Microsoft patches 6 active zero-days: update Windows NOW
Tech News

Microsoft patches 6 active zero-days: update Windows NOW

5 min read
49 Views
Share:

Microsoft has released its February 2026 Patch Tuesday with fixes for 58 vulnerabilities, including 6 zero-days that are already being actively exploited by hackers. This makes it one of the most critical updates of the year, and experts recommend installing it immediately.

Three of the zero-day vulnerabilities were publicly disclosed before the patch, meaning attackers have had time to develop exploits. If you use Windows, you need to update now.

The 6 zero-day vulnerabilities explained

1. CVE-2026-21510: Windows Shell protection bypass

This is arguably the most dangerous. An attacker can send a malicious link that, with a single click, executes code without showing any warning or consent dialog. It completely bypasses Windows Shell security protections.

Risk: Very high. Can be exploited via email, messages, or malicious websites.

2. CVE-2026-21513: MSHTML/Internet Explorer attack

Affects the MSHTML/Trident engine from Internet Explorer. Attackers can craft malicious HTML files or shortcuts (.lnk) that manipulate browser and Windows Shell handling. Although Internet Explorer is officially retired, its engine remains present in Windows.

3. CVE-2026-21514: malicious Office files

A specially crafted Office file can bypass OLE mitigations in Microsoft 365. This means opening a seemingly harmless Word or Excel document could compromise your system.

4. CVE-2026-21519: privilege escalation via DWM

A Desktop Window Manager vulnerability that allows attackers to escalate privileges to SYSTEM on an already compromised host. Combined with other vulnerabilities, it allows full system takeover.

5. CVE-2026-21533: Remote Desktop escalation

Discovered by CrowdStrike researchers, this Windows Remote Desktop Services flaw allows an attacker to modify service configuration keys to add themselves to the Administrators group.

6. CVE-2026-21525: Remote Access Connection Manager crash

Allows an unprivileged user to crash the RasMan service, affecting VPN and remote access connections.

How to update Windows immediately

  1. Open Settings (Win + I)
  2. Go to Windows Update
  3. Click Check for updates
  4. Install all available updates
  5. Restart your computer (required to apply security patches)

If you use Windows in an enterprise environment, contact your IT department. This patch should be deployed with emergency priority.

What else is in this Patch Tuesday

Beyond the 6 zero-days, Microsoft fixed:

  • 5 critical vulnerabilities (3 privilege escalation, 2 information disclosure)
  • 47 additional vulnerabilities of important severity
  • Patches for Windows, Office, Edge, .NET, Visual Studio, and Azure

Context: why February 2026 is alarming

With 6 actively exploited zero-days, February 2026 is not a typical Patch Tuesday. Experts from Rapid7, Tenable, and CrowdStrike agree this is an emergency-level event requiring accelerated deployment.

Last month (January 2026) Microsoft fixed "only" 3 zero-days. The jump to 6 suggests a concerning trend in the sophistication and frequency of attacks targeting Windows.

J
Written by
Jesús García

Apasionado por la tecnologia y las finanzas personales. Escribo sobre innovacion, inteligencia artificial, inversiones y estrategias para mejorar tu economia. Mi objetivo es hacer que temas complejos sean accesibles para todos.

Share post:

Related posts

Comments

Leave a comment

Recommended Tools

The ones we use in our projects

Affiliate links. No extra cost to you.

Need technology services?

We offer comprehensive web development, mobile apps, consulting, and more.

Web Development Mobile Apps Consulting