilege gain, or remote code execution, giving adversaries a direct path into systems and networks if not mitigated quickly.
Which severity categories appear across this release?
The release spans Critical, Important, and Moderate ratings and covers categories such as elevation of privilege, remote code execution, spoofing, information disclosure, denial of service, and cross-site scripting. Remediation priority should align with exposure and severity.
Are non-Windows products included in these updates?
Yes. The release also covers fixes for Edge and Azure. Edge updates address issues like spoofing on specific platforms, while Azure patches resolve cloud-specific risks. Cloud customers should follow provider guidance for “cloud remediated” changes and apply any required configuration updates.
What actions should organizations take now?
Apply vendor updates as soon as possible, prioritize systems exposed to the internet or running remote access services, and follow compensating controls (network segmentation, MFA, RDP hardening) where immediate patching isn’t feasible. Monitor threat intelligence for indicators tied to the known exploit activity.
Has CISA provided guidance or deadlines for these flaws?
Yes. The Known Exploited Vulnerabilities (KEV) catalog includes the actively exploited issues with a remediation deadline set by CISA. Organizations subject to KEV guidance should comply with the specified due dates and track updates from the Cybersecurity and Infrastructure Security Agency.
Which vendors and researchers contributed to the reporting or analysis?
Public reporting and attribution for these issues have involved multiple parties, including the affected vendor, threat intelligence groups, and security firms such as CrowdStrike and GTIG. Vendor advisories contain attribution notes and mitigation details when available.
How can I test whether systems are affected or already exploited?
Use vendor-provided detection tools, intrusion detection alerts, and EDR telemetry to look for exploit indicators. Check logs for unusual privilege changes, unexpected service installations, and suspicious use of remote access. If compromise is suspected, isolate affected hosts and follow incident response procedures.


