Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
VoidStealer Malware Bypasses Chrome Encryption Chrome’s App-Bound
May 19, 2026
Nx Console VS Code Extension Compromised: Steal Secrets
May 19, 2026
Critical Marimo Flaw Allows Remote Code Execution Attacks
May 19, 2026
Home/CyberSecurity News/Microsoft Word 0-Day Vulnerability Actively Exploited
CyberSecurity News

Microsoft Word 0-Day Vulnerability Actively Exploited

On February 10, 2026, a critical zero-day vulnerability in Microsoft Word, identified as CVE-2026-21514, was disclosed. Attackers can exploit this flaw to bypass essential security protections. This...

Marcus Rodriguez
Marcus Rodriguez
February 11, 2026 2 Min Read
6 0

On February 10, 2026, a critical zero-day vulnerability in Microsoft Word, identified as CVE-2026-21514, was disclosed. Attackers can exploit this flaw to bypass essential security protections.

This flaw has been actively exploited in the wild and carries a CVSS 3.1 base score of 7.8, with a temporal score of 7.2.

CVE-2026-21514 exploits a weakness in how Microsoft Word handles security decisions based on untrusted inputs, categorized as CWE-807.

The vulnerability specifically bypasses Object Linking and Embedding (OLE) mitigations implemented by Microsoft to protect users from malicious COM/OLE controls.

These OLE controls enable documents to embed and interact with external objects. However, improper validation allows attackers to circumvent protective measures.

Metric Detail
CVE ID CVE-2026-21514 ​
Vulnerability Type Security Feature Bypass
Max Severity Important
Weakness CWE-807: Reliance on Untrusted Inputs in a Security Decision ​
CVSS v3.1 Score 7.8 ​
Vector String CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C

Attack Vector and Exploitation Mechanics

The attack vector is classified as “Local” (AV:L) with low attack complexity (AC:L), requiring no privileges (PR: N) but necessitating user interaction (UI: R).

Attackers must craft a specially designed Office document and convince victims to open it through phishing emails or other social engineering methods.

The exploit scope is unchanged (S: U), meaning the vulnerable component doesn’t affect resources beyond its security scope.

Unlike traditional macro-based attacks that trigger security warnings, CVE-2026-21514 bypasses these protections entirely.

When users open malicious documents, the exploit executes without displaying “Enable Content” prompts or Protected View warnings that typically alert users to potential threats.

The exploit code maturity is rated as “Functional” (E: F), indicating working exploit code exists and has been deployed in real-world attacks.

The vulnerability affects multiple Office versions, including Microsoft 365 Apps for Enterprise (32-bit and 64-bit), Office LTSC 2021 and 2024 editions, and Office LTSC for Mac 2021 and 2024.

Microsoft released official fixes through Click-to-Run updates for Windows versions and version 16.106.26020821 for Mac systems.​

CISA mandated federal agencies patch this vulnerability by March 3, 2026, reflecting its severity.

Organizations should immediately deploy available security updates, implement email filtering to block suspicious Office documents, and educate users about opening unsolicited attachments.

Consider restricting OLE object execution through Group Policy settings until patches are applied.

Security researchers from Google Threat Intelligence Group and Microsoft’s internal security teams collaborated to identify and remediate this threat.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackCVEExploitPatchphishingSecurityThreatVulnerabilityzero-day

Share Article

Marcus Rodriguez

Marcus Rodriguez

Marcus is a security researcher and investigative journalist with expertise in vulnerability research, bug bounties, and cloud security. Since 2017, Marcus has been breaking stories on critical vulnerabilities affecting major platforms. His investigative work has led to the disclosure of numerous security flaws and improved defenses across the industry. Marcus is an active participant in bug bounty programs and has been recognized for responsible disclosure practices. He holds multiple security certifications and regularly speaks at industry events.

Previous Post

Cephalus Ransomware: New Go Double- Emerges Go-Based

Next Post

Desktop Window Manager 0-Day Allows Privilege Elevation

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Hackers Compromise @antv npm Packages via Mini Shai-Hulud
May 19, 2026
CISA Exposes AWS GovCloud Credentials on Public Admin GitHub
May 19, 2026
Hackers Abuse Entra ID to Exfiltrate Microsoft Accounts Azure
May 19, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Jennifer sherman
Jennifer sherman
Sarah simpson
Sarah simpson
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us