Microsoft Issues Emergency Patch for Office Zero-Day Vulnerability CVE-2026-21509

Microsoft has released an urgent security update to address a critical zero-day vulnerability in Office, tracked as CVE-2026-21509, which is actively being exploited.

Microsoft Issues Emergency Patch for Office Zero-Day Vulnerability CVE-2026-21509
Andrew Wallace

Andrew Wallace

Professional Tech Editor

Focuses on professional-grade hardware, software, and enterprise solutions.

Microsoft has urgently addressed a critical zero-day vulnerability in its Office suite, identified as CVE-2026-21509, which is currently being actively exploited. This vulnerability, carrying a CVSS score of 7.8, allows attackers to bypass security features designed to protect against unsafe COM and OLE controls. (hipaajournal.com)

Technical Details

The flaw arises from Office's reliance on untrusted inputs during security decisions, enabling unauthorized attackers to circumvent security features locally. Exploitation requires user interaction; attackers must convince users to open malicious Office files, such as those received via phishing emails. (securityonline.info)

Affected Versions and Mitigation

The vulnerability impacts multiple Office versions, including Office 2016, 2019, 2021, and Microsoft 365 Apps for Enterprise. For Office 2021 and later, Microsoft has implemented server-side protections that activate upon restarting Office applications. Users of Office 2016 and 2019 are advised to manually install the latest security updates:

  • Office 2019 (32-bit and 64-bit): Build 16.0.10417.20095
  • Office 2016 (32-bit and 64-bit): Build 16.0.5539.1001

If immediate patching isn't feasible, Microsoft recommends applying a registry-based workaround to mitigate the risk. (hipaajournal.com)

Regulatory Response

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added CVE-2026-21509 to its Known Exploited Vulnerabilities (KEV) catalog, urging organizations to prioritize remediation. Federal agencies are required to apply the patch by February 16, 2026. (cybersecuritynews.com)

Recommendations

Users and organizations are strongly advised to update their Office applications promptly to safeguard against potential exploitation. Regularly applying security updates and exercising caution with unsolicited Office files can significantly reduce the risk of such vulnerabilities.

  • (securityonline.info)
  • (cybersecuritynews.com)

React to this story

Related Posts