  {"id":39517,"date":"2026-02-11T15:38:58","date_gmt":"2026-02-11T20:38:58","guid":{"rendered":"https:\/\/www.yorku.ca\/uit\/?p=39517"},"modified":"2026-02-11T15:43:15","modified_gmt":"2026-02-11T20:43:15","slug":"windows-shell-security-feature-bypass-vulnerability-cve-2026-21510","status":"publish","type":"post","link":"https:\/\/www.yorku.ca\/uit\/2026\/02\/windows-shell-security-feature-bypass-vulnerability-cve-2026-21510\/","title":{"rendered":"Windows Shell Security Feature Bypass Vulnerability (CVE-2026-21510)"},"content":{"rendered":"<div class=\"postie-post\">\n<div>\n<div class=\"WordSection1\">\n<p class=\"MsoNormal\"><o:p>&nbsp;<\/o:p><\/p>\n<div align=\"center\">\n<table class=\"MsoNormalTable\" border=\"0\" cellspacing=\"0\" cellpadding=\"0\" width=\"725\" style=\"width:544.0pt;background:#E0E0E0;border-collapse:collapse\">\n<tbody>\n<tr>\n<td style=\"border:solid windowtext 1.0pt;padding:0cm 0cm 0cm 0cm\">\n<table class=\"MsoNormalTable\" border=\"0\" cellspacing=\"0\" cellpadding=\"0\" width=\"100%\" style=\"width:100.0%;border-collapse:collapse\">\n<tbody>\n<tr>\n<td width=\"100%\" style=\"width:100.0%;padding:0cm 0cm 0cm 0cm\"><\/td>\n<\/tr>\n<tr>\n<td width=\"100%\" style=\"width:100.0%;padding:0cm 0cm 0cm 0cm\">\n<table class=\"MsoNormalTable\" border=\"0\" cellspacing=\"0\" cellpadding=\"0\" width=\"600\" style=\"width:450.0pt;background:white;border-collapse:collapse\">\n<tbody>\n<tr>\n<td width=\"100%\" style=\"width:100.0%;padding:0cm 0cm 0cm 0cm\">\n<table class=\"MsoNormalTable\" border=\"0\" cellspacing=\"0\" cellpadding=\"0\" width=\"100%\" style=\"width:100.0%;border-collapse:collapse\">\n<tbody>\n<tr>\n<td width=\"100%\" style=\"width:100.0%;padding:0cm 0cm 0cm 0cm\">\n<table class=\"MsoNormalTable\" border=\"0\" cellspacing=\"0\" cellpadding=\"0\" width=\"100%\" style=\"width:100.0%;border-collapse:collapse\">\n<tbody>\n<tr>\n<td width=\"100%\" style=\"width:100.0%;padding:0cm 0cm 0cm 0cm\">\n<table class=\"MsoNormalTable\" border=\"0\" cellspacing=\"0\" cellpadding=\"0\" width=\"100%\" style=\"width:100.0%;border-collapse:collapse\">\n<tbody>\n<tr>\n<td width=\"100%\" style=\"width:100.0%;padding:0cm 0cm 0cm 0cm\">\n<table class=\"MsoNormalTable\" border=\"0\" cellspacing=\"0\" cellpadding=\"0\" width=\"100%\" style=\"width:100.0%;border-collapse:collapse\">\n<tbody>\n<tr>\n<td style=\"padding:0cm 0cm 0cm 0cm\"><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"100%\" style=\"width:100.0%;padding:0cm 0cm 0cm 0cm\">\n<table class=\"MsoNormalTable\" border=\"0\" cellspacing=\"0\" cellpadding=\"0\" width=\"100%\" style=\"width:100.0%;border-collapse:collapse\">\n<tbody>\n<tr>\n<td width=\"100%\" style=\"width:100.0%;padding:0cm 0cm 0cm 0cm\">\n<table class=\"MsoNormalTable\" border=\"0\" cellspacing=\"0\" cellpadding=\"0\" width=\"100%\" style=\"width:100.0%;border-collapse:collapse\">\n<tbody>\n<tr>\n<td width=\"100%\" style=\"width:100.0%;padding:0cm 0cm 0cm 0cm\">\n<table class=\"MsoNormalTable\" border=\"0\" cellspacing=\"0\" cellpadding=\"0\" width=\"100%\" style=\"width:100.0%;border-collapse:collapse\">\n<tbody>\n<tr>\n<td width=\"100%\" style=\"width:100.0%;padding:6.75pt 13.5pt 6.75pt 13.5pt\">\n<p class=\"MsoNormal\"><span style=\"font-family:\"IBM Plex Sans\",sans-serif\"><img loading=\"lazy\" decoding=\"async\" width=\"688\" height=\"100\" style=\"width:7.1666in;height:1.0416in\" id=\"Picture_x0020_2\" src=\"https:\/\/www.yorku.ca\/uit\/wp-content\/uploads\/sites\/805\/2026\/02\/image001-9.png\" alt=\"A picture containing text  Description automatically generated\"><\/span><span style=\"font-family:\"IBM Plex Sans\",sans-serif\"><o:p><\/o:p><\/span><\/p>\n<p class=\"MsoNormal\" align=\"center\" style=\"text-align:center;page-break-after:avoid\">  <span style=\"font-family:\"IBM Plex Sans\",sans-serif;mso-fareast-language:EN-US\"><o:p>&nbsp;<\/o:p><\/span><\/p>\n<p class=\"MsoNormal\" align=\"center\" style=\"margin-bottom:12.0pt;text-align:center;line-height:105%\">  <b><span style=\"font-family:\"IBM Plex Sans\",sans-serif\">Information Security Advisory<\/span><\/b><span class=\"xxxxxxxxnormaltextrun\"><span style=\"font-family:\"IBM Plex Sans\",sans-serif\"><o:p><\/o:p><\/span><\/span><\/p>\n<p style=\"background:white\"><span style=\"font-family:\"IBM Plex Sans\",sans-serif;color:black;background:white\"><br \/>  A recently disclosed Windows Shell vulnerability (CVE\u20112026\u201121510) allows bypass critical security features by exploiting improper validation in Windows Shell components.<\/p>\n<p>  <\/span><b><span style=\"font-family:\"IBM Plex Sans\",sans-serif;color:black\">Severity level<br \/>  <\/span><\/b><span style=\"font-family:\"IBM Plex Sans\",sans-serif;color:black\">CVSS Score: 8.8\/high<br \/>  <b><br \/>  Description:<br \/>  <\/b><span style=\"background:white\">CVE\u20112026\u201121510 is a protection mechanism failure in Microsoft Windows Shell that enables an unauthorized attacker to bypass built\u2011in security features over a network. The vulnerability arises from improper handling of remotely   delivered content within Windows Shell components. By convincing a user to open a malicious link or shortcut (.lnk) file, an attacker can circumvent Windows SmartScreen and other Shell security prompts, allowing attacker\u2011controlled content to execute without   warning or user consent.<br \/>  <\/span><b><br \/>  Affected Versions<\/b><\/span><b><span style=\"font-family:\"IBM Plex Sans\",sans-serif;color:#242424\">:&nbsp; &nbsp;<o:p><\/o:p><\/span><\/b><\/p>\n<ul type=\"disc\">\n<li style=\"color:black;mso-list:l1 level1 lfo3;background:white\"><span style=\"font-family:\"IBM Plex Sans\",sans-serif;background:white\">Windows 10 versions: &nbsp;1607, 1809, 21H2, 22H2.<o:p><\/o:p><\/span><\/li>\n<li style=\"color:black;mso-list:l1 level1 lfo3;background:white\"><span style=\"font-family:\"IBM Plex Sans\",sans-serif;background:white\">Windows 11 versions: 23H2, 24H2 and later builds.<o:p><\/o:p><\/span><\/li>\n<li style=\"mso-list:l1 level1 lfo3;background:white\"><span style=\"font-family:\"IBM Plex Sans\",sans-serif;color:black;background:white\">Windows Server: 2012, 2012 R2, 2016, 2019, 2022, and 2022 23H2.<\/span><span style=\"font-family:\"IBM Plex Sans\",sans-serif\"><o:p><\/o:p><\/span><\/li>\n<\/ul>\n<p class=\"elementtoproof\" style=\"background:white\"><span style=\"font-family:\"IBM Plex Sans\",sans-serif;color:black;background:white\">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<o:p><\/o:p><\/span><\/p>\n<p class=\"elementtoproof\" style=\"background:white\"><b><span style=\"font-family:\"IBM Plex Sans\",sans-serif;color:black;background:white\">Impact:<br \/>  <\/span><\/b><span style=\"font-family:\"IBM Plex Sans\",sans-serif;color:black;background:white\">Successful exploitation allows attackers to Bypass Windows Shell and SmartScreen security protections.<br \/>  <\/span><b><span style=\"font-family:\"IBM Plex Sans\",sans-serif;color:black\"><br \/>  Resolution:<br \/>  <\/span><\/b><span style=\"font-family:\"IBM Plex Sans\",sans-serif;color:black;background:white\">Please apply the latest patches as part of the February 2026 Security updates.<br \/>  <\/span><span class=\"MsoHyperlink\"><b><br \/>  <\/b><\/span><span class=\"MsoHyperlink\"><b><span style=\"font-family:\"IBM Plex Sans\",sans-serif;color:black;background:white;text-decoration:none\">Reference:<\/span><\/b><\/span><span class=\"MsoHyperlink\"><span style=\"font-family:\"IBM Plex Sans\",sans-serif;color:black;background:white;text-decoration:none\"><o:p><\/o:p><\/span><\/span><\/p>\n<p class=\"elementtoproof\" style=\"background:white\"><span class=\"MsoHyperlink\"><span style=\"font-family:\"IBM Plex Sans\",sans-serif;color:black;background:white;text-decoration:none\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-21510\"><span style=\"color:black;text-decoration:none\">https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-21510<\/span><\/a><o:p><\/o:p><\/span><\/span><\/p>\n<p class=\"elementtoproof\" style=\"background:white\"><span class=\"MsoHyperlink\"><span style=\"font-family:\"IBM Plex Sans\",sans-serif;color:black;background:white;text-decoration:none\"><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2026-21510\"><span style=\"color:black;text-decoration:none\">https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2026-21510<\/span><\/a><o:p><\/o:p><\/span><\/span><\/p>\n<p class=\"elementtoproof\" style=\"background:white\"><span class=\"MsoHyperlink\"><span style=\"font-family:\"IBM Plex Sans\",sans-serif;color:black;background:white;text-decoration:none\"><a href=\"https:\/\/thehackernews.com\/2026\/02\/microsoft-patches-59-vulnerabilities.html\"><span style=\"color:black;text-decoration:none\">https:\/\/thehackernews.com\/2026\/02\/microsoft-patches-59-vulnerabilities.html<\/span><\/a><o:p><\/o:p><\/span><\/span><\/p>\n<p class=\"elementtoproof\" style=\"background:white\"><span style=\"font-family:\"IBM Plex Sans\",sans-serif\"><o:p>&nbsp;<\/o:p><\/span><\/p>\n<p class=\"elementtoproof\" style=\"background:white\"><span style=\"font-family:\"IBM Plex Sans\",sans-serif;color:black;background:white\"><\/p>\n<p>  <o:p><\/o:p><\/span><\/p>\n<p class=\"MsoNormal\" style=\"margin-bottom:12.0pt;line-height:105%\"><span style=\"font-size:10.0pt;line-height:105%;font-family:\"IBM Plex Sans\",sans-serif;color:black;background:white\"><br \/>  Information&nbsp;Security<\/span><span style=\"font-family:\"IBM Plex Sans\",sans-serif\">&nbsp;<o:p><\/o:p><\/span><\/p>\n<p class=\"MsoNormal\"><b><span style=\"font-family:\"IBM Plex Sans\",sans-serif\"><\/p>\n<p>  Contact <\/span><\/b><span style=\"font-family:\"IBM Plex Sans\",sans-serif\"><o:p><\/o:p><\/span><\/p>\n<p class=\"MsoNormal\" style=\"page-break-after:avoid\"><span style=\"font-family:\"IBM Plex Sans\",sans-serif\">IT Client Services at  <\/span><a href=\"mailto:askIT@yorku.ca\"><span style=\"font-family:\"IBM Plex Sans\",sans-serif\"><a href=\"mailto:askIT@yorku.ca\" >askIT@yorku.ca<\/a><\/span><\/a><span style=\"font-family:\"IBM Plex Sans\",sans-serif\"> or 416 736 5800  <span style=\"color:#548235\"><o:p><\/o:p><\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"100%\" style=\"width:100.0%;padding:6.75pt 13.5pt 6.75pt 13.5pt\">\n<p class=\"MsoNormal\"><span style=\"font-family:\"IBM Plex Sans\",sans-serif\"><o:p>&nbsp;<\/o:p><\/span><\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"100%\" style=\"width:100.0%;padding:0cm 0cm 0cm 0cm\">\n<table class=\"MsoNormalTable\" border=\"0\" cellspacing=\"0\" cellpadding=\"0\" width=\"100%\" style=\"width:100.0%;border-collapse:collapse\">\n<tbody>\n<tr>\n<td width=\"100%\" style=\"width:100.0%;padding:0cm 0cm 0cm 0cm\">\n<table class=\"MsoNormalTable\" border=\"0\" cellspacing=\"0\" cellpadding=\"0\" width=\"100%\" style=\"width:100.0%;border-collapse:collapse\">\n<tbody>\n<tr>\n<td width=\"100%\" style=\"width:100.0%;padding:0cm 0cm 0cm 0cm\">\n<p class=\"MsoNormal\"><span style=\"font-family:\"IBM Plex Sans\",sans-serif\"><o:p>&nbsp;<\/o:p><\/span><\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"100%\" style=\"width:100.0%;padding:0cm 0cm 0cm 0cm\">\n<table class=\"MsoNormalTable\" border=\"0\" cellspacing=\"0\" cellpadding=\"0\" width=\"600\" style=\"width:450.0pt;background:white;border-collapse:collapse\">\n<tbody>\n<tr>\n<td width=\"100%\" style=\"width:100.0%;padding:0cm 0cm 0cm 0cm\">\n<table class=\"MsoNormalTable\" border=\"0\" cellspacing=\"0\" cellpadding=\"0\" width=\"100%\" style=\"width:100.0%;border-collapse:collapse\">\n<tbody>\n<tr>\n<td width=\"100%\" style=\"width:100.0%;padding:0cm 0cm 0cm 0cm\">\n<table class=\"MsoNormalTable\" border=\"0\" cellspacing=\"0\" cellpadding=\"0\" width=\"100%\" style=\"width:100.0%;border-collapse:collapse\">\n<tbody>\n<tr>\n<td width=\"100%\" style=\"width:100.0%;padding:0cm 0cm 0cm 0cm\"><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"100%\" style=\"width:100.0%;padding:0cm 0cm 0cm 0cm\">\n<table class=\"MsoNormalTable\" border=\"0\" cellspacing=\"0\" cellpadding=\"0\" width=\"600\" style=\"width:450.0pt;background:#F2F2F2;border-collapse:collapse\">\n<tbody>\n<tr>\n<td width=\"100%\" style=\"width:100.0%;padding:0cm 0cm 0cm 0cm\">\n<table class=\"MsoNormalTable\" border=\"0\" cellspacing=\"0\" cellpadding=\"0\" width=\"100%\" style=\"width:100.0%;border-collapse:collapse\">\n<tbody>\n<tr>\n<td width=\"100%\" style=\"width:100.0%;padding:0cm 0cm 0cm 0cm\">\n<table class=\"MsoNormalTable\" border=\"0\" cellspacing=\"0\" cellpadding=\"0\" width=\"100%\" style=\"width:100.0%;border-collapse:collapse\">\n<tbody>\n<tr>\n<td width=\"100%\" style=\"width:100.0%;padding:0cm 0cm 0cm 0cm\">\n<table class=\"MsoNormalTable\" border=\"0\" cellspacing=\"0\" cellpadding=\"0\" width=\"100%\" style=\"width:100.0%;border-collapse:collapse\">\n<tbody>\n<tr>\n<td width=\"100%\" style=\"width:100.0%;padding:0cm 0cm 0cm 0cm\">\n<table class=\"MsoNormalTable\" border=\"0\" cellspacing=\"0\" cellpadding=\"0\" width=\"100%\" style=\"width:100.0%;border-collapse:collapse\">\n<tbody>\n<tr>\n<td width=\"100%\" style=\"width:100.0%;padding:0cm 0cm 0cm 0cm\">\n<table class=\"MsoNormalTable\" border=\"0\" cellspacing=\"0\" cellpadding=\"0\" width=\"100%\" style=\"width:100.0%;border-collapse:collapse\">\n<tbody>\n<tr>\n<td width=\"100%\" style=\"width:100.0%;padding:6.75pt 13.5pt 6.75pt 13.5pt\">\n<p class=\"MsoNormal\"><a href=\"https:\/\/www.yorku.ca\/about\/privacy-legal\/\" target=\"_blank\"><span lang=\"EN-US\" style=\"font-size:10.0pt;font-family:\"IBM Plex Sans\",sans-serif\">PRIVACY POLICY<\/span><\/a><span lang=\"EN-US\" style=\"font-size:10.0pt;font-family:\"IBM Plex Sans\",sans-serif\">&nbsp;|&nbsp;<\/span><a href=\"https:\/\/www.yorku.ca\" target=\"_blank\"><span lang=\"EN-US\" style=\"font-size:10.0pt;font-family:\"IBM Plex Sans\",sans-serif\">VISIT   WWW.YORKU.CA<\/span><\/a><span style=\"font-size:10.0pt;font-family:\"IBM Plex Sans\",sans-serif;color:#505050\"><br \/>  This email was sent by: <b>¿ì²¥ÊÓÆµ, 4700 Keele Street, Toronto, Ontario M3J 1P3<\/b>  <\/span><span style=\"font-size:10.0pt;font-family:\"IBM Plex Sans\",sans-serif\"><o:p><\/o:p><\/span><\/p>\n<p class=\"MsoNormal\"><span style=\"font-size:10.0pt;font-family:\"IBM Plex Sans\",sans-serif;color:#505050\">This email is viewed best in Microsoft Outlook for web&nbsp;<\/span><span style=\"font-family:\"IBM Plex Sans\",sans-serif\"><o:p><\/o:p><\/span><\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table><\/div>\n<p class=\"MsoNormal\"><span style=\"font-family:\"IBM Plex Sans\",sans-serif\"><o:p>&nbsp;<\/o:p><\/span><\/p>\n<p class=\"MsoNormal\"><span style=\"font-size:11.0pt\"><o:p>&nbsp;<\/o:p><\/span><\/p><\/div>\n<\/p><\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>&nbsp; &nbsp; Information Security Advisory A recently disclosed Windows Shell vulnerability (CVE\u20112026\u201121510) allows bypass critical security features by exploiting improper validation in Windows Shell components. Severity level CVSS Score: 8.8\/high Description: CVE\u20112026\u201121510 is a protection mechanism failure in Microsoft Windows Shell that enables an unauthorized attacker to bypass built\u2011in security features over a network. The [&hellip;]<\/p>\n","protected":false},"author":212,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_kad_blocks_custom_css":"","_kad_blocks_head_custom_js":"","_kad_blocks_body_custom_js":"","_kad_blocks_footer_custom_js":"","footnotes":""},"categories":[29],"tags":[],"class_list":["post-39517","post","type-post","status-publish","format-standard","hentry","category-news"],"taxonomy_info":{"category":[{"value":29,"label":"News"}]},"featured_image_src_large":false,"author_info":{"display_name":"aalaily","author_link":"https:\/\/www.yorku.ca\/uit\/author\/aalaily\/"},"comment_info":"","category_info":[{"term_id":29,"name":"News","slug":"news","term_group":0,"term_taxonomy_id":3,"taxonomy":"category","description":"","parent":0,"count":487,"filter":"raw","cat_ID":29,"category_count":487,"category_description":"","cat_name":"News","category_nicename":"news","category_parent":0}],"tag_info":false,"_links":{"self":[{"href":"https:\/\/www.yorku.ca\/uit\/wp-json\/wp\/v2\/posts\/39517","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.yorku.ca\/uit\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.yorku.ca\/uit\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.yorku.ca\/uit\/wp-json\/wp\/v2\/users\/212"}],"replies":[{"embeddable":true,"href":"https:\/\/www.yorku.ca\/uit\/wp-json\/wp\/v2\/comments?post=39517"}],"version-history":[{"count":0,"href":"https:\/\/www.yorku.ca\/uit\/wp-json\/wp\/v2\/posts\/39517\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.yorku.ca\/uit\/wp-json\/wp\/v2\/media?parent=39517"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.yorku.ca\/uit\/wp-json\/wp\/v2\/categories?post=39517"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.yorku.ca\/uit\/wp-json\/wp\/v2\/tags?post=39517"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}