Excessive-risk Workplace safety flaw: Microsoft points emergency updates
Abstract created by Sensible Solutions AI
In abstract:
- PCWorld stories that Microsoft issued emergency updates for a high-risk zero-day vulnerability (CVE-2026-21509) affecting Workplace 2016, 2019, 2021 LTSC, and 2024 LTSC variations.
- Attackers can exploit this flaw to bypass security measures and management COM/OLE capabilities, making instant patching important for system safety.
- Present Workplace variations obtain computerized updates to construct 16.0.10417.20095, whereas older variations require handbook updates from Microsoft’s catalog or registry modifications.
Microsoft lately printed a safety advisory warning of a newly found zero-day vulnerability in Workplace purposes. The vulnerability, designated CVE-2026-21509, is classed as “excessive” danger.
In response to the advisory, this vulnerability will be exploited to bypass security measures in varied variations of Workplace, together with Microsoft Workplace 2016, 2019, 2021 LTSC, and 2024 LTSC. Customers are urged to put in the emergency updates offered by Microsoft as quickly as attainable.
Microsoft explains that attackers can abuse this vulnerability to take management of COM/OLE controls, that are used for interplay between completely different Home windows purposes. No phrase on how precisely the assault works or what the results of such an assault can be.
The place to get the emergency updates
If you happen to’re utilizing a present model of Workplace (2021 LTSC or newer), you’ll obtain the related safety updates mechanically. To be on the protected aspect, you might need to restart the put in purposes. The construct variety of the up to date Workplace model is 16.0.10417.20095.
Older variations of Workplace have to be up to date manually. You’ll be able to receive the required updates from the Microsoft Replace Catalog. Listed below are the hyperlinks for the Workplace 2016 replace and Workplace 2019 replace.
If you happen to’re unable to replace your Workplace for no matter cause, Microsoft presents another (however extra superior) answer that entails enhancing the Home windows Registry. You will discover it beneath the “Mitigations” part on the safety advisory warning for this vulnerability.
This text initially appeared on our sister publication PC-WELT and was translated and localized from German.

