⚠ Actively exploited
Added to CISA KEV on 2026-02-10. Federal agencies required to patch by 2026-03-03. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable..

CVE-2026-21513

CWE-69310 documents9 sources
Severity
8.8HIGH
EPSS
28.0%
top 3.53%
CISA KEV
KEV
Added 2026-02-10
Due 2026-03-03
Exploit
No known exploits
Timeline
PublishedFeb 10
KEV addedFeb 10
KEV dueMar 3
Latest updateApr 3
CISA Required Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

Description

Protection mechanism failure in MSHTML Framework allows an unauthorized attacker to bypass a security feature over a network.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9

Affected Packages28 packages

NVDmicrosoft/windows< 10.0.14393.8868+5
NVDmicrosoft/windows_10_1607< 10.0.14393.8868
NVDmicrosoft/windows_10_1809< 10.0.17763.8389
NVDmicrosoft/windows_10_21h2< 10.0.19044.6937
NVDmicrosoft/windows_10_22h2< 10.0.19045.6937

🔴Vulnerability Details

3
CVEList
MSHTML Framework Security Feature Bypass Vulnerability2026-02-10
GHSA
GHSA-rqf6-jf48-p6rm: Protection mechanism failure in MSHTML Framework allows an unauthorized attacker to bypass a security feature over a network2026-02-10
VulnCheck
Microsoft MSHTML Framework Protection Mechanism Failure Vulnerability2026

📋Vendor Advisories

2
CISA
Microsoft MSHTML Framework Protection Mechanism Failure Vulnerability2026-02-10
Microsoft
MSHTML Framework Security Feature Bypass Vulnerability2026-02-10

🕵️Threat Intelligence

3
abuse.ch
ThreatFox Malware Profile: Unidentified 0012026-04-03
Krebs
Patch Tuesday, February 2026 Edition2026-02-10
Wiz
CVE-2026-21513 Impact, Exploitability, and Mitigation Steps | Wiz
CVE-2026-21513 (HIGH CVSS 8.8) | Protection mechanism failure in MSH | cvebase.io