Microsoft released an out-of-band emergency patch on January 26, 2026, for CVE-2026-21509, a security feature bypass in Microsoft Office that’s being actively exploited in the wild. Russia-linked threat actor APT28 (UAC-0001) has been observed using the vulnerability against targets in Ukraine and the European Union.

Vulnerability overview

AttributeValue
CVECVE-2026-21509
CVSS score7.8 (High)
TypeSecurity Feature Bypass
Attack vectorLocal (requires user interaction)
Exploit statusActively exploited
CISA KEV addedJanuary 27, 2026
Federal remediation deadlineFebruary 16, 2026

Technical details

CVE-2026-21509 stems from Microsoft Office’s reliance on untrusted inputs in security decisions. The flaw allows attackers to bypass OLE (Object Linking and Embedding) mitigations, exposing users to vulnerable legacy COM/OLE controls that are normally blocked.

Root cause

ElementDescription
Vulnerability classReliance on untrusted inputs in security decision
Bypass targetOLE mitigations in Microsoft 365 and Office
Exposed componentsLegacy COM/OLE controls
User interactionRequired (must open malicious document)

In practical terms, malicious documents can execute code through COM/OLE components that should have been blocked by Office’s security controls.

APT28 exploitation campaign

According to CERT-UA, the activity is being driven by UAC-0001, better known as APT28, Fancy Bear, or Sofacy—the Russian military intelligence (GRU) unit.

Campaign details

AttributeDetails
AttributionAPT28 / UAC-0001 / Fancy Bear (GRU)
Targets60+ email addresses at Ukrainian central executive authorities
RegionsUkraine, EU member states
Lure document”Consultation_Topics_Ukraine(Final).doc”
ThemeEU discussions on Ukraine

Attack timeline

DateEvent
January 26, 2026Microsoft publishes CVE-2026-21509 details
January 27, 2026Lure document created (per file metadata)
January 29, 2026Document appears publicly
OngoingActive exploitation continues

The one-day turnaround from vulnerability disclosure to weaponized lure document suggests the exploit chain was already prepared and waiting.

Attack chain

According to CERT-UA’s investigation:

PhaseAction
1Victim opens malicious Word document
2Document establishes network connection via WebDAV protocol
3External resource downloads shortcut file containing program code
4Code downloads and executes payload
5COVENANT Grunt implant deployed

Payload details

ComponentDescription
FrameworkCOVENANT (open-source .NET C2)
ImplantGrunt
CapabilitiesFull command-and-control access

Attack chain variants

Zscaler ThreatLabz documented two distinct attack chain variants in Operation Neusploit:

Variant 1: MiniDoor (Email theft)

PhaseAction
1RTF document exploits CVE-2026-21509
2Dropper DLL downloaded via WebDAV
3MiniDoor VBA project installed in Outlook
4Emails automatically forwarded to attacker

MiniDoor installs a malicious Outlook VBA project that monitors the MAPILogonComplete event and forwards emails from Inbox, Drafts, Junk, and RssFeeds folders to attacker-controlled addresses.

Variant 2: PixyNetLoader (Full C2)

PhaseAction
1RTF document exploits CVE-2026-21509
2PixyNetLoader dropper deployed
3COM hijacking + scheduled tasks for persistence
4PNG steganography extracts shellcode
5Covenant Grunt implant runs in memory

The PixyNetLoader chain uses LSB steganography to hide shellcode within PNG image files, extracting and executing the payload entirely in memory to evade disk-based detection.

Evasion techniques

TechniquePurpose
Server-side geofencingOnly delivers payload to targeted regions
User-Agent validationRejects requests without expected headers
PNG steganographyHides shellcode in image pixels
In-memory executionAvoids disk artifacts
Legitimate cloud C2Uses filen.io API for command traffic

APT28 history with Office exploits

APT28 has a documented history of weaponizing Office vulnerabilities for initial access:

VulnerabilityYearTechnique
CVE-2022-30190 (Follina)2022MSDT protocol handler abuse
Various macro attacks2015-2022VBA-based payloads
CVE-2017-01992017OLE/RTF exploitation
CVE-2026-215092026OLE mitigation bypass

Affected products

ProductStatus
Microsoft Office 2016Vulnerable (manual patch required)
Microsoft Office 2019Vulnerable (manual patch required)
Microsoft Office LTSC 2021Vulnerable (service-side fix available)
Microsoft Office LTSC 2024Vulnerable (service-side fix available)
Microsoft 365 Apps for EnterpriseVulnerable (service-side fix available)

Patch availability

Office 2021 and later (including Microsoft 365)

ActionDetails
Fix typeService-side deployment
RequirementRestart Office applications
AutomaticYes, after restart

Office 2016 and 2019

OptionDetails
Windows UpdateSecurity update available
Microsoft Update CatalogManual download available
Registry workaroundBlock vulnerable COM/OLE controls manually

CISA response

CISA added CVE-2026-21509 to the Known Exploited Vulnerabilities (KEV) catalog on January 27, 2026.

RequirementDeadline
FCEB agency remediationFebruary 16, 2026
Private sectorRecommended to follow same timeline

Mitigations and detection

Immediate mitigations

PriorityAction
CriticalApply the patch through Windows Update or manual download
HighEnable Protected View (default setting)
HighVerify Microsoft Defender is updated with latest signatures
MediumReview macro and OLE security settings
OngoingUser awareness training on suspicious documents

Detection indicators

IndicatorDetection method
Office spawning unusual child processesEDR/process monitoring
Legacy COM/OLE component executionApplication control logs
WebDAV connections from OfficeNetwork monitoring
COVENANT/Grunt C2 trafficNetwork/EDR signatures

Defender coverage

Microsoft Defender has detections in place for known CVE-2026-21509 exploitation patterns. Major EDR platforms should also have updated signatures.

Historical context

OLE and COM have been persistent security headaches for Microsoft Office. These technologies enable powerful document functionality but also provide attack surface that threat actors regularly exploit.

OLE/COM vulnerability timeline

YearNotable issues
2017CVE-2017-0199 OLE exploitation wave
2021Multiple OLE-based attack campaigns
2022Follina (MSDT via OLE)
2026CVE-2026-21509 mitigation bypass

Microsoft has implemented multiple layers of mitigations over the years, including:

  • Protected View for external documents
  • COM/OLE control blocking lists
  • Mark of the Web enforcement
  • Application Guard isolation

However, bypass vulnerabilities continue to emerge. The involvement of a state-sponsored actor like APT28 suggests this vulnerability may have been discovered independently or purchased, rather than being a widely-known issue before disclosure.

Recommendations

For organizations

PriorityAction
ImmediateDeploy patches across all Office installations
ImmediateVerify Protected View is enabled
HighHunt for IOCs associated with COVENANT/Grunt
HighReview logs for suspicious Office document activity
OngoingMonitor CERT-UA and Microsoft advisories

For security teams

FocusConsideration
Email filteringBlock documents with suspicious OLE objects
User trainingReinforce caution with external documents
EDR tuningEnsure detections for Office child process spawning
Network monitoringAlert on WebDAV connections from Office processes

For users

ActionReason
Be suspicious of unexpected documentsEspecially from external sources
Don’t disable Protected ViewProvides critical protection layer
Report suspicious documentsEnable security team investigation
Keep Office updatedEnsures latest protections

Registry workaround for Office 2016/2019

For organizations unable to immediately deploy the security update, Microsoft provides a registry-based mitigation:

StepAction
1Navigate to HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\Common\COM Compatibility
2Create subkey for vulnerable CLSID (per Microsoft advisory)
3Add DWORD value: Compatibility Flags = 0x400
4Repeat for each vulnerable COM control

Note: This workaround blocks specific COM/OLE controls and may impact legitimate functionality. Test thoroughly before deployment.

Alternative tracking names

Different security vendors track this campaign under various names:

VendorCampaign/Threat Name
ZscalerOperation Neusploit
Broadcom/SymantecSwallowtail
CERT-UAUAC-0001
MicrosoftForest Blizzard

The rapid weaponization of CVE-2026-21509 by APT28 demonstrates the importance of prompt patching. Organizations in Ukraine and EU member states should treat this as an elevated priority given the targeted nature of observed campaigns.

The combination of two attack variants—one focused on email theft (MiniDoor) and one on full system access (PixyNetLoader/Covenant)—suggests APT28 tailors its post-exploitation based on target value and intelligence requirements.