Source: Ministry of education information & communication security contingency platform
| Publication Number | Publication Time | 2026/01/26 00:00 | |
| Incident Type | ANA-Vulnerability Alert | Discovery Time | 2026/01/26 00:00 |
| Impact Level |
High |
||
| [Subject] 【Vulnerability Alert】Microsoft Office — Critical Security Feature Bypass Vulnerability (CVE-2026-21509) |
|||
|
[Content]
Attackers can lure users into opening malicious Office documents to bypass built-in Office security protection mechanisms, thereby executing malicious code and posing risks of system compromise and data leakage. This vulnerability has been included by the U.S. CISA in the Known Exploited Vulnerabilities (KEV) Catalog and is classified as a high-risk vulnerability that is actively exploited. It is strongly recommended to complete patching immediately.
|
|||
|
[Affected Platform]
Microsoft Office 2019 Office LTSC 2021 Office LTSC 2024 Microsoft 365 Apps for Enterprise |
|||
| [Recommended Actions] Immediately apply updates. Please promptly install the official security update released by Microsoft on 2026-01-26 and complete a system restart. |
|||
| [Reference] https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21509 |
|||