CVE-2026-26109
Published: 10 March 2026
Summary
CVE-2026-26109 is a high-severity Out-of-bounds Read (CWE-125) vulnerability in Microsoft Office Long Term Servicing Channel. Its CVSS base score is 8.4 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Client Execution (T1203); ranked at the 6.6th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-2 (Flaw Remediation) and SI-16 (Memory Protection).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly remediates the out-of-bounds read vulnerability in Microsoft Office Excel through timely flaw remediation and patching as referenced in the MSRC update guide.
Implements memory protections such as ASLR and DEP to mitigate arbitrary code execution resulting from the out-of-bounds read in Excel.
Deploys malicious code protection mechanisms at endpoints to scan and block malformed Excel files exploiting this vulnerability.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Out-of-bounds read in Excel enabling arbitrary code execution via malformed files directly maps to exploitation of a client application for code execution (T1203).
NVD Description
Out-of-bounds read in Microsoft Office Excel allows an unauthorized attacker to execute code locally.
Deeper analysisAI
CVE-2026-26109 is an out-of-bounds read vulnerability (CWE-125) affecting Microsoft Office Excel. Published on 2026-03-10, it carries a CVSS v3.1 base score of 8.4 (AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). The issue enables an unauthorized attacker to execute code locally through malformed Excel files.
An attacker requires only local access to the target system, with low attack complexity, no privileges, and no user interaction. Exploitation leads to arbitrary code execution, granting high impacts on confidentiality, integrity, and availability.
Microsoft's Security Response Center has published an update guide at https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26109, which provides details on mitigation and patching.
Details
- CWE(s)