Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

msrc логотип

CVE-2026-21514

Опубликовано: 10 фев. 2026
Источник: msrc
CVSS3: 7.8
EPSS Низкий

Описание

Microsoft Word Security Feature Bypass Vulnerability

Reliance on untrusted inputs in a security decision in Microsoft Office Word allows an unauthorized attacker to bypass a security feature locally.

FAQ

According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

An attacker must send a user a malicious Office file and convince them to open it.

What kind of security feature could be bypassed by successfully exploiting this vulnerability?

This update addresses a vulnerability that bypasses OLE mitigations in Microsoft 365 and Microsoft Office which protect users from vulnerable COM/OLE controls.

Is the Preview Pane an attack vector for this vulnerability?

No, the Preview Pane is not an attack vector.

Обновления

ПродуктСтатьяОбновление
Microsoft 365 Apps for Enterprise for 32-bit Systems
-
Microsoft 365 Apps for Enterprise for 64-bit Systems
-
Microsoft Office LTSC for Mac 2021
Microsoft Office LTSC 2021 for 64-bit editions
-
Microsoft Office LTSC 2021 for 32-bit editions
-
Microsoft Office LTSC 2024 for 32-bit editions
-
Microsoft Office LTSC 2024 for 64-bit editions
-
Microsoft Office LTSC for Mac 2024

Показывать по

Возможность эксплуатации

Publicly Disclosed

Yes

Exploited

Yes

Latest Software Release

Exploitation Detected

EPSS

Процентиль: 91%
0.06264
Низкий

7.8 High

CVSS3

Связанные уязвимости

CVSS3: 7.8
nvd
около 2 месяцев назад

Reliance on untrusted inputs in a security decision in Microsoft Office Word allows an unauthorized attacker to bypass a security feature locally.

CVSS3: 7.8
github
около 2 месяцев назад

Reliance on untrusted inputs in a security decision in Microsoft Office Word allows an unauthorized attacker to bypass a security feature locally.

CVSS3: 7.8
fstec
около 2 месяцев назад

Уязвимость пакета программ Microsoft Office, связанная с использованием ненадежных входных данных при принятии решений по безопасности, позволяющая нарушителю обойти существующие ограничения безопасности

EPSS

Процентиль: 91%
0.06264
Низкий

7.8 High

CVSS3