overview
CVE-2026-21514 is a security feature bypass vulnerability in Microsoft Word due to reliance on untrusted inputs in a security decision (CWE-807), allowing an unauthorized local attacker to bypass protections against dangerous COM/OLE controls by opening a specially crafted Word document.
Affected Products and Versions
Microsoft released security updates on February 10, 2026, to address this issue; apply the latest patches from the Microsoft Security Update Guide.
This vulnerability was publicly disclosed and actively exploited in the wild as a zero-day prior to patching, requiring user interaction to open a malicious Office document (preview pane not affected). Exploitation enables bypass leading to potential code execution via malicious COM/OLE controls, with credits to anonymous researchers, Google Threat Intelligence Group, Microsoft Threat Intelligence Center, MSRC, and Office Product Group Security Team; no specific industries or common techniques beyond document opening detailed.
CVSS Score: 7.8 (High).
CVSS Vector String: Not currently provided or confirmed in available sources.
KEV: Not listed in the CISA KEV catalog.
EPSS: Not provided or confirmed in the search results.
CWE: CWE-807 (Reliance on Untrusted Inputs in a Security Decision).
Compliance Impact (CVSS ≥ 7.0)
This vulnerability, a security feature bypass in Microsoft Word due to reliance on untrusted inputs allowing local unauthorized access, has compliance implications for systems handling sensitive data:
PCI DSS – Violates requirements 6.2 (timely vulnerability patching) and 7.2 (restrict access to privileged accounts), risking unauthorized access to cardholder data environments.
HIPAA – Impacts safeguards for ePHI confidentiality (45 CFR § 164.312), as bypassing security features could expose Protected Health Information via local attacks.
SOX – Affects internal controls over financial reporting (Section 404), potentially enabling integrity violations in document processing workflows.
ISO 27001 – Breaches A.9.4 (access control) and A.12.6 (technical vulnerability management) through inadequate input validation in security decisions.
NIST CSF – Impacts "Protect" (PR.AC-1: Identities and Access; PR.DS-5: Data Security) and "Identify" (ID.RA-5: Vulnerabilities) functions.
At this time, there are no known IOCs associated with successful exploitation of CVE-2026-21514. Avertium remains vigilant in locating IOCs for our customers and will disclose them as soon as possible.
For more information on how Avertium can help protect your organization, please reach out to your Avertium Service Delivery Manager or Account Executive.
Defense Evasion
T1562.001 - Impair Defenses: Disable or Modify Tools: The vulnerability allows bypassing Microsoft Word's security features by relying on untrusted inputs in security decisions, enabling attackers to evade local security mechanisms.
T1222 - File and Disk Permissions Modification: Exploitation could involve bypassing security restrictions locally to modify or access protected files in Word, evading document-level protections.
Execution
T1203 - Exploitation for Client Execution: Local exploitation of the security feature bypass in Microsoft Word enables execution of malicious content or payloads on the victim's system.
Initial Access
T1566.001 - Phishing: Spearphishing Attachment: Attackers commonly deliver malicious Word documents exploiting this CVE via phishing attachments to achieve initial local access.
Microsoft Security Solutions
Avertium's Microsoft Security Solutions provide configuration, deployment, and optimization of Microsoft security products like Defender XDR, Sentinel, Purview, Entra ID, and Intune, directly addressing vulnerabilities in Microsoft Word by enhancing endpoint protection, identity management, and data security to prevent local security feature bypass exploits.
Fusion MXDR
Fusion MXDR offers 24/7 managed extended detection and response through Cyber Fusion Centers, fusing threat intelligence, AI-driven analytics, and automated responses via Fusion Engine 2.0 to monitor Microsoft Office environments, detect unauthorized local access attempts, and disrupt attacks exploiting untrusted inputs in Word.
Security Information and Event Management (SIEM)
Avertium’s SIEM integration within managed XDR services delivers holistic visibility into IT environments, enabling real-time detection of anomalous behavior in Microsoft Word such as reliance on untrusted inputs, allowing security teams to investigate and respond before bypasses lead to compromise.
Cybersecurity Strategy Alignment
Avertium aligns cybersecurity strategy with business goals through assessments, threat mapping using MITRE ATT&CK, and cyber maturity roadmaps, including vulnerability assessments and secure configuration for Microsoft Office to mitigate local bypass risks via policy development, training, and resilience planning.
SUPPORTING DOCUMENTATION