Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Nx Console VS Code Extension Compromised: Steal Secrets
May 19, 2026
Critical Marimo Flaw Allows Remote Code Execution Attacks
May 19, 2026
Microsoft Retires Teams Together Mode for Performance Boost
May 19, 2026
Home/CyberSecurity News/CISA Adds Six Microsoft 0-Days to K Vulnerabilities Catalog
CyberSecurity News

CISA Adds Six Microsoft 0-Days to K Vulnerabilities Catalog

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has urgently added six new zero-day vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog. All newly cataloged flaws...

Sarah simpson
Sarah simpson
February 11, 2026 3 Min Read
6 0

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has urgently added six new zero-day vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog. All newly cataloged flaws impact Microsoft products.

Table Of Content

  • Six Microsoft 0-Day Vulnerabilities
  • CVE-2026-21510: Microsoft Windows Shell Protection Mechanism Failure
  • CVE-2026-21513: Microsoft MSHTML Framework
  • CVE-2026-21514: Microsoft Office Word Reliance on Untrusted Inputs
  • CVE-2026-21519: Microsoft Windows Type Confusion
  • CVE-2026-21525: Microsoft Windows NULL Pointer Dereference
  • CVE-2026-21533: Windows Remote Desktop Services

This move underscores escalating threats from nation-state actors and cybercriminals actively exploiting these flaws in the wild. Federal Civilian Executive Branch (FCEB) agencies must now patch by CISA’s specified due dates under Binding Operational Directive (BOD) 22-01, while CISA urges all organizations to prioritize remediation to mitigate widespread risks.

The KEV Catalog, established by BOD 22-01 in 2022, serves as a prioritized list of CVEs that pose a “significant risk” to federal networks. Evidence of active exploitation gathered from vendor reports, threat intelligence, and incident response trigger additions.

These six entries highlight persistent vulnerabilities in the Microsoft ecosystem as prime attack vectors for ransomware, espionage, and lateral movement.

Six Microsoft 0-Day Vulnerabilities

CVE-2026-21510: Microsoft Windows Shell Protection Mechanism Failure

Affects Windows Shell, allowing unauthorized attackers to bypass security features over a network. CVSS score pending, but exploitation enables remote code execution (RCE) via crafted files or network payloads. Attackers chain this with social engineering for initial access.

CVE-2026-21513: Microsoft MSHTML Framework

MSHTML engine flaw permits security feature bypass remotely. Despite IE’s deprecation, legacy integrations in Edge and Office expose users. Exploits involve malicious web content triggering memory corruption, observed in phishing campaigns targeting enterprises.

CVE-2026-21514: Microsoft Office Word Reliance on Untrusted Inputs

Word’s parsing mishandles untrusted inputs, leading to privilege escalation locally. Attackers deliver via malicious .docx files, evading Protected View. This has fueled document-based malware droppers in recent APT operations.

CVE-2026-21519: Microsoft Windows Type Confusion

Desktop Window Manager (DWM) type confusion vulnerability enables local privilege escalation. Authorized users (e.g., low-priv accounts) can exploit for SYSTEM-level access, common in post-exploitation chains after initial footholds.

CVE-2026-21525: Microsoft Windows NULL Pointer Dereference

Remote Access Connection Manager suffers a NULL pointer dereference, causing local denial-of-service (DoS). While not RCE, it disrupts VPN/remote access, aiding DoS-for-ransom or distraction during larger attacks.

CVE-2026-21533: Windows Remote Desktop Services

A flaw in RDS allows local privilege escalation via improper handling. Critical for remote work environments, exploits grant attackers admin rights on compromised endpoints, facilitating persistence and lateral movement.

    Microsoft has released patches in its February 2026 Patch Tuesday, confirming public exploit evidence. Full details are available at CISA’s KEV Catalog and CVE records.

    These zero-days reflect a trend: 80% of 2025 KEV additions targeted Microsoft, per CISA data. Malicious actors, including Chinese state-sponsored groups like Salt Typhoon, exploit them for supply-chain compromises and data exfiltration. Unpatched systems risk automated scanning by tools like Shodan, amplifying breach velocity.

    BOD 22-01 mandates FCEB remediation within weeks; non-compliance risks audits. Private sectors should integrate KEV into vulnerability management tools.

    • Immediate Actions: Apply Microsoft patches via WSUS or Intune. Enable auto-updates.
    • Detection: Hunt for IOCs using EDR (e.g., Defender indicators from MSRC). YARA rules for exploit patterns are emerging on GitHub.
    • Mitigations: Enforce AppLocker, disable RDS if unused, audit Office macros. Segment networks per Zero Trust.
    • Long-Term: Shift to endpoint detection response (EDR) with behavioral analytics; conduct red-team exercises simulating KEV chains.

    CISA’s catalog now exceeds 1,200 entries and is updated weekly. Organizations ignoring it face heightened exposure to recent breaches like the 2025 Change Healthcare hack, which stemmed from unpatched KEVs.

    Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

    Tags:

    BreachCVECybersecurityExploitMalwarePatchphishingransomwareSecurityVulnerability

    Share Article

    Sarah simpson

    Sarah simpson

    Sarah is a cybersecurity journalist specializing in threat intelligence and malware analysis. With over 8 years of experience covering APT groups, zero-day exploits, and advanced persistent threats, Sarah brings deep technical expertise to breaking cybersecurity news. Previously, she worked as a security researcher at leading threat intelligence firms, where she analyzed malware samples and tracked cybercriminal operations. Sarah holds a Master's degree in Computer Science with a focus on cybersecurity and is a regular contributor to major security conferences.

    Previous Post

    Coinbase Cartel Extorts High-Value Sect Targets Sectors

    Next Post

    Microsoft Investigates Teams Assignment Errors After Failed Update

    No Comment! Be the first one.

    Leave a Reply Cancel reply

    Your email address will not be published. Required fields are marked *

    Popular Posts
    CISA Exposes AWS GovCloud Credentials on Public Admin GitHub
    May 19, 2026
    Hackers Abuse Entra ID to Exfiltrate Microsoft Accounts Azure
    May 19, 2026
    Mythos Previews Build PoC Exploits for Automated Vulner
    May 19, 2026
    Top Authors
    Marcus Rodriguez
    Marcus Rodriguez
    Jennifer sherman
    Jennifer sherman
    Sarah simpson
    Sarah simpson
    Let's Connect
    156k
    2.25m
    285k

    Related Posts

    Jennifer sherman
    By Jennifer sherman
    Threats

    GlassWorm Attacks macOS via Malicious VS Code…

    January 1, 2026
    Emy Elsamnoudy
    By Emy Elsamnoudy
    Attacks

    ClickFix Attack Hides Malicious Code via Stegan Security

    January 1, 2026
    Sarah simpson
    By Sarah simpson
    Vulnerabilities

    MongoBleed Detector Tool Detects Critical MongoDB CVE-

    January 1, 2026
    Emy Elsamnoudy
    By Emy Elsamnoudy
    Breaches

    Conti Ransomware Gang Leaders & Infrastructure Exposed

    January 1, 2026
    Hackers News Hackers News
    • [email protected]

    Quick Links

    • Contact Us
    • Privacy Policy
    • Terms of service

    Categories

    Attacks
    Breaches
    Comparisons
    CyberSecurity News
    Threats
    Vulnerabilities

    Let's keep in touch

    receive fresh updates and breaking cyber news every day and week!

    All Rights Reserved by HackersRadar ©2026

    Follow Us