Security Advisory: Microsoft Releases 6 Actively Exploited Vulnerabilities

DataComm is promoting Microsoft’s February 2026 security release that fixes six actively exploited zero-day vulnerabilities affecting Windows and related components. Organizations should prioritize deploying the latest updates, validate impacted systems using the MSRC Security Update Guide entries for CVE-2026-21510, CVE-2026-21513, CVE-2026-21514, CVE-2026-21519, CVE-2026-21525, and CVE-2026-21533, and ensure Windows 10 devices remain eligible for security updates via Extended Security Updates (ESU) where applicable. Apply patches immediately through Windows Update and confirm reboot/compliance status to reduce exposure.
DataComm Networks Incorporated, a leader in Cybersecurity partner in the Tampa Bay Area and beyond.

Severity: High to Critical

Summary

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added six Microsoft Windows and Office vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog based on evidence of active exploitation. These vulnerabilities may allow attackers to bypass security protections, execute arbitrary code, escalate privileges, or cause system instability.

Affected Products

Impacted Microsoft products may include:

  • Microsoft Windows (multiple supported versions)
  • Microsoft Office (including Microsoft Word)
  • Microsoft MSHTML Framework components
  • Windows Remote Desktop Services (RDS)

Risk depends on system version, patch level, and exposure.

Vulnerability Overview

  • CVE-2026-21510 – Microsoft Windows Shell Protection Mechanism Failure Vulnerability
  • CVE-2026-21513 – Microsoft MSHTML Framework Security Feature Bypass Vulnerability
  • CVE-2026-21514 – Microsoft Office Word Reliance on Untrusted Inputs in a Security Decision Vulnerability
  • CVE-2026-21519 – Microsoft Windows Type Confusion Vulnerability
  • CVE-2026-21525 – Microsoft Windows NULL Pointer Dereference Vulnerability
  • CVE-2026-21533 – Windows Remote Desktop Services Elevation of Privilege Vulnerability

These vulnerabilities collectively present risks including remote code execution, security feature bypass, privilege escalation, denial of service, and unauthorized access to sensitive systems.

Observed Activity

According to CISA, these vulnerabilities are being actively exploited in the wild.

  • Security feature bypass leading to unauthorized code execution
  • Privilege escalation within Windows environments
  • Potential exploitation through malicious documents or web content
  • Abuse of Remote Desktop Services for elevated access

Recommended Actions

We strongly recommend the following immediate steps:

  • Apply the latest Microsoft security updates addressing all listed CVEs.
  • Prioritize remediation in accordance with CISA KEV catalog guidance.
  • Review systems for indicators of compromise.
  • Restrict administrative privileges and enforce least-privilege principles.
  • Ensure endpoint detection and monitoring solutions are active and updated.

Our Status

DataComm is actively reviewing affected systems and validating patch levels in accordance with Microsoft and CISA guidance. Customers requiring assistance are encouraged to contact our support team.

Support

Email: support@www-prod.datacomm.com

Phone: (877) 544-3655

References

Latest posts

Technology Trends
Travis Norris

Update Fatigue: How the relentless pace of software updates is breaking user trust — and what organizations can do about it

Somewhere between the fourteenth update notification of the week and the third forced restart during a critical deadline, something breaks. Not the software — the user. They click “Remind me later.” Then again. And again. Eventually, they stop updating altogether.

This is update fatigue — and it’s quietly becoming one of the most significant and underappreciated vulnerabilities in organizational cybersecurity today.

Read More ⇾
Kofi's Korner - Insights from DataComm's Technical Solutions Team
Kofi's Korner
Kofi Kankam

Kofi’s Korner April 2026

Rising technology costs, evolving cyber threats, and increasingly complex IT environments are forcing organizations to rethink how they plan, protect, and scale their infrastructure. In this edition of Kofi’s Korner, we explore what’s driving today’s unpredictable pricing landscape, how a layered security approach strengthens resilience, and why solutions like SecurShield IDS/IPS are critical in a firewall-first world. Discover practical insights and strategies to help your organization stay secure, compliant, and ahead of what’s next.

Read More ⇾

SecurNOC

Monitor your network devices and view their configuration changes.

SecurPortal

A live look at your events, security event charts and tickets.

Ticketing Portal

Login here to easily add and managed trouble tickets.

Remote Support

Let DataComm remotely access your computer to render aid.