This month is yet another busy one for IT administrators, security engineers, and others focused on keeping their organizations secure. There are six zero days mentioned in this month’s alerts, and 58 vulnerabilities found. I’ll review just a few here.
CVE-2026-21510 – Windows Shell Security Feature Bypass Vulnerability
This zero day comes in at a CVSS 8.8. Attackers are exploiting it by pushing malicious links or shortcut files that bypass SmartScreen and Windows Shell warnings.
CVE-2026-21513 – MSHTML Framework Security Feature Bypass Vulnerability
With a severity score of 8.8, attackers are exploiting this vulnerability via a malicious HTML or shortcut file, which can cause Windows to skip MSHTML security checks.
CVE-2026-21514 – Microsoft Word Security Feature Bypass Vulnerability
This zero day comes in at a CVSS 7.8. Attackers are exploiting it by tricking end users into opening malicious Word documents, which allows them to bypass Microsoft Office OLE Security controls.
CVE-2026-21519 – Desktop Window Manager Elevation of Privilege Vulnerability
This one comes in with a CVSS severity score of 7.8. If an attacker already has access to a standard user account on the affected device, they can exploit this vulnerability to elevate their privileges to the system level. Once they reach the system, they can disable security features and take full control of the machine. It’s important to note that this is a Windows Desktop Window Manager flaw.
CVE-2026-21533 – Windows Remote Desktop Services Elevation of Privilege Vulnerability
Like the previous vulnerability, this flaw allows attackers to escalate their privileges to the system level, providing them with the ability to make critical changes to the operating system. The vulnerability specifically affects Windows Remote Desktop Services, making it possible for an attacker with initial access to gain full control over the system.
CVE-2026-21525 Windows Remote Access Connection Manager Denial of Service
This final zero day has a severity score of 6.2 and allows attackers to crash affected systems.
Takeaways
It’s essential to recognize the risk and significance these vulnerabilities pose to your organization. Staying informed and ensuring proper systems are in place is crucial for minimizing exposure to such security threats.
Learn more about the latest security news.
How Recast makes a difference
With Right Click Tools Core and add-ons for Patching and Privileged Access, Recast helps IT teams bridge patching gaps, especially for third-party applications.
1. Address third-party app shortcomings
Spot outdated third-party software, remove unused apps, and standardize versions automatically.
2. Speed up patch troubleshooting
Leverage Remote Software Center and interactive diagnostics to quickly fix patch failures and accelerate remediation.
3. Reduce risk with robust device baselines
Ensure devices meet security standards for encryption, BIOS/firmware status, Secure Boot, and both hardware and software inventories.
4. Remove privileged account access
Implement zero trust by removing unnecessary elevated accounts and allowing users to elevate access only with strict controls to minimize risks from over-privileged accounts.
Next steps
Download our free tools to help you automate, troubleshoot, and validate configurations in your test environment.