Microsoft Office Zero-Day (CVE-2026-21509) - Emergency Patch Issued for Active Exploitation <https://thehackernews.com/2026/01/microsoft-issues-emergency-patch-for.html>
Microsoft on Monday issued out-of-band security patches for a
high-severity Microsoft Office zero-day vulnerability exploited in attacks.
The vulnerability, tracked as CVE-2026-21509, carries a CVSS score of 7.8 out of 10.0. It has been described as a security feature bypass in
Microsoft Office.
"Reliance on untrusted inputs in a security decision in Microsoft Office allows an unauthorized attacker to bypass a security feature locally,"
the tech giant said in an advisory.
"This update addresses a vulnerability that bypasses OLE mitigations in Microsoft 365 and Microsoft Office, which protect users from vulnerable COM/OLE controls."
Successful exploitation of the flaw relies on an attacker sending a specially crafted Office file and convincing recipients to open it. It
also noted that the Preview Pane is not an attack vector.
Mr. Man-wai Chang wrote on 1/27/2026 10:51 PM:
Microsoft Office Zero-Day (CVE-2026-21509) - Emergency Patch Issued for
Active Exploitation
<https://thehackernews.com/2026/01/microsoft-issues-emergency-patch-for.html>
Microsoft on Monday issued out-of-band security patches for a
high-severity Microsoft Office zero-day vulnerability exploited in attacks.
The vulnerability, tracked as CVE-2026-21509, carries a CVSS score of 7.8 >> out of 10.0. It has been described as a security feature bypass in
Microsoft Office.
"Reliance on untrusted inputs in a security decision in Microsoft Office
allows an unauthorized attacker to bypass a security feature locally,"
the tech giant said in an advisory.
"This update addresses a vulnerability that bypasses OLE mitigations in
Microsoft 365 and Microsoft Office, which protect users from vulnerable
COM/OLE controls."
Would that file be .docx (or whatever)?
Successful exploitation of the flaw relies on an attacker sending a
specially crafted Office file and convincing recipients to open it. It
also noted that the Preview Pane is not an attack vector.
On 2026/1/28 6:42:31, ...w¤?ñ?¤ wrote:
Mr. Man-wai Chang wrote on 1/27/2026 10:51 PM:
Microsoft Office Zero-Day (CVE-2026-21509) - Emergency Patch Issued for
Active Exploitation
<https://thehackernews.com/2026/01/microsoft-issues-emergency-patch-for.html>
Microsoft on Monday issued out-of-band security patches for a
high-severity Microsoft Office zero-day vulnerability exploited in attacks.
Do we have a KB number (or isn't that a valid question these days)?
The vulnerability, tracked as CVE-2026-21509, carries a CVSS score of 7.8 >>> out of 10.0. It has been described as a security feature bypass in
Microsoft Office.
"Reliance on untrusted inputs in a security decision in Microsoft Office >>> allows an unauthorized attacker to bypass a security feature locally,"
the tech giant said in an advisory.
"This update addresses a vulnerability that bypasses OLE mitigations in
Microsoft 365 and Microsoft Office, which protect users from vulnerable
COM/OLE controls."
Are earlier versions (e. g. 2003, 2007) vulnerable?
Would that file be .docx (or whatever)?
Successful exploitation of the flaw relies on an attacker sending a
specially crafted Office file and convincing recipients to open it. It
also noted that the Preview Pane is not an attack vector.
[]
- Versions supported are update-able and fixable, as in the past earlier non-supported versions are not. Likewise, MSFT does not report
vulnerability to versions older than indicated in the CVE.
- applies to any malicious Office file => 'whatever' in your terminology
i.e. if using 2003 or 2007 or 2010 or 2013 you are SOL.
J. P. Gilliver wrote:
winston wrote:
Mr. Man-wai Chang wrote:
Microsoft Office Zero-Day (CVE-2026-21509) - Emergency Patch Issued for >>>> Active Exploitation
<https://thehackernews.com/2026/01/microsoft-issues-emergency-patch-for.html>
Microsoft on Monday issued out-of-band security patches for a
high-severity Microsoft Office zero-day vulnerability exploited in attacks.
Do we have a KB number (or isn't that a valid question these days)?
The vulnerability, tracked as CVE-2026-21509, carries a CVSS score of 7.8 >>>> out of 10.0. It has been described as a security feature bypass in
Microsoft Office.
"Reliance on untrusted inputs in a security decision in Microsoft Office >>>> allows an unauthorized attacker to bypass a security feature locally," >>>> the tech giant said in an advisory.
"This update addresses a vulnerability that bypasses OLE mitigations in >>>> Microsoft 365 and Microsoft Office, which protect users from vulnerable >>>> COM/OLE controls."
Are earlier versions (e. g. 2003, 2007) vulnerable?
Successful exploitation of the flaw relies on an attacker sending a
specially crafted Office file and convincing recipients to open it. It >>>> also noted that the Preview Pane is not an attack vector.
Would that file be .docx (or whatever)?
You replied to my post, but snipped it's complete content.
Using the link in my post, can provide the information and answers to
what you asked.
- the KB # for 2016, CTR document for 2019 and later
- Versions supported are update-able and fixable, as in the past earlier non-supported versions are not. Likewise, MSFT does not report
vulnerability to versions older than indicated in the CVE.
- applies to any malicious Office file => 'whatever' in your terminology
i.e. if using 2003 or 2007 or 2010 or 2013 you are SOL.
On 2026/1/28 16:6:23, ...w¤?ñ?¤ wrote:It would be wise to assume the opposite => vulnerable
[]
- Versions supported are update-able and fixable, as in the past earlier
non-supported versions are not. Likewise, MSFT does not report
vulnerability to versions older than indicated in the CVE.
So earlier versions are not fixable (by this patch, anyway), but may not
be vulnerable in the first place.
All those file types can include links or phishing content - not sure- applies to any malicious Office file => 'whatever' in your terminology
When I said does it have to be .docx or whatever, I meant does it have
to be (for example) .docx, .xlsx, or whatever, as opposed to .doc, .xls,
and so on - i. e. the "new" formats.
$hi+ Outta Luck
i.e. if using 2003 or 2007 or 2010 or 2013 you are SOL.
I don't know SOL :-) - OOL I would guess at!
You replied to my post, but snipped it's complete content.
Using the link in my post, can provide the information and answers to
what you asked.
- the KB # for 2016, CTR document for 2019 and later
- Versions supported are update-able and fixable, as in the past earlier
non-supported versions are not. Likewise, MSFT does not report
vulnerability to versions older than indicated in the CVE.
- applies to any malicious Office file => 'whatever' in your terminology
i.e. if using 2003 or 2007 or 2010 or 2013 you are SOL.
Not clear if updating Office 2021, what I have, got the necessary fixes,
or if users are still expected to do the registry edits. After
updating, my Office 2021 reports it is at 2601 (build 19628.20150 Click-to-Run). It was at 2512 released on Jan 13 which is before the
Jan 26 date cited for the CVE-2026-21509 patch. Now I'm at 2601, but
haven't found anything in that build description about CVE-2026-21509.
J. P. Gilliver wrote on 1/28/2026 2:11 PM:
On 2026/1/28 16:6:23, ...w¤?ñ?¤ wrote:It would be wise to assume the opposite => vulnerable
[]
- Versions supported are update-able and fixable, as in the past earlier >>> non-supported versions are not. Likewise, MSFT does not report
vulnerability to versions older than indicated in the CVE.
So earlier versions are not fixable (by this patch, anyway), but may not
be vulnerable in the first place.
All those file types can include links or phishing content - not sure
- applies to any malicious Office file => 'whatever' in your terminology
When I said does it have to be .docx or whatever, I meant does it have
to be (for example) .docx, .xlsx, or whatever, as opposed to .doc, .xls,
and so on - i. e. the "new" formats.
why you wouldn't know that.
$hi+ Outta Luck
i.e. if using 2003 or 2007 or 2010 or 2013 you are SOL.
I don't know SOL :-) - OOL I would guess at!
On 2026/1/28 22:43:36, ...w¤?ñ?¤ wrote:
J. P. Gilliver wrote on 1/28/2026 2:11 PM:
On 2026/1/28 16:6:23, ...w¤?ñ?¤ wrote:It would be wise to assume the opposite => vulnerable
[]
- Versions supported are update-able and fixable, as in the past earlier >>>> non-supported versions are not. Likewise, MSFT does not report
vulnerability to versions older than indicated in the CVE.
So earlier versions are not fixable (by this patch, anyway), but may not >>> be vulnerable in the first place.
All those file types can include links or phishing content - not sure
- applies to any malicious Office file => 'whatever' in your terminology >>>When I said does it have to be .docx or whatever, I meant does it have
to be (for example) .docx, .xlsx, or whatever, as opposed to .doc, .xls, >>> and so on - i. e. the "new" formats.
why you wouldn't know that.
This thread started about a _specific_ exploit, that MS had released a
patch to protect against.
On 1/28/2026 5:45 PM, J. P. Gilliver wrote:
On 2026/1/28 22:43:36, ...w¤?ñ?¤ wrote:
J. P. Gilliver wrote on 1/28/2026 2:11 PM:
On 2026/1/28 16:6:23, ...w¤?ñ?¤ wrote:It would be wise to assume the opposite => vulnerable
[]
- Versions supported are update-able and fixable, as in the past
earlier non-supported versions are not. Likewise, MSFT does not
report vulnerability to versions older than indicated in the CVE.
So earlier versions are not fixable (by this patch, anyway), but may
not be vulnerable in the first place.
All those file types can include links or phishing content - not
- applies to any malicious Office file => 'whatever' in your
terminology
When I said does it have to be .docx or whatever, I meant does it
have to be (for example) .docx, .xlsx, or whatever, as opposed to
.doc, .xls, and so on - i. e. the "new" formats.
sure
why you wouldn't know that.
This thread started about a _specific_ exploit, that MS had released a
patch to protect against.
The link provided to the CVE specified the exploit parameter as:
"An attacker must send a user a malicious Office file and convince them
to open it."
should be interpreted as any possible 'Office' file, i.e. nodelineation for prior version file extensions.
=?UTF-8?B?Li4ud8Khw7HCp8KxwqTDsQ==?= <winstonmvp@gmail.com> wrote in news:10lefpf$vf8m$1@dont-email.me:
On 1/28/2026 5:45 PM, J. P. Gilliver wrote:
On 2026/1/28 22:43:36, ...w¤?ñ?¤ wrote:
J. P. Gilliver wrote on 1/28/2026 2:11 PM:
On 2026/1/28 16:6:23, ...w¤?ñ?¤ wrote:It would be wise to assume the opposite => vulnerable
[]
- Versions supported are update-able and fixable, as in the past
earlier non-supported versions are not. Likewise, MSFT does not
report vulnerability to versions older than indicated in the CVE.
So earlier versions are not fixable (by this patch, anyway), but may >>>>> not be vulnerable in the first place.
All those file types can include links or phishing content - not
- applies to any malicious Office file => 'whatever' in your
terminology
When I said does it have to be .docx or whatever, I meant does it
have to be (for example) .docx, .xlsx, or whatever, as opposed to
.doc, .xls, and so on - i. e. the "new" formats.
sure
why you wouldn't know that.
This thread started about a _specific_ exploit, that MS had released a
patch to protect against.
The link provided to the CVE specified the exploit parameter as:
"An attacker must send a user a malicious Office file and convince them
to open it."
=> should be interpreted as any possible 'Office' file, i.e. no
delineation for prior version file extensions.
I read the article:
<https://thehackernews.com/2026/01/microsoft-issues-emergency-patch-for.htm
I have some questions.
My understanding is that any of the Office programs in versions 2021 and later, will be protected with a 'service-side change'. What is a service-side change?
My understanding is also that if one doesn't open (preview is ok, but why would one bother?) the attached Office document, in any version, there'sThat is the current understanding. The malicious Office file would
no harm.
Additionally, the article gives the updates that should be applied to
Office versions 2016 and 2019. Then, the article gives a registry edit to 'mitigate' the issue, I assume for the same Office versions, 2016 and
2019. Why the registry edit if the updates are applied?
| Sysop: | Jacob Catayoc |
|---|---|
| Location: | Pasay City, Metro Manila, Philippines |
| Users: | 5 |
| Nodes: | 4 (0 / 4) |
| Uptime: | 22:29:24 |
| Calls: | 117 |
| Calls today: | 117 |
| Files: | 367 |
| D/L today: |
560 files (257M bytes) |
| Messages: | 70,898 |
| Posted today: | 26 |