Otto  background

Patch [Fix] Tuesday: February 2026

VPN disruptions, SmartScreen bypasses, and the rising tide of AI-enabled attacks

Connect With Us

See for yourself how policy-driven IT Automation saves time and eliminates risk.

Welcome to February's Patch Tuesday. This month, attackers are playing the distraction game: one vulnerability crashes your VPN infrastructure while another slips malware past Windows security prompts.

The two vulnerabilities highlighted this month share a common thread: they enable or amplify attacks that start with social engineering. And social engineering is getting easier. Both are already being exploited in the wild, and both rely on the same entry point: your users clicking something they shouldn't.

Here's what you need to know, and what to patch first. For the full breakdown, check out the Patch [FIX] Tuesday podcast.

CVE-2026-21525 [Moderate]

Windows Remote Access Connection Manager vulnerability

CVE-2026-21525 (CVSS 6.2/10) targets the Windows Remote Access Connection Manager (RASMAN), the service responsible for maintaining VPN connections to corporate networks.

This vulnerability is currently being exploited in the wild.

An attacker with a foothold as a standard, non-admin user can run a small script that crashes the RAS manager service. The attack requires no elevated privileges and can be triggered after initial access through phishing or a malicious browser extension.

CVE-2026-21525 doesn't directly lead to data theft or code execution, but its potential for disruption is significant.

Organizations relying on always-on VPN connections face a particular risk: if the VPN service crashes, endpoints configured with "fail close" policies lose network access entirely. IT teams can't reach those machines to patch them or run automation. In larger environments, this creates cascading failures that can take hours to resolve.

How attackers may exploit this vulnerability

  • Gain initial access through phishing or a malicious browser extension, then trigger the crash as part of a multi-stage attack

  • Use the disruption as a distraction while executing a separate attack against servers or exfiltrating data

  • Target VPN infrastructure to create a "blackout" of remote users, overwhelming help desk resources

  • Chain with other vulnerabilities to maximize blast radius during the confusion

What to look out for

  • Unexpected restarts of the Remote Access Connection Manager service

  • Sudden, widespread VPN disconnections across remote users

  • Help desk ticket spikes related to connectivity issues

Mitigation guidance

  • Apply the patch immediately. Microsoft has confirmed there are no workarounds for this vulnerability.

  • Prioritize patching for remote users and VPN-dependent endpoints first

  • Monitor the RASMAN service for unexpected restarts or crashes

  • If you run servers with RRAS (Routing and Remote Access Service), include them in your priority patching list to protect automations and infrastructure

– Ryan Braunstein, Security Manager, Automox

CVE-2026-21510 [Important]

Windows Shell SmartScreen bypass vulnerability

CVE-2026-21510 (CVSS 8.8/10) allows attackers to bypass Windows SmartScreen, the security feature that warns you when opening files downloaded from the internet. A related vulnerability, CVE-2026-21514, affects Microsoft Word with a similar bypass mechanism.

Attackers are actively exploiting both in the wild.

SmartScreen serves as a critical checkpoint: when you download an executable or document, it prompts you to confirm whether you trust the source. This bypass removes that checkpoint entirely. Files from the internet execute without triggering the usual warning dialog, giving attackers a clean path to run malicious code once a user clicks a phishing link.

The attack still requires user interaction, but with one less security prompt in the way, the barrier to successful exploitation drops considerably.

How attackers may exploit this vulnerability

  • Deliver malicious files through phishing emails that execute without SmartScreen warnings

  • Gain initial access for malware installation or persistence

  • Chain with social engineering to convince users to open seemingly legitimate documents

  • Target Microsoft Word users with malicious documents that bypass security prompts

What to look out for

  • Unusual cmd.exe or PowerShell activity following file downloads

  • Processes spawning from files in Downloads or temp directories without corresponding SmartScreen events in your logs

Mitigation guidance

  • Apply patches for both CVE-2026-21510 and CVE-2026-21514 as soon as possible

  • Monitor for process creation events where the parent process is a browser or Outlook and the child lacks a corresponding SmartScreen event

  • Apply endpoint hardening measures such as Attack Surface Reduction rules

– Seth Hoyt, Senior Security Engineer, Automox

The bigger picture: AI lowers the barrier

AI has lowered the barrier to entry for attackers. Crafting a convincing phishing email used to require skill. Now, an attacker can generate polished, grammatically correct messages that mimic internal communications or trusted brands in seconds.

Security researchers are also watching the emergence of agentic attacks (scenarios where a single attacker deploys AI agents to automate reconnaissance, craft targeted messages, and probe for vulnerabilities simultaneously). The tools exist. Whether attackers are using them at scale remains to be seen, but the threat model is shifting.

For IT teams, this reinforces why the fundamentals matter. Patching remains your first line of defense. Security awareness training should address AI-generated phishing specifically. And detection strategies should assume that attack volume and quality can scale faster than they used to.

Patch regularly, patch often

February's vulnerabilities are a reminder that disruption and deception remain core tactics in the attacker's playbook.

A denial of service attack that blacks out your remote workforce creates confusion. A SmartScreen bypass removes a safety net your users rely on. Both work better for attackers when patches sit unapplied.

Stay current with your patches, keep your detection capabilities sharp, and make sure your teams know that phishing emails aren't as easy to spot as they used to be.

Dive deeper into this topic