PT-2026-4775 · Microsoft · Office
Published
2026-01-26
·
Updated
2026-01-27
·
CVE-2026-21509
CVSS v3.1
7.8
7.8
High
| Base vector | Vector | AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
Name of the Vulnerable Software and Affected Versions
Microsoft Office versions 2016 through 2024
Microsoft 365 Apps
Microsoft Office LTSC 2021
Microsoft Office LTSC 2024
Description
A security issue exists in Microsoft Office where reliance on untrusted inputs in a security decision allows an unauthorized attacker to bypass a security feature locally. This issue is actively exploited in attacks. The vulnerability allows attackers to bypass Object Linking and Embedding (OLE) protections by tricking users into opening malicious Office files. The preview pane is not an attack vector. Approximately, a large number of Microsoft Office users globally are potentially affected. Attackers can leverage this issue to gain unauthorized access to sensitive information or disrupt workflows. The exploitation requires user interaction, specifically opening a malicious file. The vulnerability bypasses security features by exploiting untrusted inputs.
Recommendations
For Microsoft Office 2016 and 2019, apply the upcoming patch or implement the registry mitigation by adding a COM key with Compatibility Flags=400.
For Microsoft Office 2021 and later, restart the application to enable automatic security protections.
For Microsoft Office LTSC 2021 and LTSC 2024, restart the application to enable automatic security protections.
For Microsoft 365 Apps, restart the application to enable automatic security protections.
Fix
RCE
Found an issue in the description? Have something to add? Feel free to write us 👾
dbugs@ptsecurity.com
Weakness Enumeration
Related Identifiers
CVE-2026-21509
Affected Products
Office
References · 38
- https://nvd.nist.gov/vuln/detail/CVE-2026-21509 · Security Note
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21509 · Vendor Advisory
- https://twitter.com/HaifeiLi/status/2015880300635844864 · Twitter Post
- https://twitter.com/CVEnew/status/2015847110005162139 · Twitter Post
- https://t.me/defcon_news/133706 · Telegram Post
- https://twitter.com/bcs_erictaylor/status/2015879736707449303 · Twitter Post
- https://t.me/thehackernews/8286 · Telegram Post
- https://twitter.com/0dayPublishing/status/2015895378852253965 · Twitter Post
- https://twitter.com/dustin_childs/status/2015842319312789775 · Twitter Post
- https://t.me/pentestingnews/72637 · Telegram Post
- https://twitter.com/zerodaywire/status/2015885764265918913 · Twitter Post
- https://twitter.com/grok/status/2015914709346558439 · Twitter Post
- https://twitter.com/ox0ffff/status/2015979441227227421 · Twitter Post
- https://twitter.com/Hacker_Manifest/status/2015925143256891526 · Twitter Post
- https://twitter.com/DecipherSec/status/2015864779437486521 · Twitter Post