Microsoft published a security advisory highlighting vulnerabilities in the following products on February 10, 2026. It is recommended that you take the necessary precautions by ensuring your products are always updated.
- .NET 10.0
- .NET 8.0
- .NET 9.0
- Azure AI Language Authoring
- Azure ARC
- Azure DevOps Server 2022
- Azure Front Door
- Azure Functions
- Azure HDInsight
- Azure IoT Explorer
- Azure Local
- GitHub Copilot Plugin for JetBrains IDEs
- Microsoft 365
- Microsoft ACI Confidential Containers
- Microsoft Defender for Endpoint for Linux
- Microsoft Excel 2016
- Microsoft Exchange Server 2016
- Microsoft Exchange Server 2019
- Microsoft Exchange Server Subscription Edition RTM
- Microsoft Office 2019
- Microsoft Office LTSC
- Microsoft Office LTSC 2021
- Microsoft Office LTSC 2024
- Microsoft Outlook 2016
- Microsoft SharePoint Enterprise Server 2016
- Microsoft SharePoint Server 2019
- Microsoft SharePoint Server Subscription Edition
- Microsoft SQL Server 2022
- Microsoft SQL Server 2025
- Microsoft Visual Studio 2022
- Microsoft Word 2016
- Office Online Server
- Power BI Report Server
- Visual Studio Code
- Windows 10
- Windows 11
- Windows App for Mac
- Windows Notepad
- Windows Server 2012
- Windows Server 2016
- Windows Server 2019
- Windows Server 2022
- Windows Server 2025
Microsoft has received reports that CVE-2026-21525, CVE-2026-21514, CVE-2026-21510, CVE-2026-21513, CVE-2026-21533 and CVE-2026-21519 are being exploited.
For more information on these updates, you can follow these URLs:
The Guyana National CIRT recommends that users and administrators review this update and apply it where necessary.
PDF Download: Microsoft Security Advisory- Monthly Rollup
References
Microsoft Security Advisory (February 10th, 2026). Retrieved from Canadian Centre for Cyber Security. https://www.cyber.gc.ca/en/alerts-advisories/microsoft-security-advisory-february-2026-monthly-rollup-av26-111