{"id":1939,"date":"2026-01-27T09:13:46","date_gmt":"2026-01-27T08:13:46","guid":{"rendered":"https:\/\/ilja-schlak.de\/?p=1939"},"modified":"2026-02-02T21:03:57","modified_gmt":"2026-02-02T20:03:57","slug":"zero-day-vulnerability-cve-2026-21509-in-microsoft-office","status":"publish","type":"post","link":"https:\/\/ilja-schlak.de\/en\/zero-day-vulnerability-cve-2026-21509-in-microsoft-office\/","title":{"rendered":"Zero-Day Vulnerability \u2013 CVE-2026-21509 in Microsoft Office"},"content":{"rendered":"<p>Update on CVE-2026-21509: The vulnerability is being actively exploited, affects multiple Office product lines, and there is now clearer information on patch status and the registry mitigation recommended by Microsoft.<\/p>\n<h2>Update of February 2, 2026<\/h2>\n<p>The scope for CVE-2026-21509 is now consistent: Office 2016, Office 2019, Office LTSC 2021, Office LTSC 2024, and Microsoft 365 Apps for Enterprise are affected. Details and the CISA KEV due date can be verified via the <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2026-21509\" rel=\"nofollow noopener\" target=\"_blank\">NVD<\/a>.<\/p>\n<p>For patch status, distinguishing by product line is crucial. For Office 2016, there is a security update <a href=\"https:\/\/support.microsoft.com\/en-us\/topic\/description-of-the-security-update-for-office-2016-january-26-2026-kb5002713-32ec881d-a3b5-470c-b9a5-513cc46bc77e\" rel=\"nofollow noopener\" target=\"_blank\">KB5002713<\/a>, which explicitly applies only to MSI-based installations. For volume-licensed Office 2019 installations, a new build 10417.20095 with release date January 26, 2026 is documented in the <a href=\"https:\/\/learn.microsoft.com\/de-de\/officeupdates\/update-history-office-2019\" rel=\"nofollow noopener\" target=\"_blank\">Office update history<\/a>. According to the guidance, Office 2021 and later are protected via a service-side change that becomes effective after restarting the Office apps.<\/p>\n<p>If patching is not possible in the short term, a mitigation described by Microsoft can reduce exploitability. In the Office COM Compatibility context, it blocks the CLSID {EAB22AC3-30C1-11CF-A7EB-0000C05BAE0B} with the value Compatibility Flags = 0x400 (hex). A clear walkthrough of the relevant paths and steps can be found in the analysis by <a href=\"https:\/\/www.bleepingcomputer.com\/news\/microsoft\/microsoft-patches-actively-exploited-office-zero-day-vulnerability\/\" rel=\"nofollow noopener\" target=\"_blank\">BleepingComputer<\/a>. Registry changes should be tested and safeguarded in advance.<\/p>\n<pre>Update of February 2, 2026<\/pre>\n<h2>Zero-Day Vulnerability \u2013 CVE-2026-21509 in Microsoft Office: Actively Exploited Security Feature Bypass \u2013 Facts, Updates, and Mitigations<\/h2>\n<p>There is solid primary-source data for <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2026-21509\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2026-21509<\/a> available from the NVD. The record was published in the NVD on January 26, 2026, lists a CVSS v3.1 base score of 7.8 (\u201cHigh\u201d) reported by Microsoft as the CNA, and is flagged in the NVD as being included in CISA\u2019s Known Exploited Vulnerabilities (KEV) catalog, including a due date of February 16, 2026.<\/p>\n<h3>What is CVE-2026-21509 \u2014 and what is certain about it?<\/h3>\n<p>The NVD describes CVE-2026-21509 as a \u201cSecurity Feature Bypass\u201d in Microsoft Office, caused by a security-relevant decision that relies on untrusted inputs. The CVSS vector shown in the NVD (CVSS:3.1\/AV:L\/AC:L\/PR:N\/UI:R\/S:U\/C:H\/I:H\/A:H) means in practice that exploitation requires user interaction (UI:R), does not require privileges (PR:N), and can have severe impact if successful (C\/I\/A are each \u201cHigh\u201d).<\/p>\n<p>For accurate secondary reporting, it is important to note that the publicly visible primary texts in the NVD and in Microsoft\u2019s KB article for KB5002713 do not explicitly detail which specific Office protection mechanism is being bypassed. Anyone asserting technical details about the underlying mechanism should verify them directly against the vendor channel in the <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-21509\" rel=\"nofollow noopener\" target=\"_blank\">MSRC Update Guide<\/a>. (The MSRC entry is web-based and requires JavaScript.)<\/p>\n<blockquote>\n<h2><span style=\"font-size: 12pt;\">Aside: What does CVSS mean \u2014 and why the score alone is not enough?<\/span><\/h2>\n<p><span style=\"font-size: 12pt;\">CVSS (Common Vulnerability Scoring System) is a standard used to rate vulnerabilities based on technical exploitability and potential impact. The base score combines metrics such as attack vector (for example, local vs. network), required complexity, required privileges and user interaction, and the impact on confidentiality, integrity, and availability. The key point is that CVSS primarily represents a technical snapshot, not automatically the real-world risk in your environment. Exploit availability, active exploitation (\u201cin the wild\u201d), existing mitigations, exposure (for example, email gateways and macro policies), and business criticality can significantly increase or decrease the practical urgency \u2014 even when the CVSS score is identical.<\/span><\/p>\n<h3>Why is this urgent?<\/h3>\n<\/blockquote>\n<p>The NVD lists CVE-2026-21509 as included in CISA\u2019s KEV catalog and states as the \u201cRequired Action\u201d that mitigations should be applied according to the vendor\u2019s guidance or that use should be discontinued if no mitigations are available. The \u201cDue Date\u201d referenced there is binding under CISA BOD 22-01 particularly for U.S. FCEB agencies; for other organizations, it is a strong prioritization signal but not automatically a legal deadline.<\/p>\n<h3>Updates and affected products: What is proven, and what must be checked in MSRC?<\/h3>\n<p>Product-specific affected status should be verified in the <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-21509\" rel=\"nofollow noopener\" target=\"_blank\">MSRC Update Guide<\/a>, because the NVD points there. However, the following remediation information is already cleanly supported by Microsoft primary sources.<\/p>\n<p>For MSI-based installations of Office 2016, a security update exists. Microsoft states in <a href=\"https:\/\/support.microsoft.com\/en-us\/topic\/description-of-the-security-update-for-office-2016-january-26-2026-kb5002713-32ec881d-a3b5-470c-b9a5-513cc46bc77e\" rel=\"nofollow noopener\" target=\"_blank\">KB5002713<\/a> that this update resolves a \u201cMicrosoft Word security feature bypass vulnerability\u201d and explicitly references CVE-2026-21509. Microsoft also clarifies that the Download Center fix applies to the Microsoft Installer (MSI) edition and not to Office Click-to-Run editions.<\/p>\n<p>For volume-licensed Office 2019 installations, Microsoft documents a new release in the official update history on January 26, 2026: \u201cVersion 1808 (Build 10417.20095)\u201d in the article <a href=\"https:\/\/learn.microsoft.com\/de-de\/officeupdates\/update-history-office-2019\" rel=\"nofollow noopener\" target=\"_blank\">\u201cUpdate history for Office 2016 C2R and Office 2019\u201d<\/a>. This update history does not include CVE mapping; therefore, whether and how this build addresses CVE-2026-21509 must be verified via MSRC and\/or the vendor\u2019s security release notes.<\/p>\n<p>This context is not optional; it is decision-relevant. Microsoft explicitly notes in the same update history that support for Office 2019 ended on October 14, 2025 and that updates after that date are provided only at Microsoft\u2019s discretion. In environments still running Office 2019, this is a lifecycle and risk issue that should be reflected in remediation planning.<\/p>\n<h3>Temporary mitigation: Use the Office COM kill bit only in a controlled manner<\/h3>\n<p>If a patch rollout is not immediately possible, blocking specific COM objects via the Office COM kill bit can be considered as an emergency measure. Microsoft describes the mechanism, registry paths, and the relevant value (\u201cCompatibility Flags\u201d = 0x00000400) in <a href=\"https:\/\/support.microsoft.com\/de-de\/topic\/sicherheitseinstellungen-f%C3%BCr-com-objekte-in-office-b08a031c-0ab8-3796-b8ec-a89f9dbb443d\" rel=\"nofollow noopener\" target=\"_blank\">\u201cSecurity settings for COM objects in Office\u201d<\/a>. The kill bit should not be set \u201cspeculatively\u201d; it should only be applied when the vendor or a reliable internal analysis identifies a specific CLSID as the relevant attack surface.<\/p>\n<h3>Conclusion<\/h3>\n<p>CVE-2026-21509 is a Microsoft-CNA-rated security feature bypass in Office with CVSS 7.8 (High) and a clear \u201cKnown Exploited\u201d signal in the NVD. For Office 2016 (MSI), KB5002713 is clearly documented as a CVE-related security update. For Office 2019, a new build is documented, but CVE mapping is not included in the update history itself; therefore, reliable product and fix mapping must be verified against the MSRC entry.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Zero-Day Vulnerability \u2013 CVE-2026-21509 in Microsoft Office: Actively Exploited Security Feature Bypass \u2013 Facts, Updates, and Mitigations<\/p>\n","protected":false},"author":1,"featured_media":1940,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[120],"tags":[],"class_list":["post-1939","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/ilja-schlak.de\/en\/wp-json\/wp\/v2\/posts\/1939","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ilja-schlak.de\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ilja-schlak.de\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ilja-schlak.de\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ilja-schlak.de\/en\/wp-json\/wp\/v2\/comments?post=1939"}],"version-history":[{"count":3,"href":"https:\/\/ilja-schlak.de\/en\/wp-json\/wp\/v2\/posts\/1939\/revisions"}],"predecessor-version":[{"id":2027,"href":"https:\/\/ilja-schlak.de\/en\/wp-json\/wp\/v2\/posts\/1939\/revisions\/2027"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ilja-schlak.de\/en\/wp-json\/wp\/v2\/media\/1940"}],"wp:attachment":[{"href":"https:\/\/ilja-schlak.de\/en\/wp-json\/wp\/v2\/media?parent=1939"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ilja-schlak.de\/en\/wp-json\/wp\/v2\/categories?post=1939"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ilja-schlak.de\/en\/wp-json\/wp\/v2\/tags?post=1939"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}