Microsoft Patch Tuesday (Feb 2026): 6 Zero-Days Exploited & Critical Secure Boot Updates

Microsoft’s February 2026 Patch Tuesday is a heavy hitter, addressing 58 vulnerabilities across its ecosystem.

The headline concern for administrators this month is the patch for six actively exploited zero-day vulnerabilities, three of which were publicly disclosed prior to the fix.

In addition to the security flaws, Microsoft has initiated a critical infrastructure update: the rollout of new Secure Boot certificates to replace the 2011 keys set to expire in June 2026.

The Numbers

The 6 Zero-Days Under Attack

Immediate attention is required for these six vulnerabilities currently being leveraged by threat actors:

1.  CVE-2026-21510 (Windows Shell)

A security feature bypass that circumvents SmartScreen and Windows Shell prompts. Attackers use malicious links or shortcut files to execute content without user warnings (Mark of the Web bypass)

2.  CVE-2026-21513 (MSHTML Platform)

A security feature bypass allowing unauthorized actors to circumvent network-based security features.

3.  CVE-2026-21514 (Microsoft Word)

Exploits a weakness in how Word handles COM/OLE controls, bypassing OLE mitigations. It requires a user to open a malicious file (Preview Pane is safe).

4.  CVE-2026-21519 (Desktop Window Manager)

An Elevation of Privilege (EoP) flaw allowing attackers to gain SYSTEM privileges.

5.  CVE-2026-21525 (Windows Remote Access Connection Manager)

A Denial of Service (DoS) vulnerability via null pointer dereference. Originally discovered by 0patch in a malware repository in late 2025.

6.  CVE-2026-21533 (Windows Remote Desktop Services)

An EoP flaw that allows an authenticated attacker to modify service configuration keys and add a new user to the local Administrator group.

Critical Infrastructure: Secure Boot Certificate Rotation

Microsoft is replacing the original 2011 Secure Boot certificates, which expire in June 2026.  This update (KB5077181 & KB5075941 for Windows 11) includes a phased rollout. Devices will only receive the new certificates after broadcasting "sufficient successful update signals" to prevent boot failures.

Other Vendor Updates

  • Adobe: Updates for After Effects, InDesign, and Substance 3D (no zero-days).
  • CISA: Issued a Binding Operational Directive for federal agencies regarding End-of-Support network edge devices.
  • Cisco & Fortinet: Security updates released for Secure Web Appliance and FortiOS/FortiSandbox respectively.