安全研究

安全漏洞
Microsoft Windows MSHTML Framework安全功能绕过漏洞(CVE-2026-21513)

发布日期:2026-02-10
更新日期:2026-02-11

受影响系统:
Microsoft Windows Server 2025 (Server Core installation
Microsoft Windows Server 2025
Microsoft Windows Server 2022, 23H2 Edition (Server Cor
Microsoft Windows Server 2022 (Server Core installation
Microsoft Windows Server 2022
Microsoft Windows Server 2019 (Server Core Installation
Microsoft Windows Server 2019
Microsoft Windows Server 2016 (Server Core Installation
Microsoft Windows Server 2016
Microsoft Windows Server 2012 R2 (Server Core installat
Microsoft Windows Server 2012 R2
Microsoft Windows Server 2012 (Server Core installation
Microsoft Windows Server 2012
Microsoft Windows 10 22H2 for x64-based Systems
Microsoft Windows 10 22H2 for ARM64-based Systems
Microsoft Windows 10 22H2 for 32-bit Systems
Microsoft Windows 10 21H2 for x64-based Systems
Microsoft Windows 10 21H2 for ARM64-based Systems
Microsoft Windows 10 21H2 for 32-bit Systems
Microsoft Windows 10 1809 for x64-based Systems
Microsoft Windows 10 1809 for 32-bit Systems
Microsoft Windows 10 1607 for x64-based Systems
Microsoft Windows 10 1607 for 32-bit Systems
Microsoft Windows 11 26H1 for x64-based Systems
Microsoft Windows 11 26H1 for ARM64-based Systems
Microsoft Windows 11 25H2 for x64-based Systems
Microsoft Windows 11 25H2 for ARM64-based Systems
Microsoft Windows 11 24H2 for x64-based Systems
Microsoft Windows 11 24H2 for ARM64-based Systems
Microsoft Windows 11 23H2 for x64-based Systems
Microsoft Windows 11 23H2 for ARM64-based Systems
描述:
CVE(CAN) ID: CVE-2026-21513

Microsoft Windows MSHTML Framework是微软开发的核心组件,用于解析和渲染HTML网页内容,最初作为Internet Explorer浏览器的排版引擎引入,被广泛用于Windows操作系统中的多种应用程序,实现网页内容的显示和交互功能。
Microsoft Windows MSHTML Framework存在安全功能绕过漏洞,攻击者可利用该漏洞执行某些非法操作。

<**>

建议:
厂商补丁:

Microsoft
---------
目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载:
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2026-21513

浏览次数:71
严重程度:0(网友投票)
本安全漏洞由绿盟科技翻译整理,版权所有,未经许可,不得转载
绿盟科技给您安全的保障