Red Hot Cyber
Cybersecurity, Cybercrime News and Vulnerability Analysis
970x120 Enterprise 1

And let the phishing begin! Microsoft is taking action against a zero-day exploit already exploited in Office

27 January 2026 07:48

Once again, Microsoft was forced to quickly fix some flaws.

The company has released unscheduled patches for Microsoft Office, addressing a dangerous zero-day vulnerability that has already been exploited in cyberattacks. The issue, identified as CVE-2026-21509, affects several versions of the Office suite: Office 2016, Office 2019, Office LTSC 2021 and 2024, as well as Microsoft 365 Apps for Enterprise.

The vulnerability allows bypassing Office security mechanisms responsible for blocking malicious COM/OLE components.

The attack itself is fairly simple: the attacker simply needs to send the user a malicious document and convince them to open it. Human intervention is essential, but technically the whole thing seems incredibly simple.

The good news is that users of Office 2021 and later are already automatically protected: Microsoft has patched the vulnerability. However, the changes will only take effect after restarting Office applications.

However, owners of Office 2016 and 2019 will be out of luck: patches for these versions are not yet ready, and the company promises to release them “soon.”

To mitigate the risk , Microsoft has proposed a temporary solution : manual configuration via the Windows Registry. This measure seems complex, but essentially it boils down to adding a special compatibility flag to the vulnerable COM component.

After that, protection will be activated the next time you start Office. The company specifically emphasizes that it’s recommended to back up the registry before modifying it, otherwise you could cause even more serious problems than initially anticipated.

Microsoft did not disclose details about how the vulnerability was exploited or who discovered it.

However, the story fits well with the general pattern of January: as part of Patch Tuesday 2026, the company has already fixed 114 vulnerabilities, including another actively exploited zero-day, and also released several unscheduled updates for bugs in Windows and Outlook.

Follow us on Google News to receive daily updates on cybersecurity. Contact us if you would like to report news, insights or content for publication.

Pietro Melillo 300x300
Head of the Dark Lab group. A Computer Engineer specialised in Cyber Security with a deep passion for Hacking and technology, currently CISO of WURTH Italia, he was responsible for Cyber Threat Intelligence & Dark Web analysis services at IBM, carries out research and teaching activities on Cyber Threat Intelligence topics at the University of Sannio, as a Ph.D, author of scientific papers and development of tools to support cybersecurity activities. Leads the CTI Team "RHC DarkLab"
Areas of Expertise: Cyber Threat Intelligence, Ransomware, National Security, Training