HomeVulnerabilityMicrosoft Patches 59 Vulnerabilities Together with Six Actively Exploited Zero-Days

Microsoft Patches 59 Vulnerabilities Together with Six Actively Exploited Zero-Days

Microsoft on Tuesday launched security updates to handle a set of 59 flaws throughout its software program, together with six vulnerabilities that it stated have been exploited within the wild.

Of the 59 flaws, 5 are rated Vital, 52 are rated Essential, and two are rated Reasonable in severity. Twenty-five of the patched vulnerabilities have been categorized as privilege escalation, adopted by distant code execution (12), spoofing (7), data disclosure (6), security function bypass (5), denial-of-service (3), and cross-site scripting (1).

It is price noting that the patches are along with three security flaws that Microsoft has addressed in its Edge browser for the reason that launch of the January 2026 Patch Tuesday replace, together with a Reasonable vulnerability impacting the Edge browser for Android (CVE-2026-0391, CVSS rating: 6.5) that would enable an unauthorized attacker to carry out spoofing over a community by making the most of a “person interface misrepresentation of essential data.”

Topping the checklist of this month’s updates are six vulnerabilities which were flagged as actively exploited –

  • CVE-2026-21510 (CVSS rating: 8.8) – A safety mechanism failure in Home windows Shell that permits an unauthorized attacker to bypass a security function over a community.
  • CVE-2026-21513 (CVSS rating: 8.8) – A safety mechanism failure in MSHTML Framework that permits an unauthorized attacker to bypass a security function over a community.
  • CVE-2026-21514 (CVSS rating: 7.8) – A reliance on untrusted inputs in a security determination in Microsoft Workplace Phrase that permits an unauthorized attacker to bypass a security function regionally.
  • CVE-2026-21519 (CVSS rating: 7.8) – An entry of useful resource utilizing incompatible kind (‘kind confusion’) within the Desktop Window Supervisor that permits a licensed attacker to raise privileges regionally.
  • CVE-2026-21525 (CVSS rating: 6.2) – A null pointer dereference in Home windows Distant Entry Connection Supervisor that permits an unauthorized attacker to disclaim service regionally.
  • CVE-2026-21533 (CVSS rating: 7.8) – An improper privilege administration in Home windows Distant Desktop that permits a licensed attacker to raise privileges regionally.
See also  Basic Data Safety Regulation (GDPR): What you want to know to remain compliant

Microsoft’s personal security groups and Google Menace Intelligence Group (GTIG) have been credited with discovering and reporting the primary three flaws, which have been listed as publicly recognized on the time of launch. There are at present no particulars on how the vulnerabilities are being exploited, and in the event that they had been weaponized as a part of the identical marketing campaign.

“CVE-2026-21513 is a security function bypass vulnerability within the Microsoft MSHTML Framework, a core element utilized by Home windows and a number of functions to render HTML content material,” Jack Bicer, director of vulnerability analysis at Action1, stated. “It’s attributable to a safety mechanism failure that permits attackers to bypass execution prompts when customers work together with malicious information. A crafted file can silently bypass Home windows security prompts and set off harmful actions with a single click on.”

Satnam Narang, senior workers analysis engineer at Tenable, stated CVE-2026-21513 and CVE-2026-21514 bear a “lot of similarities” to CVE-2026-21510, the primary distinction being that CVE-2026-21513 may also be exploited utilizing an HTML file, whereas CVE-2026-21514 can solely be exploited utilizing a Microsoft Workplace file.

As for CVE-2026-21525, it is linked to a zero-day that ACROS Safety’s 0patch service stated it found in December 2025 whereas investigating one other associated flaw in the identical element (CVE-2025-59230).

“These [CVE-2026-21519 and CVE-2026-21533] are native privilege escalation vulnerabilities, which implies an attacker should have already gained entry to a weak host,” Kev Breen, senior director of cyber menace analysis at Immersive, informed The Hacker Information by way of electronic mail. “This might happen by means of a malicious attachment, a distant code execution vulnerability, or lateral motion from one other compromised system.”

See also  FritzFrog Returns with Log4Shell and PwnKit, Spreading Malware Inside Your Community

“As soon as on the host, the attacker can use these escalation vulnerabilities to raise privileges to SYSTEM. With this stage of entry, a menace actor may disable security tooling, deploy extra malware, or, in worst-case situations, entry secrets and techniques or credentials that would result in full area compromise.”

Cybersecurity vendor CrowdStrike, which has been acknowledged for reporting CVE-2026-21533, stated it doesn’t attribute the exploitation exercise to a particular adversary, however famous that menace actors in possession of the exploit binaries will probably ramp up their efforts to make use of or promote them within the close to time period.

“The CVE-2026-21533 exploit binary modifies a service configuration key, changing it with an attacker-controlled key, which may allow adversaries to escalate privileges so as to add a brand new person to the Administrator group,” Adam Meyers, head of Counter Adversary Operations at CrowdStrike, informed The Hacker Information in an emailed assertion. 

The event has prompted the U.S. Cybersecurity and Infrastructure Safety Company (CISA) so as to add all six vulnerabilities to its Identified Exploited Vulnerabilities (KEV) catalog, requiring Federal Civilian Govt Department (FCEB) companies to use the fixes by March 3, 2026.

The replace additionally coincides with Microsoft rolling out up to date Safe Boot certificates to exchange the unique 2011 certificates that may expire in late June 2026. The brand new certificates might be put in by means of the common month-to-month Home windows replace course of with none extra motion.

“If a tool doesn’t obtain the brand new Safe Boot certificates earlier than the 2011 certificates expire, the PC will proceed to operate usually, and current software program will maintain operating,” the tech big stated. “Nonetheless, the machine will enter a degraded security state that limits its means to obtain future boot-level protections.”

See also  CISA Reverses Course on Malicious Exploitation of Video Conferencing Gadget Flaws

“As new boot‑stage vulnerabilities are found, affected techniques change into more and more uncovered as a result of they will not set up new mitigations. Over time, this may increasingly additionally result in compatibility points, as newer working techniques, firmware, {hardware}, or Safe Boot–dependent software program could fail to load.”

In tandem, the corporate stated it is also strengthening default protections in Home windows by means of two security initiatives, Home windows Baseline Safety Mode and Person Transparency and Consent. The updates come beneath the purview of the Safe Future Initiative and Home windows Resiliency Initiative.

“With Home windows Baseline Safety Mode, Home windows will transfer towards working with runtime integrity safeguards enabled by default,” it famous. “These safeguards make sure that solely correctly signed apps, companies, and drivers are allowed to run, serving to to guard the system from tampering or unauthorized modifications.”

Person Transparency and Consent, analogous to Apple macOS Transparency, Consent, and Management (TCC) framework, goals to introduce a constant method to dealing with security selections. The working system will immediate customers when apps attempt to entry delicate sources, resembling information, the digicam, or the microphone, or once they try to put in different unintended software program.

“These prompts are designed to be clear and actionable, and you may all the time have the power to evaluation and alter your selections later,” Logan Iyer, Distinguished Engineer at Microsoft, stated. “Apps and AI brokers can even be anticipated to satisfy increased transparency requirements, giving each customers and IT directors higher visibility into their behaviors.”

- Advertisment -spot_img
RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

- Advertisment -

Most Popular