Microsoft Patches Six Zero-Day Flaws, Windows Shell Bypass

microsoft, windows

Microsoft released a February Patch Tuesday that fixes six actively exploited zero‑day vulnerabilities, including the critical CVE‑2026‑21510 Windows Shell bypass. The flaw lets attackers skip built‑in protections, execute code as the logged‑in user, and potentially gain system privileges over the network. Applying the cumulative update now is the only way to stop these attacks.

What Is CVE‑2026‑21510?

CVE‑2026‑21510 is a security‑feature bypass in the Windows Shell. It corrupts the way the shell validates privileged operations, allowing a malicious payload to slip past normal checks. Once the payload runs, it inherits the rights of the current user and can often be escalated to full system control.

Why These Flaws Matter Now

The six zero‑day bugs are already weaponised in the wild. Because they operate over the network, attackers can chain them with credential‑theft tools to move laterally across corporate environments without needing physical access. The rapid exploitation confirms that the window for safe operation without the patch has closed.

Impact on Enterprises

Any organization that uses remote desktop services, virtual desktops, or file‑sharing over SMB is at risk. The shell bypass can facilitate lateral movement, letting threat actors deepen their foothold after an initial breach. Small‑to‑medium businesses aren’t exempt; legacy Windows versions remain vulnerable until the update is applied.

Immediate Actions for IT Teams

  • Install the February cumulative update (KB 5006670 for Windows 10/11 and the equivalent for Server) on every endpoint.
  • Audit custom shell extensions or third‑party utilities that interact with Explorer; re‑sign or temporarily disable them until they’re verified.
  • Monitor network traffic for unusual SMB activity or unexpected PowerShell commands that could indicate an exploitation attempt.

Expert Insight

“We saw a spike in anomalous shortcut files being dropped on shared drives the week after the patch was released,” says a senior security engineer who prefers to stay anonymous. “Our EDR flagged the payloads, but the real breakthrough was correlating them with the timing of CVE‑2026‑21510’s disclosure. The lesson? Patch quickly, and make sure your detection rules cover unexpected COM object loading and privilege‑escalation attempts via Explorer.”

In short, the patch is your first line of defense. By installing it now, tightening monitoring, and reviewing custom shell interactions, you’ll protect your environment from the current wave of attacks and stay ahead of the next one.