PT-2026-7400 · Microsoft · Office Word
Msrc
+1
·
Published
2026-02-10
·
Updated
2026-03-10
·
CVE-2026-21514
CVSS v3.1
7.8
7.8
High
| Base vector | Vector | AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
Name of the Vulnerable Software and Affected Versions
Microsoft Word versions prior to February 2026 Patch Tuesday
Description
A critical security flaw in Microsoft Word allows an attacker to bypass security features locally by exploiting reliance on untrusted inputs during security decisions. This issue, categorized as CWE-807, specifically bypasses Object Linking and Embedding (OLE) mitigations, potentially enabling malicious COM/OLE controls to execute. The vulnerability is actively exploited in the wild, and successful exploitation requires a victim to open a specially crafted document. The flaw impacts global and enterprise users of Microsoft Office. The vulnerability abuses trust decisions in OLE activation, potentially involving issues with how Word resolves embedded CLSIDs and validates OLE stream metadata within the Compound File Binary.
Recommendations
Apply the February 2026 Patch Tuesday updates to all affected systems.
Fix
RCE
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
BDU:2026-01699
CVE-2026-21514
Affected Products
Office Word
References · 34
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21514 · Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2026-21514 · Security Note
- https://bdu.fstec.ru/vul/2026-01699 · Security Note
- https://twitter.com/grok/status/2021423036188996056 · Twitter Post
- https://twitter.com/catnap707/status/2021418155692974089 · Twitter Post
- https://twitter.com/eSecurityPlanet/status/2021643235060297760 · Twitter Post
- https://reddit.com/r/cybersecurity/comments/1r3058m/ms_word_cve_2026 · Reddit Post
- https://twitter.com/TimWilsonAtDxc/status/2023884004957606261 · Twitter Post
- https://twitter.com/sooyoon_eth/status/2021774073894683014 · Twitter Post
- https://reddit.com/r/pdq/comments/1r1gniq/february_2026_patch_tuesday_recap · Reddit Post
- https://twitter.com/Avertium/status/2024910673877057853 · Twitter Post
- https://twitter.com/ThreatSynop/status/2021586189229109686 · Twitter Post
- https://twitter.com/grok/status/2021532073614360921 · Twitter Post
- https://twitter.com/Im_AjayPrakash/status/2021749652568281261 · Twitter Post
- https://t.me/avleonovcom/1631 · Telegram Post