Emergency patch fixes active Microsoft Office zero-day CVE-2026-21509

1 min read
Source: The Hacker News
Emergency patch fixes active Microsoft Office zero-day CVE-2026-21509
Photo: The Hacker News
TL;DR Summary

Microsoft issued an out-of-band fix for a high-severity Office zero-day (CVE-2026-21509) that enables a local security feature bypass when users open a specially crafted Office file; exploitation requires user interaction, and the Preview Pane is not a vector. Office 2021+ patches will apply automatically with a service-side change but require restarting Office apps, while Office 2016/2019 users must install specific updates. A registry workaround is provided as mitigation. The flaw has been added to the CISA Known Exploited Vulnerabilities catalog, with federal agencies required to patch by February 16, 2026. Credit goes to MSTIC, MSRC, and the Office security team.

Share this article

Reading Insights

Total Reads

1

Unique Readers

13

Time Saved

2 min

vs 3 min read

Condensed

77%

426100 words

Want the full story? Read the original article

Read on The Hacker News