CVE-2026-21510 is a high-severity (CVSS 8.8) security bypass in Windows Shell, actively exploited and affecting Windows 10, 11, and Server editions.
| Product | Version Start | Version End (excl.) | Status |
|---|---|---|---|
| windows_10_1607 | * | 10.0.14393.8868 | vulnerable |
| windows_10_1607 | * | 10.0.14393.8868 | vulnerable |
| windows_10_1809 | * | 10.0.17763.8389 | vulnerable |
| windows_10_1809 | * | 10.0.17763.8389 | vulnerable |
| windows_10_21h2 | * | 10.0.19044.6937 | vulnerable |
| windows_10_21h2 | * | 10.0.19044.6937 | vulnerable |
| windows_10_21h2 | * | 10.0.19044.6937 | vulnerable |
| windows_10_22h2 | * | 10.0.19045.6937 | vulnerable |
| windows_10_22h2 | * | 10.0.19045.6937 | vulnerable |
| windows_10_22h2 | * | 10.0.19045.6937 | vulnerable |
| windows_11_23h2 | * | 10.0.22631.6649 | vulnerable |
| windows_11_23h2 | * | 10.0.22631.6649 | vulnerable |
| windows_11_24h2 | * | 10.0.26100.7781 | vulnerable |
| windows_11_24h2 | * | 10.0.26100.7781 | vulnerable |
| windows_11_25h2 | * | 10.0.26200.7781 | vulnerable |
| windows_11_25h2 | * | 10.0.26200.7781 | vulnerable |
| windows_server_2012 | - | - | vulnerable |
| windows_server_2012 | r2 | r2 | vulnerable |
| windows_server_2016 | * | 10.0.14393.8868 | vulnerable |
| windows_server_2019 | * | 10.0.17763.8389 | vulnerable |
| windows_server_2022 | * | 10.0.20348.4711 | vulnerable |
| windows_server_2022_23h2 | * | 10.0.25398.2149 | vulnerable |
| windows_server_2025 | * | 10.0.26100.32313 | vulnerable |
Download and install the specific security updates for CVE-2026-21510 provided by the Microsoft Security Response Center (MSRC) for your specific Windows or Windows Server version.
Ensure all systems are running versions beyond the vulnerable thresholds, such as Windows 11 24H2 build 10.0.26100.7781, Windows 10 22H2 build 10.0.19045.6937, and Windows Server 2025 build 10.0.26100.32313.
Utilize network firewalls and segmentation to limit exposure of Windows Shell components to untrusted networks, and enforce the principle of least privilege to mitigate the impact of a security bypass.
Review system and security logs for unusual process activity or unauthorized attempts to circumvent security controls, particularly those originating from network-based sources.
Detecting exploitation of CVE-2026-21510 requires monitoring for unusual Windows Shell behavior and unauthorized security feature overrides. Security teams should watch for Event ID 4688 (Process Creation) with suspicious parent-child relationships involving shell components. Additionally, monitor network traffic for signatures associated with security bypass attempts and audit Event ID 4673 for sensitive privilege use that deviates from established baselines. Check MSRC-provided IOCs to identify active exploitation patterns.
Experience superior visibility and a simpler approach to cyber risk management