Skip to main content
COSMICBYTEZLABS
NewsSecurityHOWTOsToolsStudyTraining
ProjectsChecklistsAI RankingsNewsletterStatusTagsAbout
Subscribe

Press Enter to search or Esc to close

News
Security
HOWTOs
Tools
Study
Training
Projects
Checklists
AI Rankings
Newsletter
Status
Tags
About
RSS Feed
Reading List
Subscribe

Stay in the Loop

Get the latest security alerts, tutorials, and tech insights delivered to your inbox.

Subscribe NowFree forever. No spam.
COSMICBYTEZLABS

Your trusted source for IT intelligence, cybersecurity insights, and hands-on technical guides.

429+ Articles
114+ Guides

CONTENT

  • Latest News
  • Security Alerts
  • HOWTOs
  • Projects
  • Exam Prep

RESOURCES

  • Search
  • Browse Tags
  • Newsletter Archive
  • Reading List
  • RSS Feed

COMPANY

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CosmicBytez Labs. All rights reserved.

System Status: Operational
  1. Home
  2. Security
  3. Microsoft February 2026 Patch Tuesday Fixes Six Actively
Microsoft February 2026 Patch Tuesday Fixes Six Actively

Critical Security Alert

This vulnerability is actively being exploited. Immediate action is recommended.

SECURITYCRITICALCVE-2026-21239

Microsoft February 2026 Patch Tuesday Fixes Six Actively

Microsoft's February 2026 Patch Tuesday addresses roughly 60 vulnerabilities including six actively exploited zero-days across Windows, Office, and Azure...

Dylan H.

Security Team

February 20, 2026
5 min read

Affected Products

  • Windows Kernel
  • Windows SmartScreen
  • Microsoft Office
  • Windows Print Spooler
  • Windows Hyper-V
  • Windows NTLM

Six Zero-Days in One Patch Tuesday

Microsoft's February 2026 Patch Tuesday is one of the most critical in recent memory, addressing approximately 60 vulnerabilities across Windows, Office, Azure, and other Microsoft products. Among them are six actively exploited zero-days — the highest count of confirmed in-the-wild exploits in a single monthly update since late 2024.

The sheer number of zero-days being exploited simultaneously suggests multiple independent threat actors are actively targeting Microsoft's ecosystem, and the ongoing CISA shutdown means federal coordination for patch verification is severely degraded.


The Six Zero-Days

CVEComponentTypeCVSSExploitation
CVE-2026-21239Windows KernelElevation of Privilege7.8Active
CVE-2026-21391Windows SmartScreenSecurity Feature Bypass8.1Active
CVE-2026-21418Microsoft OfficeRemote Code Execution8.8Active
CVE-2026-21445Windows Print SpoolerElevation of Privilege7.8Active
CVE-2026-21502Windows Hyper-VElevation of Privilege7.8Active
CVE-2026-21537Windows NTLMSpoofing6.5Active

Critical Vulnerabilities Breakdown

CVE-2026-21239 — Windows Kernel EoP

A privilege escalation vulnerability in the Windows kernel that allows a local attacker to gain SYSTEM privileges from a standard user context. This is the type of vulnerability commonly chained with remote code execution bugs to achieve full system compromise.

CVE-2026-21391 — SmartScreen Bypass

An attacker can craft content that bypasses Windows SmartScreen protections — the system that warns users before running potentially dangerous files downloaded from the internet. This effectively removes a critical safety net for phishing and drive-by download attacks.

CVE-2026-21418 — Office RCE

A remote code execution vulnerability in Microsoft Office that can be triggered by opening a specially crafted document. Combined with the SmartScreen bypass, an attacker could deliver a malicious Office document that runs code without triggering the usual safety warnings.

CVE-2026-21445 — Print Spooler EoP

Another privilege escalation via the Print Spooler service — a component with a long history of security issues (PrintNightmare, etc.). Allows elevation to SYSTEM privileges.

CVE-2026-21502 — Hyper-V EoP

A guest-to-host escape vulnerability in Hyper-V that could allow an attacker running code in a virtual machine to elevate privileges to the host operating system. This is particularly dangerous in cloud and virtualization environments.

CVE-2026-21537 — NTLM Spoofing

An NTLM spoofing vulnerability that allows an attacker to relay authentication credentials. NTLM relay attacks remain one of the most effective techniques for lateral movement in Active Directory environments.


Severity Distribution

SeverityCount
Critical8
Important47
Moderate5
Total~60

Attack Chains to Watch

Security researchers have identified several dangerous combination attacks enabled by this month's vulnerabilities:

Chain 1: Phishing to Full Compromise

CVE-2026-21391 (SmartScreen Bypass)
  → CVE-2026-21418 (Office RCE)
    → CVE-2026-21239 (Kernel EoP to SYSTEM)

This chain allows an attacker to send a phishing email with a malicious document that bypasses SmartScreen, executes code via Office, and escalates to SYSTEM — all using patched-this-month zero-days.

Chain 2: Lateral Movement in AD

CVE-2026-21537 (NTLM Spoofing)
  → Credential relay to domain controller
    → CVE-2026-21445 (Print Spooler EoP for persistence)

Chain 3: Cloud/Virtualization Escape

Initial access to Hyper-V guest
  → CVE-2026-21502 (Hyper-V guest-to-host escape)
    → Host system compromise

Patch Priorities

Patch Immediately (Active Exploitation Confirmed)

All six zero-days should be patched within 24-48 hours given confirmed exploitation.

Patch This Week

  • All Critical rated vulnerabilities
  • Any vulnerability in internet-facing services

Patch Within Standard Cycle

  • Remaining Important and Moderate vulnerabilities

The CISA Complication

Under normal circumstances, CISA would:

  • Issue emergency directives for actively exploited vulnerabilities
  • Update the Known Exploited Vulnerabilities (KEV) catalog
  • Coordinate federal patch verification across agencies
  • Provide guidance to state/local governments and critical infrastructure

With 62% of CISA furloughed, these activities are severely degraded, meaning organizations must rely more heavily on their own patch management and threat intelligence capabilities.


Key Takeaways

  1. Six actively exploited zero-days — The highest for a single Patch Tuesday in recent memory
  2. Dangerous attack chains possible — SmartScreen bypass + Office RCE + kernel EoP creates a phishing-to-SYSTEM pathway
  3. Hyper-V escape is especially concerning for cloud and virtualization environments
  4. CISA shutdown degrades coordination — Federal guidance and verification are limited
  5. Patch immediately — All six zero-days require urgent remediation

Sources

  • Malwarebytes — February 2026 Patch Tuesday Includes Six Actively Exploited Zero-Days
  • SecurityWeek — 6 Actively Exploited Zero-Days Patched by Microsoft With February 2026 Updates

Related Reading

  • Microsoft January 2026 Patch Tuesday: 114 Flaws Fixed, One
  • Microsoft Patch Tuesday February 2026: 6 Actively Exploited
  • Windows SmartScreen Bypass Under Active Exploitation
#Microsoft#Patch Tuesday#Zero-Day#Windows#Vulnerability#CVE

Related Articles

Microsoft Patch Tuesday February 2026: 6 Actively Exploited

Microsoft's February 2026 Patch Tuesday addresses 60 vulnerabilities including 6 actively exploited zero-days and 3 publicly disclosed issues, with...

8 min read

Microsoft January 2026 Patch Tuesday: 114 Flaws Fixed, One

Microsoft's first security update of 2026 addresses 114 vulnerabilities including three zero-days. One flaw is actively exploited in the wild with CISA...

3 min read

Windows SmartScreen Bypass Under Active Exploitation

Actively exploited Windows Shell vulnerability bypasses SmartScreen protection, allowing malicious files to execute without security warnings. Patch...

4 min read
Back to all Security Alerts