Microsoft released its February 2026 security updates addressing over 50 vulnerabilities across Windows operating systems and related software. This batch includes patches for six zero-day flaws actively exploited in the wild, posing immediate risks to enterprise environments.

The first zero-day, CVE-2026-21510, is a security feature bypass in Windows Shell that allows attackers to execute arbitrary code by tricking users into clicking a malicious link. This flaw affects all currently supported Windows versions and bypasses built-in protection mechanisms without user prompts.

Two additional zero-days target Microsoft’s web and document platforms. CVE-2026-21513 is a security bypass vulnerability in MSHTML, the rendering engine of the default Windows web browser, enabling attackers to bypass security controls silently. CVE-2026-21514 affects Microsoft Word similarly, allowing bypass of security features that could lead to code execution.

Privilege escalation vulnerabilities include CVE-2026-21533 in Windows Remote Desktop Services, which permits local attackers to gain SYSTEM-level privileges, and CVE-2026-21519, an elevation of privilege flaw in Desktop Window Manager (DWM). DWM is critical for window management on user desktops. Notably, Microsoft patched a separate DWM zero-day just last month, indicating ongoing targeting of this component.

The sixth zero-day, CVE-2026-21525, is a denial-of-service vulnerability in the Windows Remote Access Connection Manager service responsible for maintaining VPN connections. Exploitation could disrupt remote access to corporate networks.

Beyond Windows, Microsoft addressed remote code execution vulnerabilities in development tools tied to GitHub Copilot and popular IDEs including VS Code, Visual Studio, and JetBrains products. CVE-2026-21516, CVE-2026-21523, and CVE-2026-21256 stem from command injection flaws triggered by prompt injection attacks against AI-powered developer assistants.

Security researcher Kev Breen of Immersive highlights that attackers could leverage these AI vulnerabilities to execute malicious commands, potentially accessing sensitive developer credentials like API keys for AWS and Azure. Breen advises applying least-privilege principles and carefully controlling AI access in development workflows to reduce risk.

Chris Goettl from Ivanti notes Microsoft’s pattern of issuing out-of-band updates since January, including fixes for remote desktop credential prompt failures and Office security bypass zero-days (e.g., CVE-2026-21509).

Administrators should prioritize deploying these updates promptly to mitigate active exploits. The SANS Internet Storm Center provides a detailed breakdown of this month’s patches, indexed by severity and CVSS scores, aiding risk assessment. Enterprise teams should also monitor resources like askwoody.com for insights on update stability and compatibility issues.

Backing up critical data before patch deployment remains essential. Organizations experiencing installation problems are encouraged to share feedback to help refine update processes. These patches underscore the ongoing need for vigilant patch management amid persistent exploitation targeting Windows and development environments.