Categories: Cyber Security News

Windows Shell Security Feature 0-Day Vulnerability Let Attackers Bypass Authentication

Microsoft released Microsoft Patch Tuesday updates to address a critical zero-day vulnerability in Windows Shell that is currently being actively exploited in the wild.

Tracked as CVE-2026-21510, this security flaw allows remote attackers to bypass essential protection mechanisms, putting millions of Windows users at risk.

The vulnerability is classified as a “Security Feature Bypass” with a CVSS score of 8.8 (Important). It resides in how Windows Shell handles certain file types.

Normally, Windows uses features like SmartScreen and user prompts to warn you before running potentially dangerous files from the internet, a concept known as the “Mark of the Web.”

By exploiting CVE-2026-21510, attackers can create specially crafted files (such as malicious shortcuts or links) that evade these checks entirely.

If a user is tricked into clicking such a link, the attacker’s malicious code can execute immediately without any warning dialogs or consent prompts appearing on the screen.

This effectively bypasses the “authentication” step, where the user approves the execution of untrusted software.

The flaw affects a vast range of Microsoft products, spanning both modern and older systems. According to the release data, the vulnerable versions include:

Product Family Affected Versions
Windows 10 Versions 1607, 1809, 21H2, 22H2
Windows 11 Versions 23H2, 24H2, 25H2, 26H1
Windows Server 2012, 2012 R2, 2016, 2019, 2022, 2025

Microsoft has confirmed that this vulnerability allows attackers to run unauthorized content as if it were trusted.

Because this vulnerability is actively exploited (a 0-day), administrators and users must patch their systems immediately.

Update Now: Go to Settings > Windows Update and check for updates released on February 10, 2026.

Watch for Links: Be extra cautious when clicking links or opening shortcut files from unknown sources, even if they appear harmless, until the patch is applied.

The discovery of this flaw was credited to researchers from the Microsoft Threat Intelligence Center (MSTIC) and the Google Threat Intelligence Group, highlighting the severity and cross-industry attention this issue has received.

Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

The post Windows Shell Security Feature 0-Day Vulnerability Let Attackers Bypass Authentication appeared first on Cyber Security News.

rssfeeds-admin

Recent Posts

Super Mario Galaxy 2 Surprise Update Adds More Story

Nintendo has dropped a surprise update for Super Mario Galaxy 2 that adds a new…

34 minutes ago

Injustice 3 Rumored to Be Mortal Kombat Developer NetherRealm’s Next Fighting Game

It’s been nearly three years since Mortal Kombat 1 came out, but developer NetherRealm has…

34 minutes ago

The Simpsons Present Edgar Allan Poe’s “The Raven,” and Teachers Now Use It to Teach Kids the Joys of Literature

The Simpsons has mocked or referenced literature over its many seasons, usually through a book…

1 hour ago

New EtherRAT Variant Uses Trojanized Tftpd64 Installer to Bridge Web2 Malware and Web3 Theft

A new and more dangerous type of malware is quietly targeting Windows users by hiding…

2 hours ago

New EtherRAT Variant Uses Trojanized Tftpd64 Installer to Bridge Web2 Malware and Web3 Theft

A new and more dangerous type of malware is quietly targeting Windows users by hiding…

2 hours ago

SonicWall SonicOS Vulnerabilities Allow Attackers to Bypass Access Controls and Crash Firewall

SonicWall has released a security advisory addressing three vulnerabilities in its SonicOS software. Discovered by…

2 hours ago

This website uses cookies.