Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Vulnerabilities

Microsoft Patches Office Zero-Day Likely Exploited in Targeted Attacks

The vulnerability is tracked as CVE-2026-21509 and it can be exploited to bypass security features. 

Office vulnerability exploited

Microsoft has released patches for CVE-2026-21509, a newly disclosed Office zero-day vulnerability that can be exploited to bypass security features.

The tech giant’s advisory for CVE-2026-21509 mentions that it’s aware of active exploitation. 

The vulnerability and the in-the-wild attacks were discovered by Microsoft’s own security researchers, but the company has yet to share any information on the malicious activity.

According to Microsoft’s description of the zero-day, “Reliance on untrusted inputs in a security decision in Microsoft Office allows an unauthorized attacker to bypass a security feature locally.”

The company also clarified that the vulnerability “bypasses OLE mitigations in Microsoft 365 and Microsoft Office which protect users from vulnerable COM/OLE controls”.

Exploitation requires the attacker to convince the targeted user to open a malicious Office file. 

Advertisement. Scroll to continue reading.

The requirement for social engineering, combined with the exploit’s complexity and the potential need for a multi-stage attack chain, indicates that this zero-day is being used for targeted espionage or other high-value operations rather than broad, opportunistic campaigns.

SecurityWeek has reached out to Microsoft for additional information and will update this article if the company responds.

Microsoft has released patches for all affected versions of Office, including 2016, 2019, LTSC 2024, LTSC 2021, and Microsoft 365 Apps for Enterprise.

Mitigations are also available for users who cannot immediately update their Office installations. 

The cybersecurity agency CISA has added CVE-2026-21509 to its Known Exploited Vulnerabilities (KEV) catalog, instructing government organizations to address it by February 16.

Microsoft’s January 2026 Patch Tuesday updates resolved more than 110 vulnerabilities, including a Windows zero-day whose exploitation was discovered by the vendor’s own researchers. No information has been shared on those attacks either. 

UPDATE: Microsoft has provided the following statement to SecurityWeek, but it did not share any information on the attacks:

We recommend impacted customers follow the guidance on our CVE page. Additionally, Microsoft Defender has detections in place to block exploitation, and our default Protected View setting provides an extra layer of protection by blocking malicious files from the Internet. As a security best practice, we encourage users to exercise caution when downloading and enabling editing on files from unknown sources as indicated in security warnings.

Related: Microsoft Patches 57 Vulnerabilities, Three Zero-Days

Related: RedVDS Cybercrime Service Disrupted by Microsoft and Law Enforcement

Related: New ‘Reprompt’ Attack Silently Siphons Microsoft Copilot Data

Written By

Eduard Kovacs (@EduardKovacs) is senior managing editor at SecurityWeek. He worked as a high school IT teacher before starting a career in journalism in 2011. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

With "Shadow AI" usage becoming prevalent in organizations, learn how to balance the need for rapid experimentation with the rigorous controls required for enterprise-grade deployment.

Register

Delve into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization.

Register

People on the Move

Neill Feather has been named Chief Executive Officer at Point Wild.

Oasis Security has appointed Michael DeCesare as President.

Sterling Wilson has joined IGEL as Global Field CTO, Business Continuity and Disaster Recovery.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.