Vai al contenuto

February’s Patch Tuesday assumes battle stations

Just 58 CVEs to spar with in February, but plenty are already under attack
Angela Gunn

Microsoft on Tuesday released 58 patches affecting 15 product families. Five of the addressed issues, all involving Azure, are considered by Microsoft to be of Critical severity, though only two require urgent attention (more on that below). Fifteen have a CVSS base score of 8.0 or higher, including two with a 9.8 base score. Six are known to be under active exploit in the wild, and three are publicly disclosed (including one not yet known to be under exploit). 

At patch time, five CVEs are judged more likely to be exploited in the next 30 days by the company’s estimation, in addition to the six already detected to be so. Various of this month’s issues are amenable to direct detection by Sophos protections, and we include information on those in a table below. The release also includes advisory information on three Edge patches released last week.

We are as always including at the end of this post appendices listing all Microsoft’s patches sorted by severity (Appendix A), by predicted exploitability timeline and CVSS Base score (Appendix B), and by product family (Appendix C). Appendix E provides a breakout of the patches affecting the various Windows Server platforms.

By the numbers

  • Total CVEs: 58
  • Publicly disclosed: 3
  • Exploit detected: 6
  • Severity
    • Critical: 5
    • Important: 52
    • Moderate: 1
  • Impact:
    • Denial of Service: 3
    • Elevation of Privilege: 26
    • Information Disclosure: 6
    • Remote Code Execution: 11
    • Security Feature Bypass: 5
    • Spoofing: 7
  • CVSS base score 9.0 or greater: 2
  • CVSS base score 8.0 or greater: 15

2602pt-figure1.png
Figure 1: Elevation of Privilege issues were once again the most common type in February’s patches

Products

  • Windows: 31
  • Azure: 10
  • 365: 6
  • Office: 6
  • Visual Studio: 4
  • Excel: 3
  • SharePoint: 2
  • Word: 2
  • .NET: 1
  • Defender for Linux: 1
  • Exchange: 1
  • JetBrains: 1
  • Notepad: 1
  • Power BI: 1
  • Windows App for Mac: 1

As is our custom for this list, CVEs that apply to more than one product family are counted once for each family they affect. We note, by the way, that CVE names don’t always reflect affected product families closely. In particular, some CVEs names in the Office family may mention products that don’t appear in the list of products affected by the CVE, and vice versa.

2602pt-figure2.png
Figure 2: Windows had (as it usually does) the biggest patch set this month, but Azure owned all the Critical-severity CVEs. Three of those Critical-severity issues were patched ahead of Patch Tuesday, but two affecting ACI Confidential Containers were not

2602pt-figure3.png
Figure 3: It seems that 2026 is The Year Of Unfortunately Elevated Privilege… at least so far

Notable February updates

In addition to the issues discussed above, several specific items merit attention.

CVE-2026-21510 -- Windows Shell Security Feature Bypass Vulnerability

One of the three February vulnerabilities that has been publicly disclosed and is currently under active attack in the wild, this CVE is a nasty little piece of work – according to Microsoft, “an attacker could bypass Windows SmartScreen and Windows Shell security prompts by exploiting improper handling in Windows Shell components, allowing attacker‑controlled content to execute without user warning or consent.” It also affects all supported versions of Windows (both client and server), making this CVE an easy choice to prioritize this month.

CVE-2026-21513 -- Internet Explorer Security Feature Bypass Vulnerability
CVE-2026-21514 -- Microsoft Word Security Feature Bypass Vulnerability

Both of these security feature bypass vulnerabilities are under active exploit in the wild; the Word CVE, which Microsoft lists as affecting 365 and Office but no specific version of Word, is one of the three that has been publicly disclosed this month. The two patches also share sequential CVE numbers (occasionally a sign that they were discovered in the course of a single investigation), a reliance on OLE, and an easy path to exploitation – all the target needs to do is click a malicious link or, for Office, open a malicious document.

CVE-2026-21260 -- Microsoft Outlook Spoofing Vulnerability
CVE-2026-21511 -- Microsoft Outlook Spoofing Vulnerability

Identically named but differing substantially in expected exploitability, both of these CVEs affect 365, Office, SharePoint, and Word (Outlook, though mentioned in the title, does not figure in the affected-products list published by Microsoft) and both can be triggered via Preview Pane. CVE-2026-21511 has been publicly disclosed and Microsoft considers it more likely to be exploited within the next 30 days. Near-term exploitation of CVE-2026-21260, on the other hand, is thought to be unlikely.

CVE-2026-21531 -- Azure SDK for Python Remote Code Execution Vulnerability

It’s good that this CVSS Base 9.8 bug is likely hard to exploit, because based on the description it just might manage to be both RCE and EoP in nature. According to Microsoft’s information, “an attacker could supply a maliciously crafted continuation token that, when processed by the Azure AI Language Conversations Authoring SDK, triggers unsafe deserialization and executes attacker‑controlled code on the system using the SDK.” Bad vibes only.

Sophos protections

CVESophos Intercept X/Endpoint IPSSophos XGS Firewall
CVE-2026-21231Exp/2621231-AExp/2621231-A
CVE-2026-21238Exp/2621238-AExp/2621238-A
CVE-2026-21241Exp/2621241-AExp/2621241-A
CVE-2026-21253Exp/2621253-AExp/2621253-A
CVE-2026-21510sid:2312232sid:2312232
CVE-2026-21513sid:2312235sid:2312235
CVE-2026-21514Exp/2621514-A, sid:2312237, sid:2312238sid:2312233
CVE-2026-21519Exp/2621519-AExp/2621519-A
CVE-2026-21525Exp/2621525-AExp/2621525-A
CVE-2026-21533Exp/2621533-AExp/2621533-A

As you can every month, if you don’t want to wait for your system to pull down Microsoft’s updates itself, you can download them manually from the Windows Update Catalog website. Run the winver.exe tool to determine which build of Windows you’re running, then download the Cumulative Update package for your specific system’s architecture and build number.

Appendix A: Vulnerability Impact and Severity

This is a list of February patches sorted by impact, then sub-sorted by severity. Each list is further arranged by CVE.

Elevation of Privilege (26 CVEs)

Critical severity
CVE-2026-21522Microsoft ACI Confidential Containers Elevation of Privilege Vulnerability
CVE-2026-24300Azure Front Door Elevation of Privilege Vulnerability
CVE-2026-24302Azure Arc Elevation of Privilege Vulnerability
Important severity
CVE-2026-21229Power BI Remote Code Execution Vulnerability
CVE-2026-21231Windows Kernel Elevation of Privilege Vulnerability
CVE-2026-21232Windows HTTP.sys Elevation of Privilege Vulnerability
CVE-2026-21234Windows Connected Devices Platform Service Elevation of Privilege Vulnerability
CVE-2026-21235Windows Graphics Component Elevation of Privilege Vulnerability
CVE-2026-21236Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
CVE-2026-21237Windows Subsystem for Linux Elevation of Privilege Vulnerability
CVE-2026-21238Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
CVE-2026-21239Windows Kernel Elevation of Privilege Vulnerability
CVE-2026-21240Windows HTTP.sys Elevation of Privilege Vulnerability
CVE-2026-21241Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
CVE-2026-21242Windows Subsystem for Linux Elevation of Privilege Vulnerability
CVE-2026-21245Windows Kernel Elevation of Privilege Vulnerability
CVE-2026-21246Windows Graphics Component Elevation of Privilege Vulnerability
CVE-2026-21250Windows HTTP.sys Elevation of Privilege Vulnerability
CVE-2026-21251Cluster Client Failover (CCF) Elevation of Privilege Vulnerability
CVE-2026-21253Mailslot File System Elevation of Privilege Vulnerability
CVE-2026-21257GitHub Copilot and Visual Studio Elevation of Privilege Vulnerability
CVE-2026-21259Microsoft Excel Elevation of Privilege Vulnerability
CVE-2026-21508Windows Storage Elevation of Privilege Vulnerability
CVE-2026-21517Windows App for Mac Installer Elevation of Privilege Vulnerability
CVE-2026-21519Desktop Windows Manager Elevation of Privilege Vulnerability
CVE-2026-21533Windows Remote Desktop Services Elevation of Privilege Vulnerability

Remote Code Execution (11 CVEs)

Important severity
CVE-2023-2804Red Hat, Inc. CVE-2023-2804: Heap Based Overflow libjpeg-turbo
CVE-2026-20841Windows Notepad App Remote Code Execution Vulnerability
CVE-2026-21228Azure Local Remote Code Execution Vulnerability
CVE-2026-21244Windows Hyper-V Remote Code Execution Vulnerability
CVE-2026-21247Windows Hyper-V Remote Code Execution Vulnerability
CVE-2026-21248Windows Hyper-V Remote Code Execution Vulnerability
CVE-2026-21256GitHub Copilot and Visual Studio Code Remote Code Execution Vulnerability
CVE-2026-21516GitHub Copilot for Jetbrains Remote Code Execution Vulnerability
CVE-2026-21523GitHub Copilot and Visual Studio Code Remote Code Execution Vulnerability
CVE-2026-21531Azure SDK for Python Remote Code Execution Vulnerability
CVE-2026-21537Microsoft Defender for Endpoint Linux Extension Remote Code Execution Vulnerability

Spoofing (7 CVEs)

Important severity
CVE-2026-21218.NET and Visual Studio Spoofing Vulnerability
CVE-2026-21249Windows NTLM Spoofing Vulnerability
CVE-2026-21260Microsoft Outlook Spoofing Vulnerability
CVE-2026-21511Microsoft Outlook Spoofing Vulnerability
CVE-2026-21512Azure DevOps Server Cross-Site Scripting Vulnerability
CVE-2026-21527Microsoft Exchange Server Spoofing Vulnerability
CVE-2026-21529Azure HDInsight Spoofing Vulnerability

Information Disclosure (6 CVEs)

Critical severity
CVE-2026-21532Azure Function Information Disclosure Vulnerability
CVE-2026-23655Microsoft ACI Confidential Containers Information Disclosure Vulnerability
Important severity
CVE-2026-21222Windows Kernel Information Disclosure Vulnerability
CVE-2026-21258Microsoft Excel Information Disclosure Vulnerability
CVE-2026-21261Microsoft Excel Information Disclosure Vulnerability
CVE-2026-21528Azure IoT Explorer Information Disclosure Vulnerability

Security Feature Bypass (5 CVEs)

Important severity
CVE-2026-21255Windows Hyper-V Security Feature Bypass Vulnerability
CVE-2026-21510Windows Shell Security Feature Bypass Vulnerability
CVE-2026-21513Internet Explorer Security Feature Bypass Vulnerability
CVE-2026-21514Microsoft Word Security Feature Bypass Vulnerability
CVE-2026-21518GitHub Copilot and Visual Studio Code Security Feature Bypass Vulnerability

Denial of Service (3 CVEs)

Important severity
CVE-2026-20846GDI+ Denial of Service Vulnerability
CVE-2026-21243Windows Lightweight Directory Access Protocol (LDAP) Denial of Service Vulnerability
Moderate severity
CVE-2026-21525Windows Remote Access Connection Manager Denial of Service Vulnerability

Appendix B: Exploitability and CVSS

This is a list of the five February CVEs judged by Microsoft to be more likely to be exploited in the wild within the first 30 days post-release, along with the six CVEs already known to be under attack. The list is arranged by CVE.

Exploitation detected
CVE-2026-21510Windows Shell Security Feature Bypass Vulnerability
CVE-2026-21513Internet Explorer Security Feature Bypass Vulnerability
CVE-2026-21514Microsoft Word Security Feature Bypass Vulnerability
CVE-2026-21519Desktop Windows Manager Elevation of Privilege Vulnerability
CVE-2026-21525Windows Remote Access Connection Manager Denial of Service Vulnerability
CVE-2026-21533Windows Remote Desktop Services Elevation of Privilege Vulnerability
Exploitation more likely within the next 30 days
CVE-2026-21231Windows Kernel Elevation of Privilege Vulnerability
CVE-2026-21238Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
CVE-2026-21241Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
CVE-2026-21253Mailslot File System Elevation of Privilege Vulnerability
CVE-2026-21511Microsoft Outlook Spoofing Vulnerability

These are the February CVEs with a Microsoft-assessed CVSS Base score of 8.0 or higher. They are arranged by score and further sorted by CVE. For more information on how CVSS works, please see our series on patch prioritization schema.

CVSS BaseCVSS TemporalCVETitle
9.88.5CVE-2026-21531Azure SDK for Python Remote Code Execution Vulnerability
9.88.5CVE-2026-24300Azure Front Door Elevation of Privilege Vulnerability
8.87.7CVE-2026-20841Windows Notepad App Remote Code Execution Vulnerability
8.87.7CVE-2026-21255Windows Hyper-V Security Feature Bypass Vulnerability
8.87.7CVE-2026-21256GitHub Copilot and Visual Studio Code Remote Code Execution Vulnerability
8.88.2CVE-2026-21510Windows Shell Security Feature Bypass Vulnerability
8.87.7CVE-2026-21513Internet Explorer Security Feature Bypass Vulnerability
8.87.7CVE-2026-21516GitHub Copilot for Jetbrains Remote Code Execution Vulnerability
8.87.7CVE-2026-21537Microsoft Defender for Endpoint Linux Extension Remote Code Execution Vulnerability
8.67.5CVE-2026-24302Azure Arc Elevation of Privilege Vulnerability
8.27.1CVE-2026-21532Azure Function Information Disclosure Vulnerability
8.17.1CVE-2026-21228Azure Local Remote Code Execution Vulnerability
8.07.0CVE-2026-21229Power BI Remote Code Execution Vulnerability
8.07.0CVE-2026-21257GitHub Copilot and Visual Studio Elevation of Privilege Vulnerability
8.07.0CVE-2026-21523GitHub Copilot and Visual Studio Code Remote Code Execution Vulnerability

Appendix C: Products Affected

This is a list of February’s patches sorted by product family, then sub-sorted by severity. Each list is further arranged by CVE. Patches that are shared among multiple product families are listed multiple times, once for each product family. Certain issues for which advisories have been issued are covered in Appendix D, and issues affecting Windows Server are further sorted in Appendix E. All CVE titles are accurate as made available by Microsoft; for further information on why certain products may appear in titles and not product families (or vice versa), please consult Microsoft.

Windows (31 CVEs)

Important severity
CVE-2023-2804Red Hat, Inc. CVE-2023-2804: Heap Based Overflow libjpeg-turbo
CVE-2026-20846GDI+ Denial of Service Vulnerability
CVE-2026-21222Windows Kernel Information Disclosure Vulnerability
CVE-2026-21231Windows Kernel Elevation of Privilege Vulnerability
CVE-2026-21232Windows HTTP.sys Elevation of Privilege Vulnerability
CVE-2026-21234Windows Connected Devices Platform Service Elevation of Privilege Vulnerability
CVE-2026-21235Windows Graphics Component Elevation of Privilege Vulnerability
CVE-2026-21236Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
CVE-2026-21237Windows Subsystem for Linux Elevation of Privilege Vulnerability
CVE-2026-21238Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
CVE-2026-21239Windows Kernel Elevation of Privilege Vulnerability
CVE-2026-21240Windows HTTP.sys Elevation of Privilege Vulnerability
CVE-2026-21241Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
CVE-2026-21242Windows Subsystem for Linux Elevation of Privilege Vulnerability
CVE-2026-21243Windows Lightweight Directory Access Protocol (LDAP) Denial of Service Vulnerability
CVE-2026-21244Windows Hyper-V Remote Code Execution Vulnerability
CVE-2026-21245Windows Kernel Elevation of Privilege Vulnerability
CVE-2026-21246Windows Graphics Component Elevation of Privilege Vulnerability
CVE-2026-21247Windows Hyper-V Remote Code Execution Vulnerability
CVE-2026-21248Windows Hyper-V Remote Code Execution Vulnerability
CVE-2026-21249Windows NTLM Spoofing Vulnerability
CVE-2026-21250Windows HTTP.sys Elevation of Privilege Vulnerability
CVE-2026-21251Cluster Client Failover (CCF) Elevation of Privilege Vulnerability
CVE-2026-21253Mailslot File System Elevation of Privilege Vulnerability
CVE-2026-21255Windows Hyper-V Security Feature Bypass Vulnerability
CVE-2026-21508Windows Storage Elevation of Privilege Vulnerability
CVE-2026-21510Windows Shell Security Feature Bypass Vulnerability
CVE-2026-21513Internet Explorer Security Feature Bypass Vulnerability
CVE-2026-21519Desktop Windows Manager Elevation of Privilege Vulnerability
CVE-2026-21533Windows Remote Desktop Services Elevation of Privilege Vulnerability
Moderate severity
CVE-2026-21525Windows Remote Access Connection Manager Denial of Service Vulnerability

Azure (10 CVEs)

Critical severity
CVE-2026-21522Microsoft ACI Confidential Containers Elevation of Privilege Vulnerability
CVE-2026-21532Azure Function Information Disclosure Vulnerability
CVE-2026-23655Microsoft ACI Confidential Containers Information Disclosure Vulnerability
CVE-2026-24300Azure Front Door Elevation of Privilege Vulnerability
CVE-2026-24302Azure Arc Elevation of Privilege Vulnerability
Important severity
CVE-2026-21228Azure Local Remote Code Execution Vulnerability
CVE-2026-21512Azure DevOps Server Cross-Site Scripting Vulnerability
CVE-2026-21528Azure IoT Explorer Information Disclosure Vulnerability
CVE-2026-21529Azure HDInsight Spoofing Vulnerability
CVE-2026-21531Azure SDK for Python Remote Code Execution Vulnerability

365 (6 CVEs)

Important severity
CVE-2026-21258Microsoft Excel Information Disclosure Vulnerability
CVE-2026-21259Microsoft Excel Elevation of Privilege Vulnerability
CVE-2026-21260Microsoft Outlook Spoofing Vulnerability
CVE-2026-21261Microsoft Excel Information Disclosure Vulnerability
CVE-2026-21511Microsoft Outlook Spoofing Vulnerability
CVE-2026-21514Microsoft Word Security Feature Bypass Vulnerability

Office (6 CVEs)

Important severity
CVE-2026-21258Microsoft Excel Information Disclosure Vulnerability
CVE-2026-21259Microsoft Excel Elevation of Privilege Vulnerability
CVE-2026-21260Microsoft Outlook Spoofing Vulnerability
CVE-2026-21261Microsoft Excel Information Disclosure Vulnerability
CVE-2026-21511Microsoft Outlook Spoofing Vulnerability
CVE-2026-21514Microsoft Word Security Feature Bypass Vulnerability

Visual Studio (4 CVEs)

Important severity
CVE-2026-21256GitHub Copilot and Visual Studio Code Remote Code Execution Vulnerability
CVE-2026-21257GitHub Copilot and Visual Studio Elevation of Privilege Vulnerability
CVE-2026-21518GitHub Copilot and Visual Studio Code Security Feature Bypass Vulnerability
CVE-2026-21523GitHub Copilot and Visual Studio Code Remote Code Execution Vulnerability

Excel (3 CVEs)

Important severity
CVE-2026-21258Microsoft Excel Information Disclosure Vulnerability
CVE-2026-21259Microsoft Excel Elevation of Privilege Vulnerability
CVE-2026-21261Microsoft Excel Information Disclosure Vulnerability

SharePoint (2 CVEs)

Important severity
CVE-2026-21260Microsoft Outlook Spoofing Vulnerability
CVE-2026-21511Microsoft Outlook Spoofing Vulnerability

Word (2 CVEs)

Important severity
CVE-2026-21260Microsoft Outlook Spoofing Vulnerability
CVE-2026-21511Microsoft Outlook Spoofing Vulnerability

.NET (1 CVE)

Important severity
CVE-2026-21218.NET and Visual Studio Spoofing Vulnerability

Defender for Linux (1 CVE)

Important severity
CVE-2026-21537Microsoft Defender for Endpoint Linux Extension Remote Code Execution Vulnerability

Exchange (1 CVE)

Important severity
CVE-2026-21527Microsoft Exchange Server Spoofing Vulnerability

JetBrains (1 CVE)

Important severity
CVE-2026-21516GitHub Copilot for Jetbrains Remote Code Execution Vulnerability

Notepad (1 CVE)

Important severity
CVE-2026-20841Windows Notepad App Remote Code Execution Vulnerability

Power BI (1 CVE)

Important severity
CVE-2026-21229Power BI Remote Code Execution Vulnerability

Windows App for Mac (1 CVE)

Important severity
CVE-2026-21517Windows App for Mac Installer Elevation of Privilege Vulnerability

Appendix D: Advisories and Other Products

There are three Edge-related advisories listed in February’s release:

CVE-2026-0391Microsoft Edge (Chromium-based) for Android Spoofing Vulnerability
CVE-2026-1861Chromium: CVE-2026-1861 Heap buffer overflow in libvpx
CVE-2026-1862Chromium: CVE-2026-1862 Type Confusion in V8

Appendix E: Affected Windows Server versions

This is a table of the 31 CVEs in the February release affecting Windows Server versions 2012 through 2025. The table differentiates among major versions of the platform but doesn’t go into deeper detail (eg., Server Core). An “x” indicates that the CVE does not apply to that version. The Windows App for Mac patch (CVE-2026-21517, Windows App for Mac Installer Elevation of Privilege Vulnerability) does not appear in this table.

Administrators are encouraged to use this appendix as a starting point to ascertain their specific exposure, as each reader’s situation, especially as it concerns products out of mainstream support, will vary. For specific Knowledge Base numbers, please consult Microsoft. 

CVE S-12 12r2 S-16 S-19 S-22 23h2 S-25 
CVE-2023-2804

×

×

×

×

×

×

CVE-2026-20846

CVE-2026-21222

×

×

×

CVE-2026-21231

CVE-2026-21232

×

×

×

×

×

CVE-2026-21234

×

×

×

CVE-2026-21235

×

×

CVE-2026-21236

CVE-2026-21237

×

×

×

×

CVE-2026-21238

CVE-2026-21239

CVE-2026-21240

×

×

×

CVE-2026-21241

×

×

×

×

CVE-2026-21242

×

×

×

×

CVE-2026-21243

×

×

×

CVE-2026-21244

×

×

CVE-2026-21245

×

×

×

×

×

×

CVE-2026-21246

CVE-2026-21247

×

×

CVE-2026-21248

×

×

CVE-2026-21249

×

CVE-2026-21250

×

×

×

×

×

CVE-2026-21251

×

×

CVE-2026-21253

CVE-2026-21255

×

×

CVE-2026-21508

CVE-2026-21510

CVE-2026-21513

CVE-2026-21519

×

×

CVE-2026-21525

CVE-2026-21533