Description
Untrusted pointer dereference in Microsoft Office allows an unauthorized attacker to execute code locally.
Published: 2026-03-10
Score: 8.4 High
EPSS: < 1% Very Low
KEV: No
Impact: Local Code Execution
Action: Patch Now
AI Analysis

Impact

Untrusted pointer dereference in Microsoft Office allows an attacker who can supply an untrusted file to execute arbitrary code in the context of the logged‑in user. The flaw arises when the application processes data that contains an untrusted pointer, resulting in an undefined pointer dereference. This leads to local code execution that can compromise confidentiality, integrity, and availability by permitting the attacker to read, modify or delete files, install malware, or otherwise take over the affected system. The vulnerability is identified as CWE‑822, a flaw involving pointer dereference of untrusted data.

Affected Systems

The vulnerability affects the following Microsoft products: Microsoft 365 Apps for Enterprise; Microsoft Office 2016, 2019, Office LTSC 2021, Office LTSC 2024, Office LTSC for Mac 2021, Office LTSC for Mac 2024; Microsoft SharePoint Enterprise Server 2016; Microsoft SharePoint Server 2016, 2019, and Subscription Edition. The CNA did not publish explicit version ranges, so any instance of the listed products is considered vulnerable unless an update has already been applied.

Risk and Exploitability

The CVSS score of 8.4 indicates high severity, while the EPSS score of <1% suggests a low probability of exploitation at present. The vulnerability is not listed in the CISA KEV catalog. Based on the description, the attack vector is inferred to require a local user to open a malicious Office document or to otherwise trigger the erroneous pointer dereference. No network‑based exploitation path is described, so the threat is confined to local users exposed to crafted files.

Generated by OpenCVE AI on March 17, 2026 at 00:36 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Verify whether your Microsoft Office or SharePoint installation is affected by reviewing the Microsoft Security Update Guide for CVE‑2026‑26113.
  • Download and install the official patch or update for the affected Office or SharePoint version as soon as it is available.
  • After applying the update, confirm that the vulnerability has been addressed by checking the application version or using the Microsoft update status page.
  • If an urgent patch cannot be applied, isolate the affected system from the network or restrict access to potentially malicious Office files (e.g., block .docx or .xlsx attachments in email or disable opening of Office files from untrusted sources).

Generated by OpenCVE AI on March 17, 2026 at 00:36 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 13 Mar 2026 17:15:00 +0000

Type Values Removed Values Added
First Time appeared Microsoft office
Microsoft office Long Term Servicing Channel
Weaknesses NVD-CWE-Other
CPEs cpe:2.3:a:microsoft:365_apps:-:*:*:*:enterprise:*:x64:*
cpe:2.3:a:microsoft:365_apps:-:*:*:*:enterprise:*:x86:*
cpe:2.3:a:microsoft:office:2016:*:*:*:*:*:x64:*
cpe:2.3:a:microsoft:office:2016:*:*:*:*:*:x86:*
cpe:2.3:a:microsoft:office:2019:*:*:*:*:*:x64:*
cpe:2.3:a:microsoft:office:2019:*:*:*:*:*:x86:*
cpe:2.3:a:microsoft:office_long_term_servicing_channel:2021:*:*:*:*:*:x64:*
cpe:2.3:a:microsoft:office_long_term_servicing_channel:2021:*:*:*:*:macos:*:*
cpe:2.3:a:microsoft:office_long_term_servicing_channel:2024:*:*:*:*:-:x64:*
cpe:2.3:a:microsoft:office_long_term_servicing_channel:2024:*:*:*:*:-:x86:*
cpe:2.3:a:microsoft:office_long_term_servicing_channel:2024:*:*:*:*:macos:*:*
cpe:2.3:a:microsoft:sharepoint_server:2016:*:*:*:enterprise:*:*:*
cpe:2.3:a:microsoft:sharepoint_server:2019:*:*:*:*:*:*:*
Vendors & Products Microsoft office
Microsoft office Long Term Servicing Channel

Wed, 11 Mar 2026 12:00:00 +0000

Type Values Removed Values Added
First Time appeared Microsoft microsoft 365 Apps For Enterprise
Microsoft sharepoint Server Subscription Edition
Vendors & Products Microsoft microsoft 365 Apps For Enterprise
Microsoft sharepoint Server Subscription Edition

Tue, 10 Mar 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 10 Mar 2026 17:30:00 +0000

Type Values Removed Values Added
Description Untrusted pointer dereference in Microsoft Office allows an unauthorized attacker to execute code locally.
Title Microsoft Office Remote Code Execution Vulnerability
First Time appeared Microsoft
Microsoft 365 Apps
Microsoft office 2016
Microsoft office 2019
Microsoft office 2021
Microsoft office 2024
Microsoft office Macos 2021
Microsoft office Macos 2024
Microsoft sharepoint Server
Microsoft sharepoint Server 2016
Microsoft sharepoint Server 2019
Weaknesses CWE-822
CPEs cpe:2.3:a:microsoft:365_apps:*:*:*:*:enterprise:*:*:*
cpe:2.3:a:microsoft:office_2016:*:*:*:*:*:*:x86:*
cpe:2.3:a:microsoft:office_2019:*:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:office_2021:*:*:*:*:long_term_servicing_channel:*:*:*
cpe:2.3:a:microsoft:office_2024:*:*:*:*:long_term_servicing_channel:*:*:*
cpe:2.3:a:microsoft:office_macos_2021:*:*:*:*:*:long_term_servicing_channel:*:*
cpe:2.3:a:microsoft:office_macos_2024:*:*:*:*:*:long_term_servicing_channel:*:*
cpe:2.3:a:microsoft:sharepoint_server:*:*:*:*:subscription:*:*:*
cpe:2.3:a:microsoft:sharepoint_server_2016:*:*:*:*:enterprise:*:*:*
cpe:2.3:a:microsoft:sharepoint_server_2019:*:*:*:*:*:*:*:*
Vendors & Products Microsoft
Microsoft 365 Apps
Microsoft office 2016
Microsoft office 2019
Microsoft office 2021
Microsoft office 2024
Microsoft office Macos 2021
Microsoft office Macos 2024
Microsoft sharepoint Server
Microsoft sharepoint Server 2016
Microsoft sharepoint Server 2019
References
Metrics cvssV3_1

{'score': 8.4, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C'}


Subscriptions

Microsoft 365 Apps Microsoft 365 Apps For Enterprise Office Office 2016 Office 2019 Office 2021 Office 2024 Office Long Term Servicing Channel Office Macos 2021 Office Macos 2024 Sharepoint Server Sharepoint Server 2016 Sharepoint Server 2019 Sharepoint Server Subscription Edition
cve-icon MITRE

Status: PUBLISHED

Assigner: microsoft

Published:

Updated: 2026-03-27T22:32:53.834Z

Reserved: 2026-02-11T15:52:13.910Z

Link: CVE-2026-26113

cve-icon Vulnrichment

Updated: 2026-03-10T18:39:50.957Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-10T18:18:40.177

Modified: 2026-03-13T17:08:02.900

Link: CVE-2026-26113

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-20T14:34:23Z

Weaknesses