Microsoft Patch Tuesday February 2026: Six 0‑Days, 58 Fixes and a Major Secure Boot Certificate Update

CyberSecureFox 🦊

Microsoft’s February 2026 Patch Tuesday is one of the most impactful security releases in recent years. The company has addressed 58 vulnerabilities across Windows, Office and related components, including six 0‑day flaws that were either publicly disclosed or already exploited in the wild, and has simultaneously launched a large‑scale Secure Boot certificate rotation that will affect the entire Windows ecosystem.

Key highlights of the February 2026 Microsoft security updates

Out of the 58 vulnerabilities patched, Microsoft classifies five as critical, primarily affecting elevation of privilege and information disclosure scenarios. The remaining issues are rated important but collectively cover a wide attack surface, including security feature bypass, local denial of service, and post‑exploitation privilege escalation paths frequently abused in real‑world intrusions.

Microsoft defines a 0‑day vulnerability as a flaw that was publicly known or actively exploited before a patch became available. In this cycle, six 0‑days were fixed. Three of them had already been publicly disclosed: CVE‑2026‑21510, CVE‑2026‑21514, and CVE‑2026‑21513. These bugs target Windows SmartScreen, the legacy MSHTML engine, and Microsoft Word/Office, respectively, and are particularly valuable for attackers seeking to bypass built‑in defenses without triggering standard user warnings.

Secure Boot certificate rotation: strategic shift for Windows platform security

In parallel with the software patches, Microsoft has begun a phased rollout of new Secure Boot root certificates. The existing certificates, in place since 2011, are approaching their end of life in late June 2026. According to Microsoft’s Windows servicing leadership, these long‑lived root keys are undergoing a planned retirement to maintain trust in the boot chain and reduce systemic risk if legacy keys were ever compromised.

What Secure Boot does and why certificate updates matter

Secure Boot is a UEFI firmware feature that validates the digital signatures of bootloaders and low‑level drivers before the operating system starts. Its purpose is to prevent untrusted or tampered code—such as bootkits and rootkits—from loading before Windows and endpoint security tools are active. In practice, Secure Boot underpins a hardware‑anchored chain of trust from firmware to the OS kernel.

Microsoft reports that most PCs shipped from 2024 onward already use the new Secure Boot certificates at the factory. However, many existing systems will require firmware (UEFI) updates from OEM vendors. To limit disruption, the new certificates will only be enrolled on systems that demonstrate stable behavior after applying recent Windows updates, reflecting lessons learned from past Secure Boot and firmware regressions in the industry.

Operational and security risks of delaying UEFI and firmware updates

Postponing firmware updates can create both availability and security issues. As old Secure Boot certificates expire, organizations that fail to update may encounter boot failures, incompatibility with new security policies, or inability to deploy future hardened boot configurations. From a risk management perspective, now is the time to inventory hardware, review OEM support portals, and establish a controlled firmware patch process that moves from lab testing to pilot groups and then to production.

0‑day vulnerabilities in SmartScreen, MSHTML and Word: bypassing native defenses

CVE‑2026‑21510 is a security feature bypass in Windows SmartScreen and Windows Shell. By luring a user into opening a crafted URL or LNK shortcut file, an attacker can execute malicious code without triggering standard Windows warnings. This effectively bypasses Mark of the Web (MoTW), the mechanism that flags files originating from the internet and normally surfaces risk prompts in Windows and Office.

CVE‑2026‑21513 is another defense bypass, this time in the legacy MSHTML (Trident) engine, still used internally by several Microsoft components. An attacker can achieve code execution by convincing a victim to open a specially crafted HTML or LNK file. Microsoft has not yet disclosed detailed exploitation techniques, which is consistent with its usual approach when 0‑days are under active exploitation and detailed guidance could accelerate copycat attacks.

CVE‑2026‑21514 affects Microsoft Word and Office / Microsoft 365 and enables an attacker to bypass OLE protection designed to block risky COM/OLE controls. Exploitation requires delivery of a malicious document and user interaction to open it. Notably, Microsoft states that the exploit does not trigger via the preview pane, slightly reducing exposure for users who only view attachments in email clients without fully opening them.

These three 0‑days were discovered with contributions from the Google Threat Intelligence Group (GTIG), internal Microsoft teams, and independent researchers. Given GTIG’s documented focus on commercial spyware vendors and state‑sponsored APT activity, it is reasonable to assume that some of these vulnerabilities have been used in targeted surveillance campaigns rather than broad commodity malware attacks.

Privilege escalation and denial of service in core Windows components

CVE‑2026‑21519 is a critical elevation of privilege issue in the Desktop Window Manager (DWM). Successful exploitation grants attackers SYSTEM‑level privileges, enabling full control of the compromised host. Such local privilege escalation bugs are highly prized in multi‑stage attacks, where initial access is gained via phishing or browser/Office exploits and then leveraged to obtain complete administrative control.

CVE‑2026‑21525 is a denial of service (DoS) vulnerability in Windows Remote Access Connection Manager, related to a null pointer dereference. Exploitation leads to a local service crash and potential temporary unavailability. Researchers at ACROS Security, known for their 0patch platform, reported finding an exploit for this issue in a public malware repository in late 2025, and noted that the exploit’s quality suggests work by professional threat operators combining multiple flaws.

CVE‑2026‑21533, identified by CrowdStrike, is an elevation of privilege flaw in Windows Remote Desktop Services (RDS). By manipulating a configuration registry key and substituting it with attacker‑controlled data, an adversary can add a new user to the local Administrators group. While large‑scale exploitation has not yet been documented, security teams should expect increased interest once detailed exploitation techniques become publicly available.

Recommended mitigation and patch management priorities for enterprises

Organizations should prioritize deployment of the February 2026 Windows and Office security updates, with immediate focus on internet‑facing assets, Remote Desktop servers, and high‑value workstations with elevated privileges. Additionally, defenders should harden endpoint configurations by restricting script execution and LNK file usage, tightening Office macro policies, enabling AppLocker, WDAC or equivalent application control, and monitoring logs for suspicious user privilege changes and service configuration modifications.

From a strategic perspective, this Patch Tuesday underscores a consistent pattern in modern attacks: initial compromise often hinges on bypassing native security safeguards, followed by stealthy privilege escalation and lateral movement. Establishing a mature patch management program—covering Windows, Office, UEFI firmware and Secure Boot policies—combined with multi‑layer endpoint protection and rigorous security log analysis, is now essential. Organizations that turn each “update Tuesday” into a predictable, well‑tested operational routine will be far better positioned to prevent, detect and contain the next wave of targeted intrusions.

Leave a Comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.