Microsoft fixes two zero-day vulnerabilities in the latest Windows update
Microsoft fixes two zero-day vulnerabilities in the latest Windows update
The company released its latest Patch Tuesday update, which addresses critical vulnerabilities in Windows 10 and Windows 11. These include two zero-day flaws that were already being exploited by attackers, as well as improvements to Secure Boot, the graphics system, and various operating system tools.
Microsoft released a new security update for its Windows 10 and Windows 11 operating systems as part of its traditional monthly Patch Tuesday cycle. The company fixed 79 vulnerabilities detected in the system, including two zero-day exploits—flaws that were already being exploited by attackers before an official fix existed.
This new patch package includes critical security fixes for the operating system, as well as technical improvements in areas such as Secure Boot, the graphics system, File Explorer, and System Image Manager.
The updates are available through Windows Update and are distributed in different packages depending on the operating system version used by users.
Available Patches for Windows 10 and Windows 11
For Windows 11, Microsoft released several update packages. Patch KB5079473 was released for versions 25H2 and 24H2, while version 23H2 received update KB5078883.
Windows 10 received patch KB5078885, targeting versions 22H2 and 21H2 of the operating system.
The main objective of these patches is to close security vulnerabilities that could be exploited by cybercriminals, including flaws that would allow malicious code to be executed remotely, administrative privileges to be obtained, or sensitive information stored on computers to be accessed.
Updates are part of Microsoft’s regular maintenance process, but the presence of actively exploited vulnerabilities increases the urgency of installing them.
Two zero-day vulnerabilities worry experts
Among the 79 flaws corrected, two vulnerabilities stand out as zero-day, a particularly dangerous category within the field of cybersecurity.
Zero-day vulnerabilities are characterized by being exploited by attackers before a patch is available, which increases the risk for users and companies.
One of these vulnerabilities, identified as CVE-2026-21262, was discovered by researcher Erland Sommarskog. This flaw affects the Microsoft SQL Server environment and allowed attackers to gain administrator privileges within the database system.
In an attack scenario, this type of vulnerability could facilitate complete control of the affected environment, compromising enterprise databases or critical infrastructure that relies on this engine.
The second vulnerability, registered as CVE-2026-26127, is related to .NET. In this case, it is a denial-of-service (DoS) flaw that could be exploited remotely to disrupt certain services or applications.
While this type of vulnerability does not allow for direct control of a system, it can affect the availability of platforms and services that depend on the framework, which is especially critical in enterprise environments.
Source: www.itsitio.com
