{"id":15555,"date":"2026-01-27T23:29:15","date_gmt":"2026-01-27T23:29:15","guid":{"rendered":"https:\/\/newestek.com\/?p=15555"},"modified":"2026-01-27T23:29:15","modified_gmt":"2026-01-27T23:29:15","slug":"fixes-released-for-a-serious-microsoft-office-zero-day-flaw","status":"publish","type":"post","link":"https:\/\/newestek.com\/?p=15555","title":{"rendered":"Fixes released for a serious Microsoft Office zero-day flaw"},"content":{"rendered":"<div>\n<div id=\"remove_no_follow\">\n<div class=\"grid grid--cols-10@md grid--cols-8@lg article-column\">\n<div class=\"col-12 col-10@md col-6@lg col-start-3@lg\">\n<div class=\"article-column__content\">\n<section class=\"wp-block-bigbite-multi-title\">\n<div class=\"container\"><\/div>\n<\/section>\n<p>Microsoft is warning admins of an Office security bypass zero day vulnerability that can be triggered simply by a user opening a document. The flaw is currently being actively exploited.<\/p>\n<p>\u201cThe vulnerability is serious,\u201d said <a href=\"https:\/\/www.sans.org\/profiles\/dr-johannes-ullrich\" target=\"_blank\" rel=\"noreferrer noopener\">Johannes Ullrich<\/a>, dean of research at the SANS Institute. \u201cThe root cause is that Microsoft Office still supports the older OLE document format, which provides access to various OLE components. The effect is similar to what an attacker could do with Office Macros. But Office Macros are typically blocked for documents downloaded from the internet. Microsoft implemented similar protections for OLE components, but this recent exploit found a way to bypass them.\u201d<\/p>\n<p>Despite efforts by Microsoft and email gateway vendors, emails with malicious attachments are still a significant attack vector, he added.<\/p>\n<p>\u201cIt is important that organizations roll up this update quickly. Until it has been applied, filters on email gateways or endpoint protection signatures may help mitigate the threat.\u201d<\/p>\n<p>Fortunately the vulnerability, <a href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2026-21509\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2026-21509<\/a>, which has a CVSS score of 7.8, is fixed automatically in Office 2021 and up, however, admins should note that these applications need a restart for the patch to take effect. For Office 2016 and Office 2019, <a href=\"https:\/\/support.microsoft.com\/en-us\/topic\/description-of-the-security-update-for-office-2016-january-26-2026-kb5002713-32ec881d-a3b5-470c-b9a5-513cc46bc77e\" target=\"_blank\" rel=\"noreferrer noopener\">there\u2019s a separate patch<\/a>.<\/p>\n<p><a href=\"https:\/\/www.linkedin.com\/in\/bicer\" target=\"_blank\" rel=\"noreferrer noopener\">Jack Bicer<\/a>, director of vulnerability research at Action1, said that for security teams and CISOs \u201cthe urgency is real: don\u2019t wait, prioritize this update immediately, and ensure all Office applications are restarted so the protections take effect without delay.\u201d\u00a0<\/p>\n<p>The flaw is exploited by sending malicious Office documents and convincing users to open them, \u201ca classic technique that emphasizes the ongoing effectiveness of social engineering in real-world attacks,\u201d he said. <\/p>\n<p>The US Cybersecurity and Infrastructure Security Agency (CISA) has added the hole to its <a href=\"https:\/\/www.cisa.gov\/news-events\/alerts\/2026\/01\/26\/cisa-adds-five-known-exploited-vulnerabilities-catalog\" target=\"_blank\" rel=\"noreferrer noopener\">catalogue of known exploited vulnerabilities.<\/a> Vulnerabilities in the catalogue must be remediated by federal civilian executive branch agencies by a specified date.<\/p>\n<p>Asked for comment, a Microsoft spokesperson said the company recommends impacted customers follow the guidance on its\u00a0<a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-21509\" target=\"_blank\" rel=\"noreferrer noopener\">CVE page<\/a>.\u00a0It also points out that\u00a0Microsoft Defender has detections in place to block exploitation, and Office\u2019s default\u00a0<a href=\"https:\/\/support.microsoft.com\/en-us\/office\/what-is-protected-view-d6f09ac7-e6b9-4495-8e43-2bbcdbcb6653\" target=\"_blank\" rel=\"noreferrer noopener\">Protected View<\/a>\u00a0setting provides an extra layer of protection by blocking malicious files from the internet.<\/p>\n<p>\u201cAs a security best practice, we encourage users to exercise caution when downloading and enabling editing on files from unknown sources, as indicated in security warnings,\u201d the spokesperson added.<\/p>\n<p><em>This article originally appeared on <a href=\"https:\/\/www.computerworld.com\/article\/4123102\/fixes-released-for-a-serious-microsoft-office-zero-day-flaw.html\" target=\"_blank\">Computerworld<\/a>.<\/em><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Microsoft is warning admins of an Office security bypass zero day vulnerability that can be triggered simply by a user opening a document. The flaw is currently being actively exploited. \u201cThe vulnerability is serious,\u201d said Johannes Ullrich, dean of research at the SANS Institute. \u201cThe root cause is that Microsoft Office still supports the older OLE document format, which provides access to various OLE components&#8230;. <\/p>\n<p class=\"more\"><a class=\"more-link\" href=\"https:\/\/newestek.com\/?p=15555\">Read More<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-15555","post","type-post","status-publish","format-standard","hentry","category-uncategorized","is-cat-link-borders-light is-cat-link-rounded"],"_links":{"self":[{"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/posts\/15555","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=15555"}],"version-history":[{"count":0,"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/posts\/15555\/revisions"}],"wp:attachment":[{"href":"https:\/\/newestek.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=15555"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=15555"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=15555"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}