Microsoft Addresses Important Exploit in Office Software
Microsoft has released three out-of-band updates in January 2026, specifically addressing a critical vulnerability, CVE-2026-21509, in Microsoft Office that is actively exploited. This vulnerability, rated as “Important” with a CVSS score of 7.8, is a security feature bypass that requires an attacker to either have local access to the system or convince a user to open a malicious document.
CVE-2026-21509 has been added to the CISA Known Exploited Vulnerabilities list. Notably, the vulnerability cannot be triggered via the Preview Pane in Microsoft Office, which limits its attack surface. The updates also included operational fixes stemming from previous standard updates. Microsoft has provided mitigation guidance to help users safeguard their systems against this vulnerability.
In response to these issues, Cisco Talos has released a new SNORT® ruleset designed to detect exploitation attempts related to this vulnerability and others disclosed recently. Security professionals using Cisco’s Firewalls are encouraged to update to the latest ruleset, while users of the open-source Snort Subscriber Ruleset can obtain the newest rule pack from Snort.org. Snort2 rules for this release range from 65823 to 65830, and Snort3 rules from 301384 to 301387. Additionally, the ClamAV signature Rtf.Exploit.CVE_2026_21509-10059214-0 has been developed to identify activity associated with this vulnerability.
Why this matters: The presence of a live exploit increases the urgency for organizations to patch their Microsoft Office installations. Failure to address CVE-2026-21509 can lead to unauthorized access and compromised systems, highlighting the necessity for vigilant monitoring and timely updates.
Integrating threat intelligence with current updates and monitoring systems can significantly reduce the risk associated with such vulnerabilities. Utilizing SIEMs and vulnerability scanning tools can enhance an organization’s ability to detect and respond to threats quickly.
Click here for the full article



