{"id":4983,"date":"2026-02-11T11:47:05","date_gmt":"2026-02-11T16:47:05","guid":{"rendered":"https:\/\/cert.pa\/?p=4983"},"modified":"2026-02-11T11:47:07","modified_gmt":"2026-02-11T16:47:07","slug":"csirt-panama-aviso-2026-feb-11-actualizaciones-de-seguridad-de-microsoft-para-febrero-2026","status":"publish","type":"post","link":"https:\/\/cert.pa\/?p=4983","title":{"rendered":"CSIRT Panam\u00e1 Aviso 2026-Feb-11 Actualizaciones de seguridad de Microsoft para Febrero 2026."},"content":{"rendered":"\n<p>CSIRT Panam\u00e1 Aviso 2026-Feb-11 Actualizaciones de seguridad de Microsoft para Febrero 2026.<br>Gravedad: Alta<br>Fecha de publicaci\u00f3n: febrero 11, 2026<br>\u00daltima revisi\u00f3n: febrero 11, 2026<br>https:\/\/msrc.microsoft.com\/update-guide\/releaseNote\/2026-Feb<\/p>\n\n\n\n<p>Sistemas Afectados:<br>Windows Win32K &#8211; GRFX<br>Microsoft Edge for Android<br>Windows Notepad App<br>Windows GDI+<br>.NET and Visual Studio<br>Windows Kernel<br>Azure Local<br>Power BI<br>Windows HTTP.sys<br>Windows Connected Devices Platform Service<br>Microsoft Graphics Component<br>Windows Ancillary Function Driver for WinSock<br>Windows Subsystem for Linux<br>Windows LDAP &#8211; Lightweight Directory Access Protocol<br>Role: Windows Hyper-V<br>Windows NTLM<br>Windows Cluster Client Failover<br>Mailslot File System<br>GitHub Copilot and Visual Studio<br>Microsoft Office Excel<br>Microsoft Office Word<br>Windows Storage<br>Windows Shell<br>Microsoft Office Outlook<br>Azure DevOps Server<br>Internet Explorer<br>Github Copilot<br>Windows App for Mac<br>.NET<br>Desktop Window Manager<br>Azure Compute Gallery<br>Windows Remote Access Connection Manager<br>Microsoft Exchange Server<br>Azure IoT SDK<br>Azure HDInsights<br>Azure SDK<br>Azure Function<br>Windows Remote Desktop<br>Microsoft Defender for Linux<br>Azure Front Door (AFD)<br>Azure Arc<\/p>\n\n\n\n<p>I. Descripci\u00f3n<br>Microsoft ha liberado sus actualizaciones de seguridad correspondientes al mes de febrero de 2026.<br>Este conjunto de actualizaciones remedia 58 fallas y 6 d\u00eda cero.<\/p>\n\n\n\n<p>II. Detalle<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><tbody><tr><th>Tag<\/th><th>CVE ID<\/th><th>CVE Title<\/th><th>Severity<\/th><\/tr><tr><td>.NET<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-21218\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-21218<\/a><\/td><td>.NET Spoofing Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Azure Arc<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-24302\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-24302<\/a><\/td><td>Azure Arc Elevation of Privilege Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Azure Compute Gallery<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-23655\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-23655<\/a><\/td><td>Microsoft ACI Confidential Containers Information Disclosure Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Azure Compute Gallery<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-21522\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-21522<\/a><\/td><td>Microsoft ACI Confidential Containers Elevation of Privilege Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Azure DevOps Server<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-21512\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-21512<\/a><\/td><td>Azure DevOps Server Cross-Site Scripting Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Azure Front Door (AFD)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-24300\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-24300<\/a><\/td><td>Azure Front Door Elevation of Privilege Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Azure Function<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-21532\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-21532<\/a><\/td><td>Azure Function Information Disclosure Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Azure HDInsights<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-21529\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-21529<\/a><\/td><td>Azure HDInsight Spoofing Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Azure IoT SDK<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-21528\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-21528<\/a><\/td><td>Azure IoT Explorer Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Azure Local<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-21228\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-21228<\/a><\/td><td>Azure Local Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Azure SDK<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-21531\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-21531<\/a><\/td><td>Azure SDK for Python Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Desktop Window Manager<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-21519\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-21519<\/a><\/td><td>Desktop Window Manager Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Github Copilot<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-21516\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-21516<\/a><\/td><td>GitHub Copilot for Jetbrains Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>GitHub Copilot and Visual Studio<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-21523\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-21523<\/a><\/td><td>GitHub Copilot and Visual Studio Code Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>GitHub Copilot and Visual Studio<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-21256\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-21256<\/a><\/td><td>GitHub Copilot and Visual Studio Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>GitHub Copilot and Visual Studio<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-21257\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-21257<\/a><\/td><td>GitHub Copilot and Visual Studio Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>GitHub Copilot and Visual Studio Code<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-21518\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-21518<\/a><\/td><td>GitHub Copilot and Visual Studio Code Security Feature Bypass Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Mailslot File System<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-21253\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-21253<\/a><\/td><td>Mailslot File System Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Defender for Linux<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-21537\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-21537<\/a><\/td><td>Microsoft Defender for Endpoint Linux Extension Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Edge (Chromium-based)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-1861\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-1861<\/a><\/td><td>Chromium: CVE-2026-1861 Heap buffer overflow in libvpx<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Edge (Chromium-based)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-1862\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-1862<\/a><\/td><td>Chromium: CVE-2026-1862 Type Confusion in V8<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Edge for Android<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-0391\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-0391<\/a><\/td><td>Microsoft Edge (Chromium-based) for Android Spoofing Vulnerability<\/td><td>Moderate<\/td><\/tr><tr><td>Microsoft Exchange Server<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-21527\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-21527<\/a><\/td><td>Microsoft Exchange Server Spoofing Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Graphics Component<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-21246\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-21246<\/a><\/td><td>Windows Graphics Component Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Graphics Component<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-21235\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-21235<\/a><\/td><td>Windows Graphics Component Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office Excel<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-21261\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-21261<\/a><\/td><td>Microsoft Excel Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office Excel<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-21258\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-21258<\/a><\/td><td>Microsoft Excel Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office Excel<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-21259\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-21259<\/a><\/td><td>Microsoft Excel Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office Outlook<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-21260\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-21260<\/a><\/td><td>Microsoft Outlook Spoofing Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office Outlook<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-21511\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-21511<\/a><\/td><td>Microsoft Outlook Spoofing Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office Word<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-21514\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-21514<\/a><\/td><td>Microsoft Word Security Feature Bypass Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>MSHTML Framework<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-21513\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-21513<\/a><\/td><td>MSHTML Framework Security Feature Bypass Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Power BI<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-21229\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-21229<\/a><\/td><td>Power BI Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Role: Windows Hyper-V<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-21244\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-21244<\/a><\/td><td>Windows Hyper-V Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Role: Windows Hyper-V<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-21255\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-21255<\/a><\/td><td>Windows Hyper-V Security Feature Bypass Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Role: Windows Hyper-V<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-21248\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-21248<\/a><\/td><td>Windows Hyper-V Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Role: Windows Hyper-V<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-21247\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-21247<\/a><\/td><td>Windows Hyper-V Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Ancillary Function Driver for WinSock<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-21236\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-21236<\/a><\/td><td>Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Ancillary Function Driver for WinSock<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-21241\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-21241<\/a><\/td><td>Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Ancillary Function Driver for WinSock<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-21238\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-21238<\/a><\/td><td>Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows App for Mac<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-21517\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-21517<\/a><\/td><td>Windows App for Mac Installer Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Cluster Client Failover<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-21251\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-21251<\/a><\/td><td>Cluster Client Failover (CCF) Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Connected Devices Platform Service<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-21234\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-21234<\/a><\/td><td>Windows Connected Devices Platform Service Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows GDI+<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-20846\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-20846<\/a><\/td><td>GDI+ Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows HTTP.sys<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-21240\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-21240<\/a><\/td><td>Windows HTTP.sys Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows HTTP.sys<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-21250\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-21250<\/a><\/td><td>Windows HTTP.sys Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows HTTP.sys<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-21232\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-21232<\/a><\/td><td>Windows HTTP.sys Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Kernel<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-21231\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-21231<\/a><\/td><td>Windows Kernel Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Kernel<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-21222\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-21222<\/a><\/td><td>Windows Kernel Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Kernel<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-21239\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-21239<\/a><\/td><td>Windows Kernel Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Kernel<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-21245\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-21245<\/a><\/td><td>Windows Kernel Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows LDAP &#8211; Lightweight Directory Access Protocol<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-21243\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-21243<\/a><\/td><td>Windows Lightweight Directory Access Protocol (LDAP) Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Notepad App<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-20841\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-20841<\/a><\/td><td>Windows Notepad App Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows NTLM<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-21249\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-21249<\/a><\/td><td>Windows NTLM Spoofing Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Remote Access Connection Manager<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-21525\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-21525<\/a><\/td><td>Windows Remote Access Connection Manager Denial of Service Vulnerability<\/td><td>Moderate<\/td><\/tr><tr><td>Windows Remote Desktop<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-21533\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-21533<\/a><\/td><td>Windows Remote Desktop Services Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Shell<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-21510\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-21510<\/a><\/td><td>Windows Shell Security Feature Bypass Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Storage<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-21508\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-21508<\/a><\/td><td>Windows Storage Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Subsystem for Linux<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-21237\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-21237<\/a><\/td><td>Windows Subsystem for Linux Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Subsystem for Linux<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-21242\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-21242<\/a><\/td><td>Windows Subsystem for Linux Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Win32K &#8211; GRFX<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-2804\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-2804<\/a><\/td><td>Red Hat, Inc. CVE-2023-2804: Heap Based Overflow libjpeg-turbo<\/td><td>Important<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p>III. Referencia a soluciones, herramientas e informaci\u00f3n<br>Actualizar utilizando Microsoft Windows Update o herramientas de administraci\u00f3n de actualizaciones centralizadas.<\/p>\n\n\n\n<p>IV. Informaci\u00f3n de contacto<br>CSIRT PANAMA<br>Computer Security Incident Response Team Autoridad Nacional para la Innovacion Gubernamental<br>E-Mail: incidentes@cert.pa<br>E-Mail: info@cert.pa<br>Phone: +507 520-CERT (2378)<br>Web: https:\/\/cert.pa<br>Key ID: 16F2B124<\/p>\n","protected":false},"excerpt":{"rendered":"<p>CSIRT Panam\u00e1 Aviso 2026-Feb-11 Actualizaciones de seguridad de Microsoft para Febrero 2026.Gravedad: AltaFecha de publicaci\u00f3n: febrero 11, 2026\u00daltima revisi\u00f3n: febrero 11, 2026https:\/\/msrc.microsoft.com\/update-guide\/releaseNote\/2026-Feb Sistemas Afectados:Windows Win32K &#8211; GRFXMicrosoft Edge for AndroidWindows Notepad AppWindows GDI+.NET and Visual&#8230;<\/p>\n","protected":false},"author":5,"featured_media":1847,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[4],"tags":[76,8,72,9,80,45,94],"class_list":["post-4983","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-avisos-de-seguridad","tag-actualizaciones","tag-avisos","tag-avisos-de-seguridad","tag-microsoft","tag-vulnerabilidad","tag-windows","tag-windows-update"],"_links":{"self":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/4983","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=4983"}],"version-history":[{"count":1,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/4983\/revisions"}],"predecessor-version":[{"id":4984,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/4983\/revisions\/4984"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/media\/1847"}],"wp:attachment":[{"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=4983"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=4983"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=4983"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}