PT-2026-4775 · Microsoft · Office
Published
2026-01-26
·
Updated
2026-01-30
·
CVE-2026-21509
CVSS v3.1
7.8
7.8
High
| Base vector | Vector | AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
Name of the Vulnerable Software and Affected Versions
Microsoft Office versions 2016 through 2024 and Microsoft 365 Apps for Enterprise
Description
This is a security feature bypass vulnerability in Microsoft Office, actively exploited in attacks. The vulnerability allows attackers to bypass Object Linking and Embedding (OLE) mitigations by using specially crafted Office documents. Exploitation requires a user to open a malicious document, and the Preview Pane is not an attack vector. The vulnerability allows an unauthorized attacker to bypass a security feature locally. This flaw has been observed in real-world attacks and is being actively exploited. The vulnerability is tracked as CVE-2026-21509 and has a CVSS score of 7.8. Attackers can leverage this flaw to execute code on compromised systems. The vulnerability affects multiple versions of Microsoft Office, including Office 2016, 2019, LTSC 2021, LTSC 2024, and Microsoft 365 Apps.
Recommendations
Apply the latest Microsoft Office security updates from the January 2026 Patch Tuesday release.
For Office 2016 and 2019, install the available updates or apply the registry-based mitigation.
Restart Office applications to ensure the service-side fix is applied for Microsoft 365 Apps and Office 2021 and later versions.
Fix
RCE
Found an issue in the description? Have something to add? Feel free to write us 👾
dbugs@ptsecurity.com
Weakness Enumeration
Related Identifiers
BDU:2026-00828
CVE-2026-21509
Affected Products
Office
References · 212
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21509 · Security Note
- https://bdu.fstec.ru/vul/2026-00828 · Security Note
- https://nvd.nist.gov/vuln/detail/CVE-2026-21509 · Security Note
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21509 · Vendor Advisory
- https://twitter.com/catnap707/status/2016075250174460414 · Twitter Post
- https://twitter.com/VTBCasts/status/2016079795331989620 · Twitter Post
- https://twitter.com/ThreatSynop/status/2016173525770420688 · Twitter Post
- https://twitter.com/0patch/status/2016514232775213506 · Twitter Post
- https://twitter.com/StrongKeepCyber/status/2016723127959449908 · Twitter Post
- https://reddit.com/r/u_all-in-one-wisper/comments/1qpc3sa/daily_wisper_report_microsoft_office_patch_alert · Reddit Post
- https://twitter.com/TweetThreatNews/status/2016783435495276729 · Twitter Post
- https://twitter.com/StellarQuestUS1/status/2016175830452297972 · Twitter Post
- https://twitter.com/RedLegg/status/2016190132605301122 · Twitter Post
- https://twitter.com/DemolisherDigi/status/2016068474112561662 · Twitter Post
- https://twitter.com/CO_Mekatech/status/2016099421042156017 · Twitter Post