PT-2026-4775 · Microsoft · Office
Oruga00
+1
·
Published
2026-01-26
·
Updated
2026-03-13
·
CVE-2026-21509
CVSS v3.1
7.8
7.8
High
| Base vector | Vector | AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
Name of the Vulnerable Software and Affected Versions
Microsoft Office versions 2016, 2019, Office LTSC 2021, Office LTSC 2024, and Microsoft 365 Apps for Enterprise.
Description
This is a security feature bypass vulnerability (CVE-2026-21509) in Microsoft Office that allows an unauthorized attacker to bypass security features locally by exploiting Object Linking and Embedding (OLE). The vulnerability is actively exploited by the Russia-linked APT28 (Fancy Bear/UAC-0001) group, who began weaponizing it within days of the patch release. Attackers are using specially crafted documents, including RTF files, to deliver malware such as MiniDoor, PixyNetLoader, and Covenant. The attacks target organizations in Ukraine, Slovakia, Romania, and other European countries. The exploitation involves bypassing OLE mitigations, potentially leading to arbitrary code execution. The vulnerability affects all modern versions of Microsoft Office. The attackers are using techniques like geo-fencing and cloud storage for command and control. The exploitation chain often involves COM hijacking and scheduled tasks.
Recommendations
Apply the latest security updates released by Microsoft for all affected versions of Microsoft Office. For Office 2016 and 2019, apply the available patches or implement the recommended registry-based mitigation if patching is not immediately possible. Restart Office applications after applying updates. Enable Protected View for all documents. Implement zero-trust email filtering. Monitor systems for suspicious activity related to the identified indicators of compromise (IOCs).
Fix
RCE
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
BDU:2026-00828
CVE-2026-21509
Affected Products
Office
References · 514
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21509 · Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2026-21509 · Security Note
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21509 · Security Note
- https://bdu.fstec.ru/vul/2026-00828 · Security Note
- https://github.com/cobbr/Covenant⭐ 4638 🔗 825 · Note
- https://twitter.com/0xT3chn0m4nc3r/status/2018429318636986483 · Twitter Post
- https://twitter.com/wvipersg/status/2016068424766501102 · Twitter Post
- https://twitter.com/RootMonsteR/status/2015930101850952040 · Twitter Post
- https://twitter.com/securityRSS/status/2016081959680696514 · Twitter Post
- https://twitter.com/ThreatSynop/status/2018718827001868758 · Twitter Post
- https://twitter.com/ox0ffff/status/2018474706358120751 · Twitter Post
- https://twitter.com/TweetThreatNews/status/2018459484176155052 · Twitter Post
- https://twitter.com/AdliceSoftware/status/2018723670017851836 · Twitter Post
- https://twitter.com/sovereignexec/status/2019410792769003622 · Twitter Post
- https://twitter.com/ClearPhish/status/2016043894467920125 · Twitter Post