Microsoft Patches Actively Exploited Office Zero-Day in Office Suite

By Thomas | Published on January 29, 2026

News

A newly discovered zero-day vulnerability in Microsoft Office, tracked as CVE-2026-21509, has been actively exploited in the wild, raising serious security concerns for users worldwide. Identified by Microsoft’s own security researchers, the flaw allows attackers to bypass built-in security features by leveraging untrusted inputs, exposing vulnerable COM/OLE controls. The vulnerability affects a wide range of Office versions, including Microsoft 365 Apps for Enterprise, and typically requires tricking a user into opening a malicious Office file. In response, Microsoft has now released emergency updates to address the issue and provided mitigation steps for those who cannot immediately patch their systems.

Uncovering the Impact

The zero-day vulnerability, tracked as CVE-2026-21509, was announced by Microsoft’s internal security researchers, who confirmed that it was being actively exploited in targeted attacks. The flaw allows attackers to bypass built-in Office security features by exploiting untrusted inputs, putting users at risk of malicious COM/OLE control execution. It affects multiple versions of Microsoft Office, including Office 2016, Office 2019, Office LTSC 2021, Office LTSC 2024, and Microsoft 365 Apps for Enterprise, making it a widespread concern for both individual and enterprise users.

How the flaw actually works

The attack begins with a normal looking Office document. A Word file or a spreadsheet, something that would not raise alarms on its own. The attacker just needs the target to open it. There are no macros involved, no big warning banners, and nothing happens just by previewing the file. Once it is opened though, the document takes advantage of a mistake in how Microsoft Office decides what it can trust.

Office has safeguards meant to stop risky, outdated features from running, because those features have been abused for years to spread malware. The problem here is that Office ends up trusting information that comes straight from the document itself. In simple terms, the file lies about what it contains, and Office believes it. That causes the software to drop protections that were supposed to stay in place.

When those protections fail, parts of the document that should never be allowed to run suddenly come to life. These are not new tricks, they are old components that Microsoft intentionally tried to lock down long ago. This flaw quietly reopens that door without asking the user or showing anything suspicious on screen.

The vulnerability does not install malware by itself, but it gives attackers a way in. Once those blocked components are running, they can be used to trigger follow up actions, like pulling in additional code or launching built in system tools. That is where things like spyware, backdoors, or remote access tools can enter the picture. By then, the document has already done its job.

What makes this dangerous is not flash or speed, it is how little noise it makes. No macros, no pop ups, no obvious moment where something goes wrong. From the victim’s side, they opened a document. From the attacker’s side, a system just opened itself up.

Patched on Discovery

Microsoft claimed this flaw was actively exploited before its disclosure, indicating attackers knew of the flaw for some time. However, Microsoft’s internal security teams were the first official researchers to identify it, with no evidence of prior discovery. Once confirmed, Microsoft moved forward, releasing patches and mitigations alongside the advisory. While the exact timeline of internal awareness is unknown, the public announcement coincided with ready-to-deploy fixes, minimizing exposure.

Similar Articles

0 Comments

No comments yet. Be the first one to comment!