Cyber Posture

CVE-2026-21256

HighRCE

Published: 10 February 2026

Published
10 February 2026
Modified
11 February 2026
KEV Added
Patch
CVSS Score 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
EPSS Score 0.0005 14.1th percentile
Risk Priority 18 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-21256 is a high-severity Command Injection (CWE-77) vulnerability in Microsoft Visual Studio 2022. Its CVSS base score is 8.8 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Command and Scripting Interpreter (T1059); ranked at the 14.1th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

This vulnerability is AI-related — categorised as Enterprise AI Assistants.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Command and Scripting Interpreter (T1059) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly remediates the command injection vulnerability by requiring timely identification, testing, and application of patches for GitHub Copilot and Visual Studio as provided by MSRC.

prevent

Prevents command injection by implementing input validation mechanisms to neutralize special elements before use in commands within the affected applications.

prevent

Mitigates the impact of successful command injection leading to arbitrary code execution through memory protection safeguards like DEP and ASLR.

MITRE ATT&CK Enterprise TechniquesAI

T1059 Command and Scripting Interpreter Execution
Adversaries may abuse command and script interpreters to execute commands, scripts, or binaries.
T1203 Exploitation for Client Execution Execution
Adversaries may exploit software vulnerabilities in client applications to execute code.
Why these techniques?

Command injection (CWE-77/94) directly enables arbitrary command execution via T1059; network delivery with UI trigger maps to client-side exploitation T1203.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

Improper neutralization of special elements used in a command ('command injection') in GitHub Copilot and Visual Studio allows an unauthorized attacker to execute code over a network.

Deeper analysisAI

CVE-2026-21256, published on 2026-02-10, is an improper neutralization of special elements used in a command, resulting in command injection (CWE-77, CWE-94). This vulnerability affects GitHub Copilot and Visual Studio, enabling an unauthorized attacker to execute code over a network. It carries a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H), indicating high severity due to network accessibility, low attack complexity, and significant impacts.

An unauthorized attacker with no required privileges can exploit the vulnerability remotely over the network, though it requires user interaction to trigger. Successful exploitation allows arbitrary code execution on the affected system, compromising confidentiality, integrity, and availability to a high degree.

The Microsoft Security Response Center (MSRC) provides an update guide for CVE-2026-21256 at https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21256, which details mitigation strategies and available patches.

Details

CWE(s)

Affected Products

microsoft
visual studio 2022
17.14.0 — 17.14.26

AI Security AnalysisAI

AI Category
Enterprise AI Assistants
Risk Domain
N/A
OWASP Top 10 for LLMs 2025
None mapped
Classification Reason
Matched keywords: copilot

CVEs Like This One

CVE-2026-21257Same product: Microsoft Visual Studio 2022
CVE-2025-21405Same product: Microsoft Visual Studio 2022
CVE-2026-21518Same vendor: Microsoft
CVE-2026-21516Same vendor: Microsoft
CVE-2026-21520Same vendor: Microsoft
CVE-2025-62222Same vendor: Microsoft
CVE-2026-26136Same vendor: Microsoft
CVE-2025-25003Same product: Microsoft Visual Studio 2022
CVE-2025-55315Same product: Microsoft Visual Studio 2022
CVE-2025-53787Same vendor: Microsoft

References