Close Menu
Abu Dhabi NewsAbu Dhabi News
  • Home
    • Our Authors
    • Contact
  • Abu Dhabi
  • UAE
  • World
  • Business
  • Economy
  • Technology
  • Health
  • Lifestyle
  • Travel
  • Sport
What's Hot
Hidden Ocean Beneath Mars

A Hidden Ocean Beneath Mars? Scientists Investigate

April 17, 2026
Future of Crypto in the Gulf

The Future of Crypto in the Gulf Looks Exceptionally Bright

April 17, 2026
UAE’s AI-Driven Healthcare

UAE’s AI-Driven Healthcare Cuts Waiting Times Significantly

April 17, 2026
Facebook X (Twitter) Instagram
Abu Dhabi NewsAbu Dhabi News
Facebook X (Twitter) Instagram TikTok
Login
  • Home
    • Our Authors
    • Contact
  • Abu Dhabi
  • UAE
  • World
  • Business
  • Economy
  • Technology
  • Health
  • Lifestyle
  • Travel
  • Sport
Subscribe
Abu Dhabi NewsAbu Dhabi News
  • Abu Dhabi
  • UAE
  • World
  • Economy
  • Technology
  • Health
  • Lifestyle
  • Travel
  • Sport
Home»News
News

Hackers Exploit Six Zero-Day Windows Flaws in Coordinated Attacks

Annie GerberBy Annie GerberApril 17, 2026No Comments6 Mins Read
Facebook Twitter Pinterest LinkedIn Telegram Email WhatsApp Copy Link
Hackers Exploit Six Zero-Day Windows Flaws in Coordinated Attacks
Hackers Exploit Six Zero-Day Windows Flaws in Coordinated Attacks

Listen to the article

0:00
0:00

Key Takeaways

🌐 Translate Article

Translating...

📖 Read Along

💬 AI Assistant

🤖
Hi! I'm here to help you understand this article. Ask me anything about the content!

IT administrators have learned to fear a certain type of Tuesday, and February 11 was one of those days. This time, Microsoft’s monthly security drop, which is typically a routine exercise in patching, cataloging, and closing tickets, came with teeth. There are a total of 59 vulnerabilities. In the wild, six of them are already being actively exploited. Three of those were security feature bypass flaws, which sounds bureaucratic until you understand what it really means: attackers have discovered ways to get around the built-in safeguards that home users and businesses depend on without raising an alert.

CVE-2026-21510 is the one that has received the most attention and most likely merits it. It resides in the Windows Shell, which powers the interface that the majority of people use on a daily basis. With just one click on a malicious shortcut or link, an attacker can circumvent SmartScreen, Microsoft’s built-in system for flagging dubious links and files, and run code on the victim’s computer.

One-click remote code execution bugs, according to security researcher Dustin Childs, who has been documenting Patch Tuesdays for years at the Zero Day Initiative, are “a rarity.” According to a Google representative, the vulnerability is under “widespread, active exploitation,” with successful attacks leading to the silent installation of malware at high privilege levels. Translation: This is already being used by intelligence gatherers, state actors, and ransomware gangs.

Affected Vendor Microsoft Corporation
Affected Products Windows (all supported versions), Microsoft Office, Microsoft 365
Patch Release February 2026 Patch Tuesday
Total Vulnerabilities Patched 59
Actively Exploited Zero-Days 6
“More Likely Exploited” CVEs 5 additional
Headline Vulnerability CVE-2026-21510 (Windows Shell / SmartScreen bypass, CVSS 8.8)
MSHTML Framework Bug CVE-2026-21513 (CVSS 8.8)
Office OLE Security Bypass CVE-2026-21514 (CVSS 7.8)
Related Emergency Patch CVE-2026-21509 (Jan 26, out-of-band update)
Attack Type One-click exploits via malicious links, shortcuts, or Office documents
Credited Researchers Google’s Threat Intelligence Group and independent researchers
Advisory Resource Microsoft Security Response Center
US Reporting Authority Cybersecurity and Infrastructure Security Agency (CISA)

The Windows Shell bug is made worse by the fact that, at the time of patching, Microsoft acknowledged that the technical details of how to exploit it were already available to the public. Microsoft did not respond to requests for additional information, nor did it specify where or by whom. The implication is fairly clear. The time between “researched by a few nation-state groups” and “being sold on criminal marketplaces” usually closes in a matter of days once exploitation instructions are made public. This is how vulnerabilities are disclosed in the modern era. It’s getting faster and it’s ugly.

Hackers Exploit Six Zero-Day Windows Flaws in Coordinated Attacks
Hackers Exploit Six Zero-Day Windows Flaws in Coordinated Attacks

There are two more zero-days involving parts that ought to have been retired years ago. The rendering engine that drove the long-dead Internet Explorer, MSHTML, is the target of CVE-2026-21513. Because legacy apps rely on MSHTML for backward compatibility—a polite way of saying that nobody wants to be the engineer who breaks a hospital’s 2009 scheduling software—MSHTML is still present in modern Windows. Attackers are aware of this. For the better part of ten years, they have been mining MSHTML for exploits. The fact that this engine still appears in zero-day attacks in 2026 is a silent critique of how difficult it is to remove outdated code once it has become ingrained in the system. Microsoft made an attempt. The bugs never stop.

Meanwhile, Office’s OLE security controls are the target of CVE-2026-21514. Opening a malicious Word document can allow arbitrary code execution and get around Microsoft 365’s security measures. On January 26, Microsoft had to release an emergency out-of-band patch for CVE-2026-21509, a close cousin of this one, after similar exploitation activity was discovered. The pattern is evident to anyone who has been keeping an eye on Office-based phishing campaigns during the previous two years. Coordinated threat actors, who are frequently driven by financial gain, take advantage of these vulnerabilities as soon as they are discovered, sometimes even in a matter of hours.

Reading the response forums this week has given security researchers the impression that something structural has changed. The story of a “disgruntled hacker” who released a second Windows Defender zero-day exploit just hours after Microsoft patched the first one can be found in Reddit’s r/msp thread. According to the hacker, Microsoft closed the case without taking any action after he initially reported the vulnerabilities in a responsible manner. He then made the exploits public. He supposedly has more. In addition to raising unsettling concerns about how Microsoft’s security triage process is holding up under the pressure of a much larger codebase and, as several commenters noted, waves of internal layoffs, it’s not the kind of headline that any vendor wants. Correlation does not imply causation. However, there are fewer people maintaining it now than there were two years ago, and the software isn’t getting any easier.

It’s worth stopping to consider how well-coordinated the attacks are. This was not a single group discovering a single bug. According to threat intelligence reports from Google’s team as well as Microsoft’s own advisories, several actors are chaining these vulnerabilities together in campaigns that target enterprise networks in North America, Europe, and Asia. The combination is especially risky. The payload gets past the first defenses thanks to a SmartScreen bypass. The code is executed due to an Office OLE workaround or an MSHTML vulnerability. Two of the six exploited elevation-of-privilege bugs grant the attacker administrator rights. When you combine them, you have a single campaign that includes the entire kill chain from phishing emails to domain compromise. This playbook has long been used by advanced persistent threat groups. The speed at which the public exploit code is catching up to them is novel.

It’s difficult to ignore the shift in the emergency patching cadence. An out-of-band update was released in January. Patch Tuesday in February was essentially a fire drill. These days, security teams half-jokingly discuss Patch Wednesday, which is the rush to test fixes against production environments before they break something crucial. The advice is straightforward and well-known for users and small businesses without dedicated IT staff: turn on automatic updates, minimize administrator privileges whenever feasible, and handle unexpected links or Office attachments with the suspicion they’ve always merited. Whether Microsoft’s security posture is keeping up with the ecosystem attacking it is the bigger question for everyone else. The response seems awkward this month. It must improve by next month.

Hackers Exploit Six Zero-Day Windows Flaws
Annie Gerber

Please email Annie@abudhabi-news.com

Keep Reading

Hidden Ocean Beneath Mars

A Hidden Ocean Beneath Mars? Scientists Investigate

Super Jupiter Discovery

A Super Jupiter Discovery Challenges Planet Formation Theories

The AI Playlist War Between Spotify and YouTube Music Heats Up

TikTok Is Tracking You

TikTok Is Tracking You—Even If You Don’t Use It

Electrons Flow Like Water in Breakthrough Physics Study

Electrons Flow Like Water in Breakthrough Physics Study

Giant Asteroid Will Pass Earth

A Giant Asteroid Will Pass Earth—Should We Be Concerned?

Editors Picks

Future of Crypto in the Gulf

The Future of Crypto in the Gulf Looks Exceptionally Bright

April 17, 2026
UAE’s AI-Driven Healthcare

UAE’s AI-Driven Healthcare Cuts Waiting Times Significantly

April 17, 2026
Olive Oil’s Benefits

New Research Suggests Olive Oil’s Benefits May Be Overstated

April 17, 2026
Dubai’s Space Strategy 2030

Dubai’s Space Strategy 2030 Gains Global Attention

April 17, 2026
Super Jupiter Discovery

A Super Jupiter Discovery Challenges Planet Formation Theories

April 17, 2026

Latest Articles

The AI Playlist War Between Spotify and YouTube Music Heats Up

April 17, 2026
TikTok Is Tracking You

TikTok Is Tracking You—Even If You Don’t Use It

April 17, 2026
Hackers Exploit Six Zero-Day Windows Flaws in Coordinated Attacks

Hackers Exploit Six Zero-Day Windows Flaws in Coordinated Attacks

April 17, 2026
Facebook X (Twitter) Instagram LinkedIn
© 2026 Abu Dhabi News. All Rights Reserved.
  • Privacy Policy
  • Terms of use
  • Contact

Type above and press Enter to search. Press Esc to cancel.

Sign In or Register

Welcome Back!

Login to your account below.

Lost password?