Original Article Text

Click to Toggle View

Microsoft patches actively exploited Office zero-day vulnerability. Microsoft has released emergency out-of-band security updates to patch a high-severity Microsoft Office zero-day vulnerability exploited in attacks. The security feature bypass vulnerability, tracked as CVE-2026-21509, affects multiple Office versions, including Microsoft Office 2016, Microsoft Office 2019, Microsoft Office LTSC 2021, Microsoft Office LTSC 2024, and Microsoft 365 Apps for Enterprise (the company's cloud-based subscription service). However, as noted in today's advisory, security updates for Microsoft Office 2016 and 2019 are not yet available and will be released as soon as possible. While the preview pane is not an attack vector, unauthenticated local attackers can still successfully exploit the vulnerability through low-complexity attacks that require user interaction. "Reliance on untrusted inputs in a security decision in Microsoft Office allows an unauthorized attacker to bypass a security feature locally. An attacker must send a user a malicious Office file and convince them to open it," Microsoft explained. "This update addresses a vulnerability that bypasses OLE mitigations in Microsoft 365 and Microsoft Office which protect users from vulnerable COM/OLE controls." Although Office 2016 and 2019 users can't immediately patch their systems against attacks, Microsoft has provided confusing mitigation measures that could "reduce the severity of exploitation." We have attempted to clear this up with our instructions below: If one of the above keys does not exist, create a new "COM Compatibility" key under this Registry path by right-clicking on Common and selecting New -> Key. After performing these steps, the flaw will be mitigated when you next launch an Office application. Microsoft has not shared who discovered the vulnerability or any details on how it is exploited, and a spokesperson was not immediately available for comment when contacted by BleepingComputer earlier today. Earlier this month, as part of the January 2026 Patch Tuesday, Microsoft issued security updates for 114 flaws, including one actively exploited and two publicly disclosed zero-day bugs. The other actively exploited zero-day patched this month is an information disclosure flaw in the Desktop Window Manager, tagged by Microsoft as "important severity," that can let attackers to read memory addresses associated with the remote ALPC port. Last week, Microsoft also released multiple out-of-band Windows updates to fix shutdown and Cloud PC bugs triggered by the January Patch Tuesday updates, as well as another set of emergency updates to address an issue causing the classic Outlook email client to freeze or hang. The 2026 CISO Budget Benchmark It's budget season! Over 300 CISOs and security leaders have shared how they're planning, spending, and prioritizing for the year ahead. This report compiles their insights, allowing readers to benchmark strategies, identify emerging trends, and compare their priorities as they head into 2026. Learn how top leaders are turning investment into measurable impact.

Daily Brief Summary

VULNERABILITIES // Microsoft Releases Emergency Patch for Office Zero-Day Vulnerability

Microsoft issued an urgent security update to address a high-severity zero-day vulnerability in Microsoft Office, known as CVE-2026-21509, affecting multiple Office versions and Microsoft 365 Apps.

The vulnerability allows unauthorized attackers to bypass security features using low-complexity attacks that require user interaction, potentially compromising systems.

Affected Office versions include 2016, 2019, LTSC 2021, LTSC 2024, and Microsoft 365 Apps, though patches for Office 2016 and 2019 are pending.

Microsoft advises users to implement temporary mitigation measures, involving registry changes, to reduce the risk of exploitation until official patches are available.

The vulnerability involves bypassing OLE mitigations, which are designed to protect users from vulnerable COM/OLE controls within Office applications.

This emergency update follows Microsoft's recent Patch Tuesday release, which addressed 114 security flaws, including other zero-day vulnerabilities.

Organizations are advised to apply the latest updates promptly and follow Microsoft's mitigation guidance to safeguard against potential attacks.