Zero Day MonitorZDM
DashboardVulnerabilitiesTrendingZero-DaysNewsAbout
Login
ImpressumPrivacy Policy
Zero Day Monitor © 2026
3453 articles · 142284 vulns · 36/41 feeds (7d)
← Back to list
8.8
CVE-2026-21510KEVEXPLOITEDPATCHED
microsoft · windows_10_1607

Windows Shell Security Feature Bypass Vulnerability

Description

Protection mechanism failure in Windows Shell allows an unauthorized attacker to bypass a security feature over a network.

Affected Products

VendorProductVersions
microsoftwindows_10_160710.0.14393.0, 10.0.17763.0, 10.0.19044.0, 10.0.19045.0, 10.0.22631.0, 10.0.22631.0, 10.0.26100.0, 10.0.26200.0, 10.0.28000.0, 10.0.28000.0, 6.2.9200.0, 6.2.9200.0, 6.3.9600.0, 6.3.9600.0, 10.0.14393.0, 10.0.14393.0, 10.0.17763.0, 10.0.17763.0, 10.0.20348.0, 10.0.25398.0, 10.0.26100.0, 10.0.26100.0

Also Affects

Downstream vendors/products affected by this vulnerability

VendorProductSourceConfidence
microsoftwindows_server_2016cve_cpe95%
microsoftwindows_server_2019cve_cpe95%
microsoftwindows_11_24h2cve_cpe95%
microsoftwindows_11_25h2cve_cpe95%
microsoftwindows_server_2012cve_cpe95%

References

  • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21510(vendor-advisory, patch)

Related News (5 articles)

Tier B
JPCERT/CC
Security Alert: Microsoft Releases February 2026 Security Updates
→ No new info (linked only)
Tier D
Help Net Security8d ago
Week in review: High-severity LPE vulnerability in the Linux kernel, cPanel 0-day exploited for months
→ No new info (linked only)
Tier D
BleepingComputer12d ago
CISA orders feds to patch Windows flaw exploited as zero-day
→ No new info (linked only)
Tier D
Heise Security13d ago
Windows-Shell-Lücke wird angegriffen
→ No new info (linked only)
Tier D
SecurityWeek14d ago
Incomplete Windows Patch Opens Door to Zero-Click Attacks
→ No new info (linked only)
CVSS 3.18.8 HIGH
VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
CISA KEV✅ Yes
Actively exploited✅ Yes
Patch available
10.0.14393.886810.0.17763.838910.0.19044.693710.0.19045.693710.0.22631.664910.0.26100.778110.0.26200.778110.0.20348.471110.0.25398.214910.0.26100.32313
CWECWE-693
PublishedFeb 10, 2026
Last enriched13d agov4
Tags
security feature bypasszero-click attackremote code executionspoofing attackzero-click vulnerability
Trending Score41
Source articles5
Independent5
Info Completeness12/14
Missing: epss, mitre_attack

Community Vote

0
Login to vote
0 upvotes0 downvotes
No votes yet

Related CVEs (5)

CRITICALCVE-2026-40372EXP
ASP.NET Core Elevation of Privilege Vulnerability
Trending: 62
HIGHCVE-2026-39836EXP
Panic in Dial and LookupPort when handling NUL byte on Windows in net
Trending: 59
HIGHCVE-2026-42316EXP
KQL injection via kusto.tables.topics.mapping in kafka-sink-azure-kusto
Trending: 52
HIGHCVE-2026-26164EXP
M365 Copilot Information Disclosure Vulnerability
Trending: 43
HIGHCVE-2026-26129EXP
M365 Copilot Information Disclosure Vulnerability
Trending: 43

Pin to Dashboard

Verification

State: verified
Confidence: 100%

Vulnerability Timeline

CVE Published
Feb 10, 2026
Added to CISA KEV
Feb 10, 2026
Discovered by ZDM
Apr 1, 2026
Updated: tags
Apr 1, 2026
Updated: cweIds, tags
Apr 27, 2026
Updated: severity, cvssEstimate, iocs, tags
Apr 28, 2026
Actively Exploited
May 11, 2026
Exploit Available
May 11, 2026
Patch Available
May 11, 2026

Version History

v4
Last enriched 13d ago
v4Tier D13d ago

Updated severity to MEDIUM and CVSS to 4.3, added new IOC domain 'attacker.com' and new tags related to spoofing and zero-click vulnerabilities.

severitycvssEstimateiocstags
via Heise Security
v3Tier D14d ago

Updated description with details on zero-click attacks and added new CWE and tags related to the vulnerability.

cweIdstags
via SecurityWeek
v2Tier B40d ago

Updated severity to CRITICAL, CVSS score to 9.8, and added new tag 'security feature bypass'.

tags
via JPCERT/CC
v140d ago

Initial creation