CVE-2026-21510

ENISA EUVD: EUVD-2026-7337 ↗
Exploited in the Wild ✓ Confirmed 0-Day ★ Google Project Zero
Triaged: Feb. 18, 2026 9 articles Published: 2026-02-10

EPSS Score

Source: FIRST.org · 2026-05-23
4.96%
probability
This CVE has a 4.96% probability of being exploited in the next 30 days.
0% Top 89.8th percentile of all CVEs 100%

CVSS v3.1

Source: VulnerabilityLookup (CIRCL)
8.8
HIGH
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Temporal
Exploit Code Maturity
Functional
Remediation Level
Official Fix
Report Confidence
Confirmed
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C

Description

NVD
Protection mechanism failure in Windows Shell allows an unauthorized attacker to bypass a security feature over a network.

Affected Products

Microsoft
Windows 10 Version 1607
10.0.14393.0
Microsoft
Windows 10 Version 1809
10.0.17763.0
Microsoft
Windows 10 Version 21H2
10.0.19044.0
Microsoft
Windows 10 Version 22H2
10.0.19045.0
Microsoft
Windows 11 version 22H3
10.0.22631.0

Google Project Zero

Patched
Feb. 10, 2026
Reported by
Google Threat Intelligence Group, Microsoft Threat Intelligence Center (MSTIC), Microsoft Security Response Center (MSRC), and Office Product Group Security Team

Exploits & PoC

EpSiLoNPoInTOrI/EpSiLoNPoInTlnk

CVE-2026-21510 LNK generator PoC

1 2026-05-09
1 repo — triés par ⭐ Rechercher sur GitHub ↗

Signal Intelligence

Confidence
92%
EPSS 4.96%
CVSS v3.1 8.8
Mentions 9
Last Seen Mar 17, 2026

CNA Information

CNA Assigner
microsoft
CNA Title
Windows Shell Security Feature Bypass Vulnerability

Analyst Note

CVE-2026-21510 is confirmed as a zero-day with high credibility: it appears in Google Project Zero, is documented across multiple reputable security sources (Tenable, BleepingComputer, TheHackerNews, CISA), and was patched by Microsoft in their February 2026 Patch Tuesday addressing six actively exploited zero-days. The HIGH CVSS score (8.8) and protection mechanism bypass nature align with the serious threat level documented in security advisories.

Threat Actors 2

Ice Fog
apt_group Information theft and espionage 🇨🇳 CN
Nomad Panda
apt_group Information theft and espionage 🇨🇳 CN

Triage Info

Decided atFeb 18, 2026
Published DateFeb 10, 2026