PT-2026-7396 · Microsoft · Windows Shell+1
Msrc
+1
·
Published
2026-02-10
·
Updated
2026-03-10
·
CVE-2026-21510
CVSS v2.0
10
10
High
| Base vector | Vector | AV:N/AC:L/Au:N/C:C/I:C/A:C |
Name of the Vulnerable Software and Affected Versions
Microsoft Windows Shell versions prior to February 2026 Patch Tuesday
Description
A security feature bypass issue exists in the Windows Shell, allowing an unauthorized attacker to circumvent security features over a network. This vulnerability has been actively exploited in the wild, enabling attackers to bypass Windows SmartScreen and Mark-of-the-Web (MOTW) protections. Specifically, crafted malicious shortcuts (.LNK files) or links can evade security checks, leading to silent payload execution without user warnings. This bypass reduces execution friction in phishing campaigns and can facilitate the deployment of information stealers or ransomware. The vulnerability requires user interaction, such as clicking a malicious link or opening a crafted file. The issue affects Windows 10, Windows 11, and Windows Server.
Recommendations
Apply the February 2026 Patch Tuesday updates immediately.
Treat untrusted .LNK files and links as high-risk until systems are fully updated.
Fix
RCE
Protection Mechanism Failure
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
BDU:2026-01630
CVE-2026-21510
Affected Products
Windows Shell
Windows
References · 44
- https://nvd.nist.gov/vuln/detail/CVE-2026-21510 · Security Note
- https://safe-surf.ru/specialists/bulletins-nkcki/729093 · Security Note
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21510 · Vendor Advisory
- https://bdu.fstec.ru/vul/2026-01630 · Security Note
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21510 · Security Note
- https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-21510 · Vendor Advisory
- https://twitter.com/ZyberWallS/status/2021610901250383959 · Twitter Post
- https://twitter.com/grok/status/2021423036188996056 · Twitter Post
- https://i.redd.it/9jwb3x8yh2jg1.png · Reddit Post
- https://reddit.com/r/SecOpsDaily/comments/1r1lsv0/patch_tuesday_february_2026 · Reddit Post
- https://twitter.com/catnap707/status/2021418155692974089 · Twitter Post
- https://twitter.com/dansantanna/status/2023795596386332745 · Twitter Post
- https://twitter.com/ThreatSynop/status/2021488454878589069 · Twitter Post
- https://t.me/cveNotify/151656 · Telegram Post
- https://twitter.com/leonov_av/status/2031145166577320239 · Twitter Post