⚠ Actively exploited
Added to CISA KEV on 2026-02-10. Federal agencies required to patch by 2026-03-03. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable..
CVE-2026-21510
Severity
8.8HIGH
EPSS
3.5%
top 12.35%
CISA KEV
KEV
Added 2026-02-10
Due 2026-03-03
Exploit
No known exploits
Affected products
Timeline
PublishedFeb 10
KEV addedFeb 10
KEV dueMar 3
CISA Required Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
Description
Protection mechanism failure in Windows Shell allows an unauthorized attacker to bypass a security feature over a network.
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9
Affected Packages28 packages
🔴Vulnerability Details
3GHSA▶
GHSA-q6v4-4w5r-j7hr: Protection mechanism failure in Windows Shell allows an unauthorized attacker to bypass a security feature over a network↗2026-02-10