{"id":11816,"date":"2026-02-15T04:42:13","date_gmt":"2026-02-15T04:42:13","guid":{"rendered":"https:\/\/techtrendfeed.com\/?p=11816"},"modified":"2026-02-15T04:42:14","modified_gmt":"2026-02-15T04:42:14","slug":"patch-tuesday-february-2026-version-krebs-on-safety","status":"publish","type":"post","link":"https:\/\/techtrendfeed.com\/?p=11816","title":{"rendered":"Patch Tuesday, February 2026 Version \u2013 Krebs on Safety"},"content":{"rendered":"<p> <br \/>\n<\/p>\n<div>\n<p><strong>Microsoft<\/strong> as we speak launched updates to repair greater than 50 safety holes in its <strong>Home windows<\/strong> working programs and different software program, together with patches for a whopping six \u201czero-day\u201d vulnerabilities that attackers are already exploiting within the wild.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-60331 aligncenter\" src=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2022\/07\/winupdatedate.png\" alt=\"\" width=\"749\" height=\"496\" srcset=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2022\/07\/winupdatedate.png 923w, https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2022\/07\/winupdatedate-768x508.png 768w, https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2022\/07\/winupdatedate-782x518.png 782w\" sizes=\"auto, (max-width: 749px) 100vw, 749px\"\/><\/p>\n<p>Zero-day #1 this month is <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2026-21510\" target=\"_blank\" rel=\"noopener\">CVE-2026-21510<\/a>, a safety characteristic bypass vulnerability in <strong>Home windows Shell<\/strong> whereby a single click on on a malicious hyperlink can quietly bypass Home windows protections and run attacker-controlled content material with out warning or consent dialogs. CVE-2026-21510 impacts all at the moment supported variations of Home windows.<\/p>\n<p>The zero-day flaw\u00a0<a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2026-21513\" target=\"_blank\" rel=\"noopener\">CVE-2026-21513<\/a> is a\u00a0safety bypass bug focusing on <strong>MSHTML<\/strong>, the proprietary engine of the default Internet browser in Home windows. <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2026-21514\" target=\"_blank\" rel=\"noopener\">CVE-2026-21514<\/a> is a associated safety characteristic bypass in <strong>Microsoft Phrase.<\/strong><\/p>\n<p>The zero-day <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2026-21533\" target=\"_blank\" rel=\"noopener\">CVE-2026-21533<\/a> permits native attackers to raise their consumer privileges to \u201cSYSTEM\u201d degree entry in <strong>Home windows Distant Desktop Providers<\/strong>. <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2026-21519\" target=\"_blank\" rel=\"noopener\">CVE-2026-21519<\/a> is a zero-day elevation of privilege flaw within the <strong>Desktop Window Supervisor<\/strong> (DWM), a key element of Home windows that organizes home windows on a consumer\u2019s display. Microsoft fastened a unique zero-day in DWM <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/krebsonsecurity.com\/2026\/01\/patch-tuesday-january-2026-edition\/\" target=\"_blank\" rel=\"noopener\">simply final month<\/a>.<\/p>\n<p>The sixth zero-day is <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-21525\" target=\"_blank\" rel=\"noopener\">CVE-2026-21525<\/a>, a doubtlessly disruptive denial-of-service vulnerability within the <strong>Home windows Distant Entry Connection Supervisor<\/strong>, the service accountable for sustaining VPN connections to company networks.<span id=\"more-73188\"\/><\/p>\n<p><strong>Chris Goettl<\/strong> at <strong>Ivanti<\/strong> reminds us Microsoft has issued a number of out-of-band safety updates since January\u2019s Patch Tuesday. On January 17, Microsoft pushed a repair that resolved a credential immediate failure when making an attempt distant desktop or distant software connections. On January 26, Microsoft patched a zero-day safety characteristic bypass vulnerability (<a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2026-21509\" target=\"_blank\" rel=\"noopener\">CVE-2026-21509<\/a>) in <strong>Microsoft Workplace<\/strong>.<\/p>\n<p><strong>Kev Breen<\/strong> at <strong>Immersive<\/strong> notes that this month\u2019s Patch Tuesday contains a number of fixes for distant code execution vulnerabilities affecting <strong>GitHub Copilot<\/strong> and a number of built-in improvement environments (IDEs), together with <strong>VS Code<\/strong>, <strong>Visible Studio<\/strong>, and <strong>JetBrains<\/strong> merchandise. The related CVEs are <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2026-21516\" target=\"_blank\" rel=\"noopener\">CVE-2026-21516<\/a>, <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2026-21523\" target=\"_blank\" rel=\"noopener\">CVE-2026-21523<\/a>, and <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2026-21256\" target=\"_blank\" rel=\"noopener\">CVE-2026-21256<\/a>.<\/p>\n<p>Breen stated the AI vulnerabilities Microsoft patched this month stem from a command injection flaw that may be triggered by means of immediate injection, or tricking the AI agent into doing one thing it shouldn\u2019t \u2014 like executing malicious code or instructions.<\/p>\n<p>\u201cBuilders are high-value targets for menace actors, as they typically have entry to delicate information resembling API keys and secrets and techniques that operate as keys to crucial infrastructure, together with privileged AWS or Azure API keys,\u201d Breen stated. \u201cWhen organizations allow builders and automation pipelines to make use of LLMs and agentic AI, a malicious immediate can have important influence. This doesn&#8217;t imply organizations ought to cease utilizing AI. It does imply builders ought to perceive the dangers, groups ought to clearly determine which programs and workflows have entry to AI brokers, and least-privilege rules must be utilized to restrict the blast radius if developer secrets and techniques are compromised.\u201d<\/p>\n<p>The\u00a0<strong>SANS Web Storm Middle<\/strong>\u00a0has a\u00a0<a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/isc.sans.edu\/diary\/Microsoft%20Patch%20Tuesday%20-%20February%202026\/32700\" target=\"_blank\" rel=\"noopener\">clickable breakdown<\/a> of every particular person repair this month from Microsoft, listed by severity and CVSS rating. Enterprise Home windows admins concerned in testing patches earlier than rolling them out ought to control <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.askwoody.com\/2026\/february-2026-security-updates\/\" target=\"_blank\" rel=\"noopener\">askwoody.com<\/a>, which regularly has the thin on wonky updates. Please don\u2019t neglect to again up your information if it has been some time because you\u2019ve performed that, and be at liberty to hold forth within the feedback in the event you expertise issues putting in any of those fixes.<\/p>\n<\/p><\/div>\n\n","protected":false},"excerpt":{"rendered":"<p>Microsoft as we speak launched updates to repair greater than 50 safety holes in its Home windows working programs and different software program, together with patches for a whopping six \u201czero-day\u201d vulnerabilities that attackers are already exploiting within the wild. Zero-day #1 this month is CVE-2026-21510, a safety characteristic bypass vulnerability in Home windows Shell [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":11818,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[58],"tags":[406,7855,262,1077,211,1078],"class_list":["post-11816","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","tag-edition","tag-february","tag-krebs","tag-patch","tag-security","tag-tuesday"],"_links":{"self":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/11816","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=11816"}],"version-history":[{"count":1,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/11816\/revisions"}],"predecessor-version":[{"id":11817,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/11816\/revisions\/11817"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/media\/11818"}],"wp:attachment":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=11816"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=11816"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=11816"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}<!-- This website is optimized by Airlift. Learn more: https://airlift.net. Template:. Learn more: https://airlift.net. Template: 69d9690a190636c2e0989534. Config Timestamp: 2026-04-10 21:18:02 UTC, Cached Timestamp: 2026-04-11 11:01:29 UTC -->