Introduction
Microsoft has issued an out-of-band (OOB) update on January 10, 2026, addressing a zero-day vulnerability (CVE-2026-21509" rel="noreferrer noopener">CVE-2026-21509) in Microsoft Office. This critical security issue was rated as ‘Important’ and received a CVSS 3.1 score of 7.8, making it a high-priority concern for cybersecurity professionals.
Vulnerability Details
CVE-2026-21509 affects the security feature bypass vulnerability in Microsoft Office. The vulnerability is classified as ‘local,’ meaning it can only be exploited by an attacker with physical access to a system or through convincing a victim to open a malicious Office document.
Microsoft has added this vulnerability to the CISA Known Exploited Vulnerabilities (KEV) list, highlighting its potential for real-world exploitation. The company reports that this specific vulnerability cannot be triggered via the Preview Pane in Microsoft Office.
Mitigation and Updates
To address this vulnerability, Microsoft has released mitigation guidance along with three OOB updates. These updates are designed to resolve both the security flaw and operational issues encountered following their installation as part of standard Patch Tuesday.
Security Measures
Cisco Talos is responding to these disclosures by releasing a new SNORT ruleset that detects attempts to exploit this vulnerability. The current rule set includes Snort2 rules (65823-65830) and Snort3 rules (301384-301387). Additionally, ClamAV has released a signature to detect activity associated with CVE-2026-21509.
Impact and Recommendations
Users of Microsoft Office are advised to update their systems immediately to mitigate the risk of exploitation. Cisco Security Firewall customers should ensure their rulesets are up-to-date by updating their SRU, while open-source Snort Subscriber Ruleset customers can stay current by downloading the latest rule pack from Snort.org.



