CVE-2026-21509 is a Microsoft Office security vulnerability that has been confirmed as actively exploited in the wild. The vulnerability affects modern Click-to-Run Office installations, including Office 2021 and Office 2024 (LTSC servicing). Because Office uses build-based servicing, administrators will not find a traditional “patch download,” making verification and remediation unclear if the update model is not fully understood.
This article explains what CVE-2026-21509 is, which Office versions are affected, and exactly what administrators must do to confirm remediation.
For CVE visit: Microsoft Official Advisory Page
Explore more in Office 365 Section
Table of Contents
CVE-2026-21509 Overview
- Vulnerability type: Security feature bypass
- Affected product: Microsoft Office (Click-to-Run)
- Exploitation status: Actively exploited
- Attack vector: Malicious Office documents (commonly RTF-based)
- Impact: Arbitrary code execution leading to malware installation, persistence, and potential lateral movement
Attackers use crafted documents to bypass Office security controls and execute malicious payloads when users open the file. Because exploitation occurs at the document level, user interaction (opening the file) is typically required.
Affected Office Versions
The following Office versions are affected if they are not updated to a remediated build:
- Office 2021 (Perpetual, Click-to-Run)
- Office 2024 (Perpetual)
- Includes Office Standard 2024
- Includes Office Professional 2024
- Serviced under Office LTSC 2024
Important clarification:
Office 2024 “Suite” products are serviced using the LTSC 2024 update channel.
Security guidance referencing Office LTSC 2024 applies fully to Office 2024 suites.
How the Fix Is Delivered (Critical to Understand)
Microsoft did not release a standalone patch file for CVE-2026-21509.
Instead:
- The fix is included in a new Office Click-to-Run build
- The build is delivered via Microsoft Update
- Installation occurs automatically if updates are allowed
- There is no download button, no KB installer, and no Intune deployment
This is expected behavior for modern Office versions.
Required Admin Actions (Authoritative)
1. Ensure Office Updates Are Allowed
For environments managed with Microsoft Intune or Windows Autopatch, the following must be true:
Intune Admin Center
Devices → Windows → Update rings (or Autopatch-managed rings)
- Receive updates for other Microsoft products = Enabled
- Quality updates are not paused
Without this setting, Office will not receive CVE fixes, even if “Automatic updates” is enabled inside Office apps.
2. Allow Time for Update Propagation
If you use Windows Autopatch:
- Update timing is controlled by Autopatch rings
- Office updates follow the same managed rollout
- No manual approval is required
Autopatch does not block Office security fixes unless updates are paused.
3. Verify Remediation by Office Build Number (Mandatory)
Because there is no patch file, verification must be build-based.
On any test device:
- Open Word
- Go to File → Account
- Record:
- Version
- Build number
Compare the installed build with the latest build listed in Microsoft’s update history for:
- Office 2021 (Click-to-Run), or
- Office LTSC 2024
If the installed build is equal to or newer than the latest listed build, CVE-2026-21509 is remediated on that device.
This is the only supported validation method.
Temporary Risk Mitigations (If Patching Is Delayed)
If patch deployment cannot be completed immediately, consider temporary mitigations:
- Restrict or block RTF file handling where possible
- Enforce stricter macro policies
- Increase monitoring for Office child processes (WINWORD.EXE spawning unexpected executables)
- Reinforce user awareness around suspicious attachments
These mitigations do not replace patching and should be removed once updates are confirmed.
Common Misconceptions (That Lead to False Risk)
- “We don’t see a patch, so it’s not installed” — incorrect
- “We don’t use LTSC” — Office 2024 uses LTSC servicing
- “Autopatch replaces Windows Update” — Autopatch is Windows Update for Business
- “Intune should show the CVE” — Intune does not display Office CVEs
Understanding these points prevents unnecessary escalations and audit failures.
Security and Operational Impact
If left unpatched, CVE-2026-21509 can allow:
- Initial access via phishing
- Execution of malicious loaders
- Credential theft
- Long-term persistence
Because Office is widely deployed, exploitation can scale quickly across environments with inconsistent patch validation.
Admin Checklist for CVE-2026-21509
- Confirm Office 2021 / 2024 is in scope
- Verify Microsoft Update is enabled via Intune or Autopatch
- Ensure quality updates are not paused
- Validate Office Version + Build number on sample devices
- Record build evidence for security or audit teams
Conclusion
CVE-2026-21509 is a serious Office vulnerability, but remediation is straightforward once the Click-to-Run servicing model is understood. There is no patch to download and no CVE package to deploy. Protection is achieved by ensuring Office updates are allowed and confirming that devices are running a remediated Office build.
If the build is current, the CVE is fixed, even if nothing appeared to install.
[wpcode id=”1680″]



