Patch Tuesday:​ February 2026's Microsoft Security Updates

Stay ahead of critical vulnerabilities with our breakdown of this month's Microsoft security patches.

Release Date: Tuesday, February 10, 2026
Release Time: 10:00 AM PST / 1:00 PM EST / 6:00 PM UTC
Status: Released
Last Updated: February 11, 2026

Executive Summary

Microsoft's February 2026 Patch Tuesday has released security updates for 58 vulnerabilities, including an unprecedented 6 actively exploited zero-day vulnerabilities and 3 additional publicly disclosed zero-days. This marks one of the most critical Patch Tuesday releases in recent history, requiring immediate attention from IT administrators worldwide.

CRITICAL ALERT - Immediate Action Required:

  • Total Vulnerabilities Fixed: 58 flaws

  • Actively Exploited Zero-Days: 6 vulnerabilities being used in real-world attacks

  • Publicly Disclosed Zero-Days: 3 additional vulnerabilities (within the 6 exploited)

  • Critical Severity: 5 vulnerabilities (3 Elevation of Privilege, 2 Information Disclosure)

  • Key Update Packages: KB5077181 (Windows 11 24H2/25H2), KB5075941 (Windows 11 23H2)

  • Build Numbers: 26100.7840 (24H2) | 26200.7840 (25H2) | 22631.6649 (23H2)

Vulnerability Breakdown by Category

The 58 vulnerabilities addressed in February 2026 Patch Tuesday are categorized as follows:

  • Elevation of Privilege: Multiple vulnerabilities (including 3 Critical)

  • Remote Code Execution: Multiple vulnerabilities

  • Information Disclosure: Multiple vulnerabilities (including 2 Critical)

  • Security Feature Bypass: Multiple vulnerabilities (several actively exploited)

  • Denial of Service: Multiple vulnerabilities

  • Spoofing: Multiple vulnerabilities

Note: This count excludes 3 Microsoft Edge vulnerabilities fixed earlier in February.

The 6 Actively Exploited Zero-Day Vulnerabilities

February 2026 marks an alarming milestone with six zero-day vulnerabilities actively exploited in the wild. Three of these were publicly disclosed before patches were available. All require immediate patching.

CVE-2026-21510 - Windows Shell Security Feature Bypass Vulnerability

Status: Actively Exploited | Publicly Disclosed

Attack Vector: An attacker must convince a user to open a malicious link or shortcut file

Impact: Bypass Windows SmartScreen and Windows Shell security prompts through improper handling in Windows Shell components. This allows attacker-controlled content to execute without user warning or consent.

Why It Matters: This vulnerability likely allows attackers to bypass Mark of the Web (MoTW) security warnings, a critical Windows security feature that protects users from malicious downloads.

Discovered By: Microsoft Threat Intelligence Center (MSTIC), Microsoft Security Response Center (MSRC), Office Product Group Security Team, Google Threat Intelligence Group, and an anonymous researcher

CVE-2026-21513 - MSHTML Framework Security Feature Bypass Vulnerability

Status: Actively Exploited | Publicly Disclosed

Attack Vector: Protection mechanism failure in MSHTML Framework allows an unauthorized attacker to bypass a security feature over a network

Impact: Attackers can bypass security features in the MSHTML rendering engine, which is still used by various Windows components despite Internet Explorer's deprecation.

Current Threat: Active exploitation confirmed, but Microsoft has not released details on how this is being exploited in the wild.

Discovered By: Microsoft Threat Intelligence Center (MSTIC), Microsoft Security Response Center (MSRC), Office Product Group Security Team, and Google Threat Intelligence Group

CVE-2026-21514 - Microsoft Word Security Feature Bypass Vulnerability

Status: Actively Exploited | Publicly Disclosed

Attack Vector: An attacker must send a user a malicious Office file and convince them to open it

Impact: Bypasses OLE mitigations in Microsoft 365 and Microsoft Office which protect users from vulnerable COM/OLE controls

Important Note: This vulnerability cannot be exploited through the Office Preview Pane

Affected Products:

  • Microsoft Office 2016

  • Microsoft Office 2019

  • Microsoft Office LTSC 2021

  • Microsoft Office LTSC 2024

  • Microsoft 365 Apps for Enterprise

Discovered By: Microsoft Threat Intelligence Center (MSTIC), Microsoft Security Response Center (MSRC), Office Product Group Security Team, Google Threat Intelligence Group, and an anonymous researcher

Campaign Analysis: It is currently unclear if CVE-2026-21510, CVE-2026-21513, and CVE-2026-21514 were exploited in the same attack campaign, as Microsoft has not released detailed exploitation information.

CVE-2026-21519 - Desktop Window Manager Elevation of Privilege Vulnerability

Status: Actively Exploited

Impact: An attacker who successfully exploited this vulnerability could gain SYSTEM privileges

Why It's Critical: SYSTEM-level access is the highest privilege level in Windows, giving attackers complete control over the compromised system.

Exploitation Details: No details have been shared on how this vulnerability is being exploited in the wild.

Discovered By: Microsoft Threat Intelligence Center (MSTIC) and Microsoft Security Response Center (MSRC)

CVE-2026-21525 - Windows Remote Access Connection Manager Denial of Service Vulnerability

Status: Actively Exploited

Attack Vector: Null pointer dereference in Windows Remote Access Connection Manager allows an unauthorized attacker to deny service locally

Impact: Attackers can crash or freeze the Windows Remote Access Connection Manager service, disrupting VPN and remote access connectivity.

Discovered By: Microsoft Threat Intelligence Center (MSTIC) and Microsoft Security Response Center (MSRC)

Sixth Actively Exploited Zero-Day

Status: Actively Exploited

Microsoft has confirmed a sixth actively exploited zero-day vulnerability. Details are being compiled from Microsoft Security Response Center advisories.

Critical Vulnerabilities (Not Actively Exploited)

In addition to the actively exploited zero-days, Microsoft has identified 5 Critical vulnerabilities in this release:

  • 3 Elevation of Privilege vulnerabilities - Allow attackers to gain higher system privileges

  • 2 Information Disclosure vulnerabilities - Allow unauthorized access to sensitive data

While these are not currently exploited, their Critical severity rating means they should be prioritized in your deployment schedule immediately following the zero-day patches.

Context: January 2026's Challenging Start

February's release comes on the heels of an exceptionally difficult January 2026:

January 2026 Patch Tuesday Recap

  • 114 vulnerabilities patched – One of the largest January releases in recent history

  • 8 critical vulnerabilities including remote code execution (RCE) and elevation of privilege (EoP) flaws

  • 3 zero-day vulnerabilities (1 actively exploited: CVE-2026-20805 Desktop Window Manager)

  • Added to CISA's Known Exploited Vulnerabilities catalog

  • U.S. federal agencies required to patch by February 3, 2026

Three Emergency Out-of-Band (OOB) Updates in January

January 2026 required three emergency patches between regular Patch Tuesdays, all of which are consolidated into February's update:

OOB Update #1 (January 17, 2026)

  • Fixed credential prompt failures during Remote Desktop Protocol (RDP) connections

  • Addressed remote appliance connection issues

  • Affected: Windows 10, 11, Server 2019, 2022, 2025

OOB Update #2 (January 24, 2026)

  • Fixed Microsoft Outlook Classic issues with .pst files on cloud storage (OneDrive)

  • Major impact on users storing email in cloud

  • Applied to all supported Windows versions

OOB Update #3 (January 26, 2026) - Zero-Day Fix

  • CVE-2026-21509: Microsoft Office Security Feature Bypass (actively exploited)

  • Attack vector: Malicious Office files bypassing OLE mitigations

  • CISA deadline for federal agencies: February 16, 2026

  • Affects Office 2016, 2019, LTSC 2021, LTSC 2024, Microsoft 365 Apps for Enterprise

Important: All three January OOB fixes are included in February's cumulative update.

New Features in February 2026 Update

Despite the focus on critical security fixes, February brings several significant quality-of-life improvements to Windows 11:

1. Smart App Control – Toggle Without Reinstallation

What Changed: Previously, enabling Smart App Control permanently locked the setting—disabling it required a complete Windows reinstallation.

What's New: Users can now toggle Smart App Control on/off through Windows Security settings without reinstalling Windows.

How to Access:

  1. Open Windows Security

  2. Navigate to App & Browser Control

  3. Select Smart App Control

  4. Toggle setting as needed

Why It Matters: This flexibility encourages organizations to test this security feature without fear of permanent commitment.

2. Windows Hello Enhanced Sign-in Security – External Device Support

What's New: Enhanced Sign-in Security now works with external fingerprint readers and third-party biometric devices, not just built-in laptop sensors.

Benefit: Organizations can deploy desktop PCs with external biometric readers while leveraging Windows 11's strongest authentication protections.

Security Impact: Extends Windows Hello's resistance to credential theft and phishing attacks to a broader range of hardware configurations.

3. Cross-Device Resume for Android Apps

What's New: Resume Android apps and activities directly on Windows 11 desktop using the Phone Link feature.

Examples:

  • Continue playing Spotify from your phone on your PC

  • Pick up browsing sessions from mobile Chrome

  • Resume mobile Office apps on desktop

Availability: Rolling out to Windows 11 versions 24H2 and 25H2 via Controlled Feature Rollout (CFR).

4. Voice Access and Voice Typing Improvements

  • New Setup Wizard: Streamlined onboarding for Voice Access

  • Enhanced Controls: Customize wait times before voice commands execute

  • Better Recognition: Improved accuracy and reliability for hands-free input

  • Accessibility Focus: More granular control over Narrator announcements

5. Additional Quality Improvements

  • Windows MIDI Services 2.0: Major upgrade for musicians and audio professionals

  • File Explorer Performance: Faster folder navigation and reduced lag

  • Settings App Device Info Card: Quick hardware specifications on Settings home page

  • Gaming Fixes: Resolved device eligibility detection for full-screen gaming

  • Wi-Fi Fixes: Resolved WPA3-Personal connection failures from January update

  • Secure Boot Certificate Updates: Phased rollout to prevent certificate expiration issues

Windows Update Package Details

For Windows 11 Versions 24H2 and 25H2

KB Number: KB5077181
Build Numbers:

  • Windows 11 24H2: Build 26100.7840

  • Windows 11 25H2: Build 26200.7840

For Windows 11 Version 23H2

KB Number: KB5075941
Build Number: 22631.6649

For Windows 10 Extended Security Updates (ESU)

KB Number: KB5075912
Build Number: 19045.6937

⚠️ Windows 10 ESU Reminder: Extended Security Updates support ends October 2026. Organizations should accelerate migration planning to Windows 11.

URGENT: Deployment Strategy for Zero-Day Threats

Why February 2026 Requires Immediate Action

With 6 actively exploited zero-day vulnerabilities, February 2026 is not a typical Patch Tuesday. This is an emergency-level security event requiring accelerated deployment timelines.

Key Risk Factors:

  1. Active Exploitation: Attackers are already using these vulnerabilities in real-world campaigns

  2. Public Disclosure: 3 of the 6 zero-days were publicly disclosed, increasing attacker awareness

  3. Broad Impact: Affects Windows OS, Office applications, and critical system components

  4. SYSTEM-Level Access: At least one vulnerability grants complete system control

  5. Security Feature Bypass: Multiple vulnerabilities disable critical Windows protections

Accelerated Deployment Timeline (Zero-Day Response)

Phase 1: Emergency Testing (February 10-11, 2026)

Timeline: 24-36 hours maximum

Actions:

  • Download updates to staging environment immediately at 10 AM PST

  • Rapid compatibility testing on critical applications only

  • Focus on validating zero-day fixes don't break production

  • Document any blockers immediately

  • Decision point by end of February 11: Go/No-Go for production deployment

Target Systems: Test lab only (compressed timeline)

Phase 2: Emergency Deployment to Critical Systems (February 12-13, 2026)

Timeline: 48 hours after release

Priority Targets:

  • Internet-facing systems - Highest risk of exploitation

  • Systems running Office applications - CVE-2026-21514 targets Word

  • VPN/Remote access infrastructure - CVE-2026-21525 targets Remote Access Connection Manager

  • Systems with elevated privileges - CVE-2026-21519 grants SYSTEM access

  • Executive/high-value targets - Often targeted in zero-day campaigns

Deployment Strategy: 30-50% of critical infrastructure

Phase 3: Broad Production Rollout (February 14-17, 2026)

Timeline: Week 1 completion

Actions:

  • Deploy to remaining production systems (75-90%)

  • Focus on all Office users (Word vulnerability)

  • Update all Windows 11 and Windows 10 ESU endpoints

  • Monitor for exploitation attempts in logs

  • Maintain rapid response capability

Target: 90% deployment by end of Week 1

Phase 4: Complete Deployment (February 18-21, 2026)

Timeline: Full coverage by end of Week 2

Actions:

  • Deploy to remaining specialized systems

  • Address any deployment failures

  • Complete 100% organizational coverage

  • Document lessons learned

  • Prepare incident response if exploitation detected

Target: 100% deployment completion

Critical Pre-Deployment Actions

✅ Before Deploying (Complete Immediately):

Infrastructure:

  • Verify all backups are current and restorable

  • Test rollback procedures

  • Ensure WSUS/SCCM/Intune is operational

  • Verify network capacity for rapid deployment

  • Establish 24/7 monitoring for deployment week

Team Coordination:

  • Activate emergency patch response team

  • Schedule emergency maintenance windows

  • Notify all stakeholders of zero-day situation

  • Establish war room/command center

  • Brief executive leadership on risk

Security Monitoring:

  • Enable enhanced logging on critical systems

  • Monitor for indicators of zero-day exploitation

  • Review security alerts from January-February

  • Coordinate with SOC/security team

  • Establish incident response procedures

Testing Focus Areas for Zero-Days

Prioritize testing these specific areas affected by actively exploited vulnerabilities:

  1. Microsoft Office/Word: Test document opening, editing, saving (CVE-2026-21514)

  2. File Downloads: Verify SmartScreen warnings appear (CVE-2026-21510)

  3. Web Content: Test MSHTML-based applications (CVE-2026-21513)

  4. Remote Access: Verify VPN/RDP connectivity (CVE-2026-21525)

  5. Desktop Window Manager: Check for system stability (CVE-2026-21519)

  6. Smart App Control: Test new toggle functionality if deployed

  7. Windows Hello: Verify external fingerprint reader support

Known Issues and Workarounds

⚠️ Known Issues (As of February 11, 2026):

  1. Controlled Feature Rollout: New features may not appear immediately on all devices

    • Impact: Smart App Control toggle, Cross-Device Resume may be delayed

    • Workaround: Wait for natural rollout (features not critical for security)

  2. Secure Boot Certificate Deployment: Phased rollout may delay certificate updates

    • Impact: Some systems may not receive new certificates immediately

    • Mitigation: Microsoft monitors device health before deploying

Monitor Official Sources:

Additional Third-Party Security Updates

Adobe Creative Cloud (February 2026)

Adobe released security updates for:

  • After Effects, Animate, Audition
  • InDesign, Substance 3D
  • Adobe Lightroom Classic
  • Note: None of the Adobe flaws are actively exploited

Check the Adobe Security Bulletin for full details.

BeyondTrust

Released security updates for a critical RCE flaw in:

  • Remote Support (RS) software
  • Privileged Remote Access (PRA) software

CISA Binding Operational Directive

CISA issued a new directive requiring federal agencies to remove network edge devices that have reached end of support.

Cisco Security Updates

Security updates released for:

  • Secure Web Appliance
  • Cisco Meeting Management
  • Additional products

Fortinet Security Updates

Updates released for:

  • FortiOS
  • FortiSandbox

Google Android

February 2026 security bulletin released with no security fixes (maintenance release only).

Google Chrome

Version 145: Expected around February 10-11

  • Multiple security fixes
  • Performance improvements

Mozilla Firefox

Version 148: Expected around February 11-12

  • Security patches
  • Thunderbird 148 also anticipated
  • Firefox ESR updates

Looking Ahead: NTLM Deprecation Timeline

Important Planning Alert: NTLM Phase-Out Begins

Microsoft continues its three-phase plan to deprecate NTLM authentication:

Phase 1 (Current - Available Now):

  • Advanced NTLM auditing available in Server 2025, Windows 11 24H2+
  • Organizations should enable auditing to identify NTLM usage
  • Action Required: Begin mapping NTLM dependencies now

Phase 2 (Coming Soon - Next Major Update):

  • Major OS updates will address "pain points" where Kerberos reverts to NTLM
  • Expected with next major Windows Server update
  • Improved Kerberos implementation

Phase 3 (Future - Next Major Server Release):

  • NTLM disabled by default in next major Server release
  • Code will remain but require explicit re-enabling
  • Legacy support only

Recommended Actions:

  • Use Windows 11 24H2's auditing tools to identify NTLM dependencies
  • Begin migrating to Kerberos authentication
  • Test applications for Kerberos compatibility
  • Document any applications requiring NTLM

Complete CVE List - February 2026 Patch Tuesday

Below is the complete list of vulnerabilities addressed in February 2026. For full technical details, consult the Microsoft Security Response Center.

Actively Exploited Zero-Day Vulnerabilities (Priority 1)

CVE IDTitleSeverityStatus
CVE-2026-21510Windows Shell Security Feature Bypass VulnerabilityImportantActively Exploited | Publicly Disclosed
CVE-2026-21513MSHTML Framework Security Feature Bypass VulnerabilityImportantActively Exploited | Publicly Disclosed
CVE-2026-21514Microsoft Word Security Feature Bypass VulnerabilityImportantActively Exploited | Publicly Disclosed
CVE-2026-21519Desktop Window Manager Elevation of Privilege VulnerabilityImportantActively Exploited
CVE-2026-21525Windows Remote Access Connection Manager Denial of Service VulnerabilityImportantActively Exploited
CVE-2026-XXXXXSixth Zero-Day (Details Pending from MSRC)TBDActively Exploited

Critical Vulnerabilities (Priority 2)

CategoryCountDescription
Elevation of Privilege3Allow attackers to gain higher system privileges
Information Disclosure2Allow unauthorized access to sensitive data

Full CVE details with specific vulnerability IDs will be available from the Microsoft Security Update Guide.

Additional CVEs Addressed in February 2026

The remaining vulnerabilities (not actively exploited but still important) include:

  • Additional Elevation of Privilege vulnerabilities
  • Remote Code Execution vulnerabilities
  • Information Disclosure vulnerabilities
  • Security Feature Bypass vulnerabilities
  • Spoofing vulnerabilities
  • Denial of Service vulnerabilities

Previously Disclosed CVEs (Included in February Update)

CVE IDTitleOriginal Disclosure
CVE-2026-1862Chromium: Type Confusion in V82026-02-06
CVE-2026-1861Chromium: Heap buffer overflow in libvpx2026-02-05
CVE-2026-21532Azure Function Information Disclosure Vulnerability2026-02-05
CVE-2026-24302Azure Arc Elevation of Privilege Vulnerability2026-02-05
CVE-2026-0391Microsoft Edge (Chromium-based) for Android Spoofing Vulnerability2026-02-05
CVE-2026-24300Azure Front Door Elevation of Privilege Vulnerability2026-02-05
CVE-2026-1504Chromium: Inappropriate implementation in Background Fetch API2026-01-30
CVE-2026-20960PowerApps Desktop Client Remote Code Execution Vulnerability2026-01-29
CVE-2026-20805Desktop Window Manager Information Disclosure Vulnerability (January Zero-Day)2026-01-27
CVE-2026-21509Microsoft Office Security Feature Bypass Vulnerability (January OOB Zero-Day)2026-01-26
CVE-2026-1220Chromium: Race in V82026-01-23
CVE-2026-21521Word Copilot Information Disclosure Vulnerability2026-01-22
CVE-2026-24307M365 Copilot Information Disclosure Vulnerability2026-01-22
CVE-2026-21227Azure Logic Apps Elevation of Privilege Vulnerability2026-01-22
CVE-2026-24305Azure Entra ID Elevation of Privilege Vulnerability2026-01-22

Recommended Deployment Strategy

Phase 1: Testing & Validation (February 10-11)

Timeline: First 24-48 hours after release

Actions:

  1. Download updates to staging environment immediately after 10 AM PST release
  2. Deploy to test systems mirroring production
  3. Run through critical test scenarios:
    • Application compatibility testing
    • New feature validation (Smart App Control, Windows Hello, Voice Access)
    • Performance benchmarking
    • Security feature verification
  4. Monitor Microsoft forums and community reports for issues
  5. Document any problems encountered

Target Systems: Non-production test environment only

Phase 2: Limited Production Deployment (February 12-13)

Timeline: 48-72 hours after successful testing

Actions:

  1. Deploy to pilot group (10-20% of production systems)
  2. Focus on non-critical systems first
  3. Continuous monitoring for unexpected behavior
  4. Gather user feedback
  5. Verify no compatibility issues with line-of-business applications

Target Systems:

  • Non-critical workstations
  • IT team devices
  • Volunteer early adopters

Phase 3: Broad Rollout (February 14-18)

Timeline: Week 1 completion

Actions:

  1. Deploy to remaining standard workstations (50-75%)
  2. Expand to more critical systems
  3. Maintain communication channels for issue reporting
  4. Monitor deployment dashboards
  5. Address any failures promptly

Target Systems:

  • General user workstations
  • Standard servers
  • Office applications

Phase 4: Critical Systems & Final Deployment (February 19-21)

Timeline: Week 2 completion

Actions:

  1. Deploy to most critical infrastructure
  2. Complete deployment to 100% of managed devices
  3. Update specialized systems requiring extended testing
  4. Document final results
  5. Prepare month-end reporting

Target Systems:

  • Production servers
  • Internet-facing systems
  • High-availability infrastructure
  • Specialized/custom environments

Best Practices for February

  • Enable automatic updates for personal devices and home users
  • Review the Security Update Guide when bulletins are published on February 10
  • Monitor security advisories for any vulnerabilities requiring immediate attention
  • Communicate with stakeholders about potential maintenance windows
  • Document any issues encountered and report them to Microsoft through appropriate channels
  • Maintain backup systems before deploying patches to production environments

Preparation Checklist

Before Patch Tuesday arrives, ensure you have:

  • Inventory of all systems requiring updates
  • Testing environment configured and ready
  • Backup and recovery procedures verified
  • Communication plan for notifying users of maintenance windows
  • Monitoring tools in place to track deployment progress
  • Rollback procedures documented and tested

The Bottom Line

Patches are essential software updates written to fix bugs and security vulnerabilities. Keeping applications and operating systems updated prevents attackers from exploiting known security flaws to access business-critical data and systems.

IT teams should approach February's Patch Tuesday with a balance of urgency and caution, moving quickly on critical security fixes while maintaining robust testing procedures to catch any potential issues before they impact production systems.

Regular patching is a cornerstone of good cybersecurity hygiene. While it requires planning and resources, the alternative of leaving systems vulnerable to known exploits poses far greater risks to organizations.

After Deployment

Once patches are deployed:

  • Monitor systems for any unexpected behavior
  • Verify that critical applications continue functioning properly
  • Document any compatibility issues for future reference
  • Update your patch management records
  • Plan for the next month's Patch Tuesday cycle

Where to Find Information on February 10

Official Microsoft Resources

Microsoft Security Response Center (MSRC)

Microsoft Update Catalog

Windows Release Health Dashboard

Microsoft Security Blog

Microsoft's February 2026 Patch Tuesday represents one of the most critical security events in recent Windows history. With 6 actively exploited zero-day vulnerabilities affecting core Windows components, Office applications, and system security features, organizations face an immediate and serious threat.

The coordination between Microsoft's Threat Intelligence Center, Security Response Center, Office Security Team, and Google's Threat Intelligence Group in discovering these vulnerabilities suggests sophisticated attack campaigns may be underway. The fact that 3 of these zero-days were publicly disclosed before patches were available further increases the urgency.

This is not a time for business-as-usual patch management. IT teams must activate emergency response procedures, accelerate deployment timelines, and treat this as the critical security event it is.

Key Takeaways - Emergency Response:

  • Deploy within 72 hours – 6 zero-days require emergency response timelines

  • Prioritize Office environments – CVE-2026-21514 targets Word users

  • Monitor for compromise indicators – Check for signs of exploitation since January

  • Brief executive leadership – This is a board-level security event

  • Maintain incident response readiness – Be prepared to respond if exploitation detected

  • Document everything – Track deployment and any anomalies

  • Accelerate Windows 11 migration – Windows 10 ESU ends October 2026

The silver lining is that Microsoft has now released patches for all 6 actively exploited vulnerabilities. Organizations that deploy rapidly can close these attack vectors before threat actors expand their campaigns.

Stay vigilant, deploy urgently but carefully, and keep your security teams on high alert. This is one Patch Tuesday that demands your immediate and full attention.