Cyber Posture

CVE-2026-26110

High

Published: 10 March 2026

Published
10 March 2026
Modified
13 March 2026
KEV Added
Patch
CVSS Score 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0007 21.3th percentile
Risk Priority 17 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may exploit software vulnerabilities in client applications to execute code.

Security Summary

CVE-2026-26110 is a type confusion vulnerability (CWE-843), involving access of a resource using an incompatible type, affecting Microsoft Office. Published on 2026-03-10T18:18:39.480, it carries a CVSS v3.1 base score of 8.4 (AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating high severity due to its potential for significant impact.

The vulnerability can be exploited by an unauthorized local attacker with low complexity and no required privileges or user interaction. Successful exploitation allows the attacker to execute arbitrary code locally on the affected system, resulting in high impacts to confidentiality, integrity, and availability.

Mitigation details are available in the Microsoft Security Response Center advisory at https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26110.

Details

CWE(s)
CWE-843

Affected Products

microsoft
365 apps
all versions
microsoft
office
2016, 2019 · ≤ 16.0.19822.20000
microsoft
office long term servicing channel
2021, 2024

MITRE ATT&CK Enterprise Techniques

T1203 Exploitation for Client Execution Execution
Adversaries may exploit software vulnerabilities in client applications to execute code.
Why these techniques?

Type confusion vulnerability in Microsoft Office enables arbitrary code execution via client-side exploitation (T1203).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References