| CVE ID | CVE-2026-21509 |
| Full Title | Microsoft Office Security Feature Bypass Vulnerability |
| Severity | Important |
| CVSS Score | 7.8 / 10 (HIGH) |
| Impact | Security Feature Bypass |
| Attack Vector | Local |
| Attack Complexity | Low |
| Privileges Required | None |
| User Interaction | Required (user must open malicious file) |
| Exploited in Wild | Yes |
| Public PoC | No |
| MSRC Assessment | Exploitation Detected |
| Patched | January 26, 2026 (emergency out-of-band release) |
| NVD Entry | CVE-2026-21509 |
Affected Versions and Patches
| Office Version | Patch |
|---|---|
| Office 2016 (MSI-based) | KB5002713 |
| Office 2019, 2021, 2024 LTSC | Update via Click to Run |
| Microsoft 365 Apps | Update via Click to Run |
| Microsoft 365 (cloud only) | Not affected |
Microsoft confirmed a high-risk security bypass vulnerability, CVE-2026-21509, which is currently being exploited. This flaw lets attackers get around Object Linking and Embedding (OLE) security. If a user opens a rigged Office file, an attacker can run malicious actions that built-in security controls should usually block.
The vulnerability has a CVSS score of 7.8 and affects Office 2016, 2019, 2021, 2024, and Microsoft 365 Apps for Enterprise. Because this is a security bypass rather than a crash, users won't see an error message. Detection happens through endpoint security tools or network monitoring.
Not reported as visible user-facing error message; security feature bypass detected by security tools
Why CVE-2026-21509 Happens
This vulnerability exists because Microsoft Office trusts specific inputs during security decisions. When Office processes OLE objects, it fails to check certain parameters before deciding whether to apply security. Attackers use this logic flaw to "trick" the application into skipping standard protection layers.
APT28 has been linked to this activity, so you need to patch it now. While newer versions like Office 2021 and Microsoft 365 get some server-side protection, Office 2016 and 2019 stay vulnerable until you apply manual patches or registry updates. If you are dealing with other stability issues, check how to fix Outlook error 0xc0000409 to keep your environment stable.
How to Fix CVE-2026-21509
Here's what works: apply official security updates or use registry-based fixes.
Method 1: Apply Security Updates
Microsoft released emergency patches on January 26, 2026. This is the best fix for IT administrators.
- For Office 2016 (MSI-based): Download and install KB5002713 from the Microsoft Update Catalog.
- For Office 2019 and LTSC: Use the Office Deployment Tool or Windows Update to pull the latest security build.
- For Microsoft 365 and Office 2021+: These versions usually get server-side protection, but you should still check for updates manually. Open any Office app and go to File > Account > Update Options > Update Now.
If you manage large fleets using PowerShell scripts, force update checks across the network to meet the CISA deadline.
Method 2: Registry Mitigation
If you cannot patch immediately, use registry mitigations. These changes restrict how OLE objects behave, which closes the bypass vector.
Open the Registry Editor (regedit.exe) and go to:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\Common\Security
Create a new DWORD value or modify the existing entry as shown in the official Microsoft update guide for CVE-2026-21509. Registry paths vary between Office versions, so make sure you target the right one for your installation. Manual Windows fixes are often needed when automated patches are delayed.
Method 3: Preventive Workarounds
Until you are fully patched, use these secondary controls:
- Restrict Web Access: Block Office file downloads from unknown websites.
- Content Filtering: Use email gateways to strip OLE objects or block macro attachments from external senders.
- Disable Extensions: Limit browser extensions and block JavaScript in high-risk zones.
- Note on Preview Pane: The Preview Pane is not an attack vector for this specific flaw. You do not need to disable it.
Verification and Monitoring
After installing KB5002713 or the registry fixes, check the build version of your Office files. For MSI-based Office 2016, confirm the file version for mso.dll matches the Microsoft security bulletin.
Managing these updates matters for keeping your infrastructure safe. If you have other system issues, such as print spooler flaws, see our guide to fix printer error 0x0000011b for more hardening steps.
Need hands-on help? Contact our team.
Related reading: