{"id":305808,"date":"2026-01-27T08:07:09","date_gmt":"2026-01-27T08:07:09","guid":{"rendered":"https:\/\/www.europesays.com\/ie\/305808\/"},"modified":"2026-01-27T08:07:09","modified_gmt":"2026-01-27T08:07:09","slug":"microsoft-office-zero-day-cve-2026-21509-emergency-patch-issued-for-active-exploitation","status":"publish","type":"post","link":"https:\/\/www.europesays.com\/ie\/305808\/","title":{"rendered":"Microsoft Office Zero-Day (CVE-2026-21509) &#8211; Emergency Patch Issued for Active Exploitation"},"content":{"rendered":"<p>\ue804Ravie Lakshmanan\ue802Jan 27, 2026Zero-Day \/ Vulnerability<\/p>\n<p><a href=\"https:\/\/www.europesays.com\/ie\/wp-content\/uploads\/2026\/01\/OFFICE.jpg\" style=\"display: block;  text-align: center; clear: left; float: left;\"><img decoding=\"async\" src=\"https:\/\/www.europesays.com\/ie\/wp-content\/uploads\/2026\/01\/OFFICE.jpg\" alt=\"\" border=\"0\" data-original-height=\"470\" data-original-width=\"900\"\/><\/a><\/p>\n<p>Microsoft on Monday issued out-of-band security patches for a high-severity Microsoft Office zero-day vulnerability exploited in attacks.<\/p>\n<p>The vulnerability, tracked as <strong>CVE-2026-21509<\/strong>, carries a CVSS score of 7.8 out of 10.0. It has been described as a security feature bypass in Microsoft Office.<\/p>\n<p>&#8220;Reliance on untrusted inputs in a security decision in Microsoft Office allows an unauthorized attacker to bypass a security feature locally,&#8221; the tech giant <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-21509\" rel=\"noopener nofollow\" target=\"_blank\">said<\/a> in an advisory.<\/p>\n<p>&#8220;This update addresses a vulnerability that bypasses <a href=\"https:\/\/www.huntress.com\/cybersecurity-101\/topic\/what-is-object-linking-embedding\" rel=\"noopener nofollow\" target=\"_blank\">OLE<\/a> mitigations in Microsoft 365 and Microsoft Office, which protect users from vulnerable COM\/OLE controls.&#8221;<\/p>\n<p>Successful exploitation of the flaw relies on an attacker sending a specially crafted Office file and convincing recipients to open it. It also noted that the Preview Pane is not an attack vector.<\/p>\n<p><a href=\"https:\/\/thehackernews.uk\/zero-trust-summit-d\" rel=\"nofollow noopener sponsored\" target=\"_blank\"><img loading=\"lazy\" decoding=\"async\" class=\"lazyload\" alt=\"Cybersecurity\" src=\"https:\/\/www.europesays.com\/ie\/wp-content\/uploads\/2026\/01\/threatlocker-inside-d.png\" width=\"729\" height=\"91\"\/><\/a><\/p>\n<p>The Windows maker said customers running Office 2021 and later will be automatically protected via a <a href=\"https:\/\/learn.microsoft.com\/en-us\/officeupdates\/microsoft365-apps-security-updates\" rel=\"noopener nofollow\" target=\"_blank\">service-side change<\/a>, but will be required to restart their Office applications for this to take effect. For those running Office 2016 and 2019, it&#8217;s required to install the following updates &#8211;<\/p>\n<ul>\n<li>Microsoft Office 2019 (32-bit edition) &#8211; 16.0.10417.20095<\/li>\n<li>Microsoft Office 2019 (64-bit edition) &#8211; 16.0.10417.20095<\/li>\n<li>Microsoft Office 2016 (32-bit edition) &#8211; 16.0.5539.1001<\/li>\n<li>Microsoft Office 2016 (64-bit edition) &#8211; 16.0.5539.1001<\/li>\n<\/ul>\n<p>As mitigation, the company is urging that customers make a Windows Registry change by following the steps outlined below &#8211;<\/p>\n<ul>\n<li>Take a <a href=\"https:\/\/support.microsoft.com\/en-us\/topic\/how-to-back-up-and-restore-the-registry-in-windows-855140ad-e318-2a13-2829-d428a2ab0692\" rel=\"noopener nofollow\" target=\"_blank\">backup of the Registry<\/a><\/li>\n<li>Exit all Microsoft Office applications<\/li>\n<li>Start the Registry Editor<\/li>\n<li>Locate the proper registry subkey &#8211;\n<ul>\n<li>HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Office\\16.0\\Common\\COM Compatibility\\ for 64-bit MSI Office or 32-bit MSI Office on 32-bit Windows<\/li>\n<li>HKEY_LOCAL_MACHINE\\SOFTWARE\\WOW6432Node\\Microsoft\\Office\\16.0\\Common\\COM Compatibility\\ for 32-bit MSI Office on 64-bit Windows<\/li>\n<li>HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Office\\ClickToRun\\REGISTRY\\MACHINE\\Software\\Microsoft\\Office\\16.0\\Common\\COM Compatibility\\ for 64-bit Click2Run Office or 32-bit Click2Run Office on 32-bit Windows<\/li>\n<li>HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Office\\ClickToRun\\REGISTRY\\MACHINE\\Software\\WOW6432Node\\Microsoft\\Office\\16.0\\Common\\COM Compatibility\\ for 32-bit Click2Run Office on 64-bit Windows<\/li>\n<\/ul>\n<\/li>\n<li>Add a new subkey named {EAB22AC3-30C1-11CF-A7EB-0000C05BAE0B} by right-clicking the\u202fCOM Compatibility\u202fnode and choosing\u202fAdd Key.\n<ul>\n<li>Within that subkey, add new value by right-clicking the new subkey and choosing\u202fNew\u202f&gt;\u202fDWORD (32-bit) Value<\/li>\n<li>Add a\u202fREG_DWORD\u202fhexadecimal value called\u202f&#8221;Compatibility Flags&#8221;\u202fwith a value of\u202f400<\/li>\n<\/ul>\n<\/li>\n<li>Exit Registry Editor and start the Office application<\/li>\n<\/ul>\n<p><a href=\"https:\/\/thehackernews.uk\/attack-surface-insight-d\" rel=\"nofollow noopener sponsored\" target=\"_blank\"><img loading=\"lazy\" decoding=\"async\" class=\"lazyload\" alt=\"Cybersecurity\" src=\"https:\/\/www.europesays.com\/ie\/wp-content\/uploads\/2026\/01\/Sprocket-d.jpg\" width=\"729\" height=\"91\"\/><\/a><\/p>\n<p>Microsoft has not shared any details about the nature and the scope of attacks exploiting CVE-2026-21509. It credited the Microsoft Threat Intelligence Center (MSTIC), Microsoft Security Response Center (MSRC), and Office Product Group Security Team for discovering the issue.<\/p>\n<p>The development has prompted the U.S. Cybersecurity and Infrastructure Security Agency (CISA) to <a href=\"https:\/\/www.cisa.gov\/news-events\/alerts\/2026\/01\/26\/cisa-adds-five-known-exploited-vulnerabilities-catalog\" rel=\"noopener nofollow\" target=\"_blank\">add<\/a> the flaw to its Known Exploited Vulnerabilities (<a href=\"https:\/\/www.cisa.gov\/known-exploited-vulnerabilities-catalog\" rel=\"noopener nofollow\" target=\"_blank\">KEV<\/a>) catalog, requiring Federal Civilian Executive Branch (FCEB) agencies to apply the patches by February 16, 2026.<\/p>\n","protected":false},"excerpt":{"rendered":"\ue804Ravie Lakshmanan\ue802Jan 27, 2026Zero-Day \/ Vulnerability Microsoft on Monday issued out-of-band security patches for a high-severity Microsoft Office&hellip;\n","protected":false},"author":2,"featured_media":305809,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[74],"tags":[21715,21710,21703,21702,21704,21705,21706,3600,18,21707,21708,21712,19,21713,17,11951,21711,21709,82,21714],"class_list":{"0":"post-305808","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-technology","8":"tag-computer-security","9":"tag-cyber-attacks","10":"tag-cyber-news","11":"tag-cyber-security-news","12":"tag-cyber-security-news-today","13":"tag-cyber-security-updates","14":"tag-cyber-updates","15":"tag-data-breach","16":"tag-eire","17":"tag-hacker-news","18":"tag-hacking-news","19":"tag-how-to-hack","20":"tag-ie","21":"tag-information-security","22":"tag-ireland","23":"tag-network-security","24":"tag-ransomware-malware","25":"tag-software-vulnerability","26":"tag-technology","27":"tag-the-hacker-news"},"share_on_mastodon":{"url":"https:\/\/pubeurope.com\/@ie\/115966040179363409","error":""},"_links":{"self":[{"href":"https:\/\/www.europesays.com\/ie\/wp-json\/wp\/v2\/posts\/305808","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.europesays.com\/ie\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.europesays.com\/ie\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/ie\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/ie\/wp-json\/wp\/v2\/comments?post=305808"}],"version-history":[{"count":0,"href":"https:\/\/www.europesays.com\/ie\/wp-json\/wp\/v2\/posts\/305808\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/ie\/wp-json\/wp\/v2\/media\/305809"}],"wp:attachment":[{"href":"https:\/\/www.europesays.com\/ie\/wp-json\/wp\/v2\/media?parent=305808"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.europesays.com\/ie\/wp-json\/wp\/v2\/categories?post=305808"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.europesays.com\/ie\/wp-json\/wp\/v2\/tags?post=305808"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}