Close Menu
    Main Menu
    • Home
    • News
    • Tech
    • Robotics
    • ML & Research
    • AI
    • Digital Transformation
    • AI Ethics & Regulation
    • Thought Leadership in AI

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Designing Efficient Multi-Agent Architectures – O’Reilly

    February 11, 2026

    Comau Expands Wearable Robotics With the New Mate-XT Go Exoskeleton, Enabling Superior Ergonomics to Assist Employees Throughout Demanding Environments

    February 11, 2026

    Creating an AI Girlfriend with OurDream

    February 11, 2026
    Facebook X (Twitter) Instagram
    UK Tech InsiderUK Tech Insider
    Facebook X (Twitter) Instagram
    UK Tech InsiderUK Tech Insider
    Home»AI Ethics & Regulation»Microsoft Patches 59 Vulnerabilities Together with Six Actively Exploited Zero-Days
    AI Ethics & Regulation

    Microsoft Patches 59 Vulnerabilities Together with Six Actively Exploited Zero-Days

    Declan MurphyBy Declan MurphyFebruary 11, 2026No Comments6 Mins Read
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Reddit
    Microsoft Patches 59 Vulnerabilities Together with Six Actively Exploited Zero-Days
    Share
    Facebook Twitter LinkedIn Pinterest Email Copy Link


    Microsoft on Tuesday launched safety updates to deal with a set of 59 flaws throughout its software program, together with six vulnerabilities that it stated have been exploited within the wild.

    Of the 59 flaws, 5 are rated Essential, 52 are rated Essential, and two are rated Average in severity. Twenty-five of the patched vulnerabilities have been categorized as privilege escalation, adopted by distant code execution (12), spoofing (7), info disclosure (6), safety function bypass (5), denial-of-service (3), and cross-site scripting (1).

    It is value noting that the patches are along with three safety flaws that Microsoft has addressed in its Edge browser for the reason that launch of the January 2026 Patch Tuesday replace, together with a Average vulnerability impacting the Edge browser for Android (CVE-2026-0391, CVSS rating: 6.5) that would permit an unauthorized attacker to carry out spoofing over a community by benefiting from a “consumer interface misrepresentation of important info.”

    Topping the checklist of this month’s updates are six vulnerabilities which were flagged as actively exploited –

    • CVE-2026-21510 (CVSS rating: 8.8) – A safety mechanism failure in Home windows Shell that enables an unauthorized attacker to bypass a safety function over a community.
    • CVE-2026-21513 (CVSS rating: 8.8) – A safety mechanism failure in MSHTML Framework that enables an unauthorized attacker to bypass a safety function over a community.
    • CVE-2026-21514 (CVSS rating: 7.8) – A reliance on untrusted inputs in a safety determination in Microsoft Workplace Phrase that enables an unauthorized attacker to bypass a safety function domestically.
    • CVE-2026-21519 (CVSS rating: 7.8) – An entry of useful resource utilizing incompatible sort (‘sort confusion’) within the Desktop Window Supervisor that enables a certified attacker to raise privileges domestically.
    • CVE-2026-21525 (CVSS rating: 6.2) – A null pointer dereference in Home windows Distant Entry Connection Supervisor that enables an unauthorized attacker to disclaim service domestically.
    • CVE-2026-21533 (CVSS rating: 7.8) – An improper privilege administration in Home windows Distant Desktop that enables a certified attacker to raise privileges domestically.

    Microsoft’s personal safety groups and Google Menace Intelligence Group (GTIG) have been credited with discovering and reporting the primary three flaws, which have been listed as publicly recognized on the time of launch. There are presently no particulars on how the vulnerabilities are being exploited, and in the event that they had been weaponized as a part of the identical marketing campaign.

    “CVE-2026-21513 is a safety function bypass vulnerability within the Microsoft MSHTML Framework, a core part utilized by Home windows and a number of functions to render HTML content material,” Jack Bicer, director of vulnerability analysis at Action1, stated. “It’s brought on by a safety mechanism failure that enables attackers to bypass execution prompts when customers work together with malicious recordsdata. A crafted file can silently bypass Home windows safety prompts and set off harmful actions with a single click on.”

    Satnam Narang, senior employees analysis engineer at Tenable, stated CVE-2026-21513 and CVE-2026-21514 bear a “lot of similarities” to CVE-2026-21510, the primary distinction being that CVE-2026-21513 may also be exploited utilizing an HTML file, whereas CVE-2026-21514 can solely be exploited utilizing a Microsoft Workplace file.

    As for CVE-2026-21525, it is linked to a zero-day that ACROS Safety’s 0patch service stated it found in December 2025 whereas investigating one other associated flaw in the identical part (CVE-2025-59230).

    “These [CVE-2026-21519 and CVE-2026-21533] are native privilege escalation vulnerabilities, which implies an attacker will need to have already gained entry to a susceptible host,” Kev Breen, senior director of cyber risk analysis at Immersive, advised The Hacker Information by way of electronic mail. “This might happen by way of a malicious attachment, a distant code execution vulnerability, or lateral motion from one other compromised system.”

    “As soon as on the host, the attacker can use these escalation vulnerabilities to raise privileges to SYSTEM. With this stage of entry, a risk actor might disable safety tooling, deploy extra malware, or, in worst-case eventualities, entry secrets and techniques or credentials that would result in full area compromise.”

    The event has prompted the U.S. Cybersecurity and Infrastructure Safety Company (CISA) to add all six vulnerabilities to its Identified Exploited Vulnerabilities (KEV) catalog, requiring Federal Civilian Govt Department (FCEB) businesses to use the fixes by March 3, 2026.

    The replace additionally coincides with Microsoft rolling out up to date Safe Boot certificates to interchange the unique 2011 certificates that may expire in late June 2026. The brand new certificates might be put in by way of the common month-to-month Home windows replace course of with none extra motion.

    “If a tool doesn’t obtain the brand new Safe Boot certificates earlier than the 2011 certificates expire, the PC will proceed to operate usually, and current software program will preserve working,” the tech large stated. “Nonetheless, the system will enter a degraded safety state that limits its means to obtain future boot-level protections.”

    “As new boot‑stage vulnerabilities are found, affected methods develop into more and more uncovered as a result of they’ll now not set up new mitigations. Over time, this may occasionally additionally result in compatibility points, as newer working methods, firmware, {hardware}, or Safe Boot–dependent software program could fail to load.”

    In tandem, the corporate stated it is also strengthening default protections in Home windows by way of two safety initiatives, Home windows Baseline Safety Mode and Person Transparency and Consent. The updates come beneath the purview of the Safe Future Initiative and Home windows Resiliency Initiative.

    “With Home windows Baseline Safety Mode, Home windows will transfer towards working with runtime integrity safeguards enabled by default,” it famous. “These safeguards be sure that solely correctly signed apps, companies, and drivers are allowed to run, serving to to guard the system from tampering or unauthorized adjustments.”

    Person Transparency and Consent, analogous to Apple macOS Transparency, Consent, and Management (TCC) framework, goals to introduce a constant strategy to dealing with safety selections. The working system will immediate customers when apps attempt to entry delicate assets, reminiscent of recordsdata, the digital camera, or the microphone, or after they try to put in different unintended software program.

    “These prompts are designed to be clear and actionable, and you may all the time have the power to assessment and alter your decisions later,” Logan Iyer, Distinguished Engineer at Microsoft, stated. “Apps and AI brokers can even be anticipated to satisfy larger transparency requirements, giving each customers and IT directors higher visibility into their behaviors.”

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Declan Murphy
    • Website

    Related Posts

    GitGuardian Raises $50M Sequence C to Tackle Non-Human Identities Disaster and AI Agent Safety Hole

    February 11, 2026

    GitLab Patches A number of Vulnerabilities Enabling DoS and Cross-Web site Scripting Assaults

    February 11, 2026

    BeyondTrust fixes essential RCE flaw in distant entry instruments

    February 10, 2026
    Top Posts

    Evaluating the Finest AI Video Mills for Social Media

    April 18, 2025

    Utilizing AI To Repair The Innovation Drawback: The Three Step Resolution

    April 18, 2025

    Midjourney V7: Quicker, smarter, extra reasonable

    April 18, 2025

    Meta resumes AI coaching utilizing EU person knowledge

    April 18, 2025
    Don't Miss

    Designing Efficient Multi-Agent Architectures – O’Reilly

    By Oliver ChambersFebruary 11, 2026

    Papers on agentic and multi-agent techniques (MAS) skyrocketed from 820 in 2024 to over 2,500…

    Comau Expands Wearable Robotics With the New Mate-XT Go Exoskeleton, Enabling Superior Ergonomics to Assist Employees Throughout Demanding Environments

    February 11, 2026

    Creating an AI Girlfriend with OurDream

    February 11, 2026

    GitGuardian Raises $50M Sequence C to Tackle Non-Human Identities Disaster and AI Agent Safety Hole

    February 11, 2026
    Stay In Touch
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo

    Subscribe to Updates

    Get the latest creative news from SmartMag about art & design.

    UK Tech Insider
    Facebook X (Twitter) Instagram
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms Of Service
    • Our Authors
    © 2026 UK Tech Insider. All rights reserved by UK Tech Insider.

    Type above and press Enter to search. Press Esc to cancel.