Tekmono
  • News
  • Guides
  • Lists
  • Reviews
  • Deals
No Result
View All Result
Tekmono
No Result
View All Result
Home News
Microsoft Releases Patches for Actively Exploited Zero-Days

Microsoft Releases Patches for Actively Exploited Zero-Days

by Tekmono Editorial Team
12/02/2026
in News
Share on FacebookShare on Twitter

Microsoft has released security updates for a series of zero-day vulnerabilities in Windows and Office that are being actively exploited by attackers. The company described the exploits as one-click attacks that can install malware or grant unauthorized access with minimal user interaction.

Two of the flaws can be triggered when a user clicks a malicious link on a Windows computer, while a third can compromise a system when a malicious Office file is opened. Microsoft classified the bugs as zero-days because they were being used before patches were available. Details of the exploitation methods have been published, increasing the risk of further attacks. Microsoft did not disclose the source of the published details, and a spokesperson did not immediately comment to TechCrunch when asked about the publication.

Security researchers from Google’s Threat Intelligence Group are credited with discovering the vulnerabilities. One of the bugs, identified as CVE‑2026‑21510, resides in the Windows shell that powers the operating system’s user interface and affects all supported Windows versions. When a victim clicks a malicious link, the vulnerability bypasses Microsoft’s SmartScreen filter, which normally blocks malicious links and files. Security expert Dustin Childs noted that the bug can be used to remotely plant malware. “There is user interaction here, as the client needs to click a link or a shortcut file,” Childs wrote in his blog post. “Still, a one‑click bug to gain code execution is a rarity.”

Related Reads

Anthropic to Cover Data Center Electricity Price Hikes

Clear iPhone Unread Emails in Bulk Quickly

Hide iPhone Contacts with 3 Simple Methods

Unlock T-Mobile Phone with Simple Steps Guide

A Google spokesperson confirmed that the Windows shell vulnerability is under “widespread, active exploitation” and can enable silent execution of high‑privilege malware, raising the risk of ransomware deployment or intelligence collection. The second Windows zero‑day, CVE‑2026‑21513, is located in Microsoft’s proprietary MSHTML browser engine, originally used by Internet Explorer and retained for backward compatibility. Microsoft said the flaw allows attackers to bypass Windows security controls to install malware.

Independent security reporter Brian Krebs reported that Microsoft also patched three additional zero‑day bugs that were being actively exploited, though the details of those vulnerabilities were not disclosed in the announcement. Microsoft’s response includes the release of patches for all identified zero‑day bugs, urging users to apply the updates promptly to mitigate the risk of compromise.

ShareTweet

You Might Be Interested

Anthropic to Cover Data Center Electricity Price Hikes
News

Anthropic to Cover Data Center Electricity Price Hikes

12/02/2026
Clear iPhone Unread Emails in Bulk Quickly
News

Clear iPhone Unread Emails in Bulk Quickly

12/02/2026
Hide iPhone Contacts with 3 Simple Methods
News

Hide iPhone Contacts with 3 Simple Methods

12/02/2026
Unlock T-Mobile Phone with Simple Steps Guide
News

Unlock T-Mobile Phone with Simple Steps Guide

12/02/2026
Please login to join discussion

Recent Posts

  • Anthropic to Cover Data Center Electricity Price Hikes
  • Clear iPhone Unread Emails in Bulk Quickly
  • Hide iPhone Contacts with 3 Simple Methods
  • Unlock T-Mobile Phone with Simple Steps Guide
  • Remove Facebook from Android Phone Easily

Recent Comments

No comments to show.
  • News
  • Guides
  • Lists
  • Reviews
  • Deals
Tekmono is a Linkmedya brand. © 2015.

No Result
View All Result
  • News
  • Guides
  • Lists
  • Reviews
  • Deals