Microsoft Issues Emergency Patch for Actively Exploited Office Zero-Day
TL;DR
Microsoft Office Zero-Day Vulnerability CVE-2026-21509
Microsoft has released out-of-band security patches for a high-severity Microsoft Office zero-day vulnerability, CVE-2026-21509, which is actively being exploited. This vulnerability is a security feature bypass flaw. The Hacker News

Vulnerability Details
Identified as CVE-2026-21509, the vulnerability has a CVSS score of 7.8 out of 10. It is described as a security feature bypass in Microsoft Office, where "Reliance on untrusted inputs in a security decision in Microsoft Office allows an unauthorized attacker to bypass a security feature locally". Microsoft Security Response Center Successful exploitation involves sending a specially crafted Office file and convincing the recipient to open it. The Preview Pane is not an attack vector.
Root Cause The vulnerability CVE-2026-21509 arises from how Microsoft Office manages untrusted inputs during security decisions, allowing attackers to bypass security features locally by sending a malicious Office file and convincing the user to open it. Specifically, the vulnerability bypasses OLE mitigations, which are designed to protect users from vulnerable COM/OLE controls. SecPod Blog
Affected Products The vulnerability impacts several Microsoft Office versions:
- Microsoft Office 2016
- Microsoft Office 2019
- Microsoft Office LTSC 2021
- Microsoft Office LTSC 2024
- Microsoft 365 Apps for Enterprise
For Office 2021 and later, automatic protection is provided via a service-side change, requiring a restart of Office applications. However, Office 2016 and 2019 require specific updates or mitigation steps. Infosecurity Magazine
Mitigation Steps
Microsoft advises the following mitigation steps:
- Apply the Patch: Restart Office applications for Microsoft Office 2021 and later to enable the service-side fix. Microsoft
- Registry Mitigation (Office 2016 & 2019): Apply a registry-based mitigation until the official patch is available for Office 2016 and 2019. SecPod Blog
Registry Mitigation Steps:
Close all Microsoft Office applications.
Back up the Windows Registry. Microsoft Support
Open the Registry Editor (
regedit.exe).Navigate to the appropriate registry key based on your Office and Windows version (32-bit or 64-bit):
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\16.0\Common\COM Compatibility\(for 64-bit Office, or 32-bit Office on 32-bit Windows)HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Office\16.0\Common\COM Compatibility\(for 32-bit Office on 64-bit Windows)HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\ClickToRun\REGISTRY\MACHINE\Software\Microsoft\Office\16.0\Common\COM Compatibility\HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\ClickToRun\REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Office\16.0\Common\COM Compatibility\
If the
COM Compatibilitykey does not exist, create it under theCommonkey.Right-click on the
COM Compatibilitykey, select New -> Key, and name it{EAB22AC3-30C1-11CF-A7EB-0000C05BAE0B}.Right-click on the newly created
{EAB22AC3-30C1-11CF-A7EB-0000C05BAE0B}key, select New -> DWORD (32-bit) Value.Name the new value
Compatibility Flags.Double-click
Compatibility Flags, set the Base to Hexadecimal, and enter400in the Value data field.
Example Registry Configuration:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\16.0\Common\COM Compatibility\{EAB22AC3-30C1-11CF-A7EB-0000C05BAE0B}
"Compatibility Flags"=dword:00000400
Tactics, Techniques, and Procedures (TTPs) Attackers are actively exploiting this vulnerability using specific TTPs:
- TA0001 – Initial Access: Phishing campaigns deliver malicious Office files to potential victims.
- TA0002 – Execution: Once the user opens the malicious file, the attacker can bypass security features and execute arbitrary code.
- T1566 – Phishing: Crafting deceptive emails or messages to trick users into opening the malicious Office file.
- T1204 – User Execution: The vulnerability requires user interaction to execute the malicious code.
CISA Action The Cybersecurity and Infrastructure Security Agency (CISA) has added the flaw to its Known Exploited Vulnerabilities (KEV) catalog, mandating Federal Civilian Executive Branch (FCEB) agencies to apply patches by February 16, 2026. CISA

Gopher Security's Role In light of these vulnerabilities, it is crucial to implement a robust security architecture. Gopher Security specializes in AI-powered, post-quantum Zero-Trust cybersecurity architecture, converging networking and security across devices, apps, and environments. Our platform utilizes peer-to-peer encrypted tunnels and quantum-resistant cryptography to protect against sophisticated threats.
To learn more about how Gopher Security can protect your organization, please visit our website.