Description
Use after free in Microsoft Office allows an unauthorized attacker to execute code locally.
Published: 2026-01-13
Score: 8.4 High
EPSS: < 1% Very Low
KEV: No
Impact: Local Code Execution
Action: Immediate Patch
AI Analysis

Impact

An attacker can exploit a use‑after‑free bug in Microsoft Office (CWE-416) that allows the execution of arbitrary code on the device where a malicious file is opened. The flaw arises when Office incorrectly reuses a freed memory pointer, creating an opportunity for injected code to run with the privileges of the current user. This vulnerability directly threatens data confidentiality, integrity, and availability by enabling local privilege escalation or denial of service if a user opens a crafted Office document.

Affected Systems

Microsoft 365 Apps for Enterprise, Microsoft Office 2016, 2019, Office LTSC 2021, Office LTSC 2024, Office LTSC for Mac 2021, Office LTSC for Mac 2024, and their corresponding long‑term servicing channel releases for Windows and macOS. These versions are impacted until the vendor releases remediation updates.

Risk and Exploitability

The CVSS score of 8.4 reflects a high‑severity local function impact. EPSS indicates a very low likelihood of exploitation at the time of assessment, and the vulnerability has not been listed in CISA’s Known Exploited Vulnerabilities catalog. Based on the description, the attack vector is inferred to be the opening of a malicious Office file by an authorized user; an attacker would need local access to the target machine or convince the user to execute the file. The risk is therefore significant for environments where untrusted documents are common but may be mitigated by leveraging corporate update and isolation policies.

Generated by OpenCVE AI on April 16, 2026 at 18:09 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Install the latest Microsoft Office security updates for all affected products as soon as they are available.
  • Ensure that Microsoft Office auto‑update is enabled and enforced across all devices to reduce the window of exposure.
  • When opening documents from external sources, use Office Application Guard or run Office in a sandboxed container to isolate execution of potentially malicious code.

Generated by OpenCVE AI on April 16, 2026 at 18:09 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 14 Jan 2026 20:00:00 +0000

Type Values Removed Values Added
First Time appeared Microsoft office
Microsoft office Long Term Servicing Channel
CPEs cpe:2.3:a:microsoft:365_apps:-:*:*:*:enterprise:*:x64:*
cpe:2.3:a:microsoft:365_apps:-:*:*:*:enterprise:*:x86:*
cpe:2.3:a:microsoft:office:2016:*:*:*:*:*:x64:*
cpe:2.3:a:microsoft:office:2016:*:*:*:*:*:x86:*
cpe:2.3:a:microsoft:office:2019:*:*:*:*:*:x64:*
cpe:2.3:a:microsoft:office:2019:*:*:*:*:*:x86:*
cpe:2.3:a:microsoft:office_long_term_servicing_channel:2021:*:*:*:*:-:x64:*
cpe:2.3:a:microsoft:office_long_term_servicing_channel:2021:*:*:*:*:-:x86:*
cpe:2.3:a:microsoft:office_long_term_servicing_channel:2021:*:*:*:*:macos:*:*
cpe:2.3:a:microsoft:office_long_term_servicing_channel:2024:*:*:*:*:-:x64:*
cpe:2.3:a:microsoft:office_long_term_servicing_channel:2024:*:*:*:*:-:x86:*
cpe:2.3:a:microsoft:office_long_term_servicing_channel:2024:*:*:*:*:macos:*:*
Vendors & Products Microsoft office
Microsoft office Long Term Servicing Channel

Tue, 13 Jan 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 13 Jan 2026 18:15:00 +0000

Type Values Removed Values Added
Description Use after free in Microsoft Office allows an unauthorized attacker to execute code locally.
Title Microsoft Office Remote Code Execution Vulnerability
First Time appeared Microsoft
Microsoft 365 Apps
Microsoft office 2016
Microsoft office 2019
Microsoft office 2021
Microsoft office 2024
Microsoft office Macos 2021
Microsoft office Macos 2024
Weaknesses CWE-416
CPEs cpe:2.3:a:microsoft:365_apps:*:*:*:*:enterprise:*:*:*
cpe:2.3:a:microsoft:office_2016:*:*:*:*:*:*:x86:*
cpe:2.3:a:microsoft:office_2019:*:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:office_2021:*:*:*:*:long_term_servicing_channel:*:*:*
cpe:2.3:a:microsoft:office_2024:*:*:*:*:long_term_servicing_channel:*:*:*
cpe:2.3:a:microsoft:office_macos_2021:*:*:*:*:*:long_term_servicing_channel:*:*
cpe:2.3:a:microsoft:office_macos_2024:*:*:*:*:*:long_term_servicing_channel:*:*
Vendors & Products Microsoft
Microsoft 365 Apps
Microsoft office 2016
Microsoft office 2019
Microsoft office 2021
Microsoft office 2024
Microsoft office Macos 2021
Microsoft office Macos 2024
References
Metrics cvssV3_1

{'score': 8.4, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C'}


Subscriptions

Microsoft 365 Apps Office Office 2016 Office 2019 Office 2021 Office 2024 Office Long Term Servicing Channel Office Macos 2021 Office Macos 2024
cve-icon MITRE

Status: PUBLISHED

Assigner: microsoft

Published:

Updated: 2026-04-01T13:49:18.715Z

Reserved: 2025-12-04T20:04:16.339Z

Link: CVE-2026-20952

cve-icon Vulnrichment

Updated: 2026-01-13T18:38:09.015Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-13T18:16:22.990

Modified: 2026-01-14T19:55:31.127

Link: CVE-2026-20952

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T18:15:43Z

Weaknesses