Microsoft recently identified a critical vulnerability, CVE-2026-21509, affecting several versions of Microsoft Office. This bypass allows attackers to get around Object Linking and Embedding (OLE) mitigations. Since this is actively being exploited and sits in the CISA Known Exploited Vulnerabilities (KEV) catalog, IT admins and Office users need to act now.
The Problem: Silent OLE Mitigation Bypass
The vulnerability exists because Microsoft Office relies on untrusted inputs for security decisions. Opening a malicious Office file allows an attacker to bypass security layers meant to block embedded objects. This flaw triggers no warning or error code, so users won't know they are under attack.
No specific user-facing error message. The vulnerability silently bypasses OLE mitigations when a user opens a malicious Office file.
If you manage enterprise environments, you might also be troubleshooting unrelated issues like how to fix Outlook error 0xc0000409 or general Windows fixes.
Affected Versions
- Microsoft 365 Apps for Enterprise
- Microsoft Office LTSC 2021 and 2024
- Microsoft Office 2019 (32-bit and 64-bit)
- Microsoft Office 2016 (32-bit and 64-bit)
How to Fix CVE-2026-21509
Fixing this depends on your Office version. Install the security update released on January 26, 2026, right away.
Solution 1: Microsoft 365, Office 2021, and Office 2024
For newer versions of Office, Microsoft deployed a service-side fix.
- Save all work.
- Close all Office applications (Word, Excel, Outlook, PowerPoint).
- Restart the applications.
- Go to File > Account > Update Options > Update Now to get the latest build.
Solution 2: Registry Workaround for Office 2016 and 2019
If you use Office 2016 or 2019 and cannot update yet, apply a registry change to enforce COM compatibility flags.
Manual Registry Steps:
- Press
Win + R, typeregedit, and press Enter. - Back up your registry by selecting File > Export.
- Navigate to:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\16.0\Common\COM Compatibility - Right-click COM Compatibility, select New > Key, and name it using the CLSID from the Microsoft security advisory for the object being blocked.
- Inside the new key, right-click and select New > DWORD (32-bit) Value.
- Name the value
Compatibility Flags. - Set the Value data to
400(Hexadecimal). - Restart Office.
Solution 3: Automated Fix via PowerShell
For IT professionals managing multiple endpoints, PowerShell scripts work best for the registry fix.
# Define the registry path
$regPath = "HKLM:\SOFTWARE\Microsoft\Office\16.0\Common\COM Compatibility\{Example-CLSID-Key}"
# Create the key if it does not exist
if (!(Test-Path $regPath)) {
New-Item -Path $regPath -Force
}
# Set the Compatibility Flags to 400
New-ItemProperty -Path $regPath -Name "Compatibility Flags" -Value 1024 -PropertyType DWORD -Force
Note: Replace {Example-CLSID-Key} with the relevant Class ID from the MSRC documentation for the objects you want to block.
Summary of Actions
- Apply Updates: Install the January 26, 2026 patch now.
- Restart Apps: Force a restart of all Office processes to start protections.
- User Education: Tell users to avoid unsolicited attachments, as this attack requires them to open a file.
For help with deployments or security settings, contact us.
Need help? Contact our team.
Related reading: