Description
Integer underflow (wrap or wraparound) in Microsoft Office Excel allows an unauthorized attacker to execute code locally.
Published: 2026-01-13
Score: 7.8 High
EPSS: < 1% Very Low
KEV: No
Impact: Local code execution
Action: Apply patch
AI Analysis

Impact

A flaw in Microsoft Excel causes an integer underflow when processing worksheet data, creating an overflow condition that allows an attacker to execute arbitrary code on the host machine. This vulnerability is exploitable through a crafted Excel workbook that a user opens or imports. The resulting code runs with the privileges of the user who opens the file, granting the attacker the ability to manipulate files, install malware, or otherwise disrupt system operations. The weakness is classified as a heap‑based buffer overflow (CWE‑122) and an integer underflow (CWE‑191).

Affected Systems

Microsoft identifies affected products in its Office suite, including Microsoft 365 Apps for Enterprise, Excel 2016, Office 2019, Office LTSC 2021 and LTSC 2024 for Windows and macOS, and the Office Online Server. The vulnerability applies to all supported 32‑bit and 64‑bit builds of these products, as indicated by the CPE list. No specific version numbers are listed, so all active releases of the mentioned Office versions are potentially impacted.

Risk and Exploitability

The CVSS score of 7.8 places this issue in the High severity range, though the EPSS score is below 1%, indicating a low predicted exploitation frequency. The vulnerability is not listed in CISA’s KEV catalog, suggesting no known large‑scale exploitation. If an attacker can deliver a malicious workbook to a user—an indication that the attack vector is likely through social engineering or compromised email attachments—the local code execution can proceed with the victim’s user rights. The overall risk is moderate to high for organizations that allow users to open untrusted Excel files.

Generated by OpenCVE AI on April 16, 2026 at 18:09 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Install the latest security updates for Microsoft Office as provided by the Microsoft Security Response Center or via Windows Update
  • Configure Office settings to block or restrict execution of untrusted content: enable Protected View for all files and disable macros unless signed
  • Deploy email filtering and endpoint protection to detect and block malicious Excel workbooks; consider implementing a least privilege model so that users run Office with minimum rights

Generated by OpenCVE AI on April 16, 2026 at 18:09 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 14 Jan 2026 20:00:00 +0000

Type Values Removed Values Added
First Time appeared Microsoft excel
Microsoft office
Microsoft office Long Term Servicing Channel
Microsoft office Online Server
CPEs cpe:2.3:a:microsoft:365_apps:-:*:*:*:enterprise:*:x64:*
cpe:2.3:a:microsoft:365_apps:-:*:*:*:enterprise:*:x86:*
cpe:2.3:a:microsoft:excel:2016:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:office:2019:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:office_long_term_servicing_channel:2021:*:*:*:*:-:x64:*
cpe:2.3:a:microsoft:office_long_term_servicing_channel:2021:*:*:*:*:-:x86:*
cpe:2.3:a:microsoft:office_long_term_servicing_channel:2021:*:*:*:*:macos:*:*
cpe:2.3:a:microsoft:office_long_term_servicing_channel:2024:*:*:*:*:-:x64:*
cpe:2.3:a:microsoft:office_long_term_servicing_channel:2024:*:*:*:*:-:x86:*
cpe:2.3:a:microsoft:office_long_term_servicing_channel:2024:*:*:*:*:macos:*:*
cpe:2.3:a:microsoft:office_online_server:*:*:*:*:*:*:*:*
Vendors & Products Microsoft excel
Microsoft office
Microsoft office Long Term Servicing Channel
Microsoft office Online Server

Tue, 13 Jan 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 13 Jan 2026 18:15:00 +0000

Type Values Removed Values Added
Description Integer underflow (wrap or wraparound) in Microsoft Office Excel allows an unauthorized attacker to execute code locally.
Title Microsoft Excel Remote Code Execution Vulnerability
First Time appeared Microsoft
Microsoft 365 Apps
Microsoft excel 2016
Microsoft office 2019
Microsoft office 2021
Microsoft office 2024
Microsoft office Macos 2021
Microsoft office Macos 2024
Weaknesses CWE-122
CWE-191
CPEs cpe:2.3:a:microsoft:365_apps:*:*:*:*:enterprise:*:*:*
cpe:2.3:a:microsoft:excel_2016:*:*:*:*:*:*:x86:*
cpe:2.3:a:microsoft:office_2019:*:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:office_2021:*:*:*:*:long_term_servicing_channel:*:*:*
cpe:2.3:a:microsoft:office_2021:*:*:*:*:ltsc:*:*:*
cpe:2.3:a:microsoft:office_2024:*:*:*:*:long_term_servicing_channel:*:*:*
cpe:2.3:a:microsoft:office_macos_2021:*:*:*:*:*:long_term_servicing_channel:*:*
cpe:2.3:a:microsoft:office_macos_2024:*:*:*:*:*:long_term_servicing_channel:*:*
Vendors & Products Microsoft
Microsoft 365 Apps
Microsoft excel 2016
Microsoft office 2019
Microsoft office 2021
Microsoft office 2024
Microsoft office Macos 2021
Microsoft office Macos 2024
References
Metrics cvssV3_1

{'score': 7.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C'}


Subscriptions

Microsoft 365 Apps Excel Excel 2016 Office Office 2019 Office 2021 Office 2024 Office Long Term Servicing Channel Office Macos 2021 Office Macos 2024 Office Online Server
cve-icon MITRE

Status: PUBLISHED

Assigner: microsoft

Published:

Updated: 2026-04-01T13:49:19.343Z

Reserved: 2025-12-04T20:04:16.340Z

Link: CVE-2026-20957

cve-icon Vulnrichment

Updated: 2026-01-13T18:34:12.595Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-13T18:16:23.627

Modified: 2026-01-14T19:47:43.980

Link: CVE-2026-20957

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T18:15:43Z

Weaknesses