Zero Day Monitor
DashboardVulnerabilitiesTrendingZero-DaysNews
Login
ImpressumPrivacy Policy
Zero Day Monitor © 2026
1406 articles · 106464 vulns · 36/55 feeds (7d)
← Back to list
8.8
CVE-2026-21510KEV

Protection mechanism failure in Windows Shell allows an unauthorized attacker to bypass a security feature over a network.

Description

Protection mechanism failure in Windows Shell allows an unauthorized attacker to bypass a security feature over a network.

Affected Products

VendorProductVersions
microsoftwindows_10_1607< 10.0.14393.8868, < 10.0.14393.8868, < 10.0.17763.8389, < 10.0.17763.8389, < 10.0.19044.6937, < 10.0.19044.6937, < 10.0.19044.6937, < 10.0.19045.6937, < 10.0.19045.6937, < 10.0.19045.6937, < 10.0.22631.6649, < 10.0.22631.6649, < 10.0.26100.7781, < 10.0.26100.7781, < 10.0.26200.7781, < 10.0.26200.7781, < 10.0.14393.8868, < 10.0.17763.8389, < 10.0.20348.4711, < 10.0.25398.2149, < 10.0.26100.32313

References

  • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21510(Vendor Advisory)
  • https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2026-21510(US Government Resource)

Related News (1 articles)

Tier B
JPCERT/CC
Security Alert: Microsoft Releases February 2026 Security Updates
→ No new info (linked only)
CVSS 3.18.8 HIGH
VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CISA KEV✅ Yes
Actively exploited✅ Yes
CWECWE-693
Published2/10/2026
Last enriched12h ago
Trending Score86
Source articles1
Independent1
Info Completeness10/14
Missing: epss, patch, iocs, mitre_attack

Community Vote

0
Login to vote
0 upvotes0 downvotes
No votes yet

Pin to Dashboard

Verification

State: verified
Confidence: 100%