CVE-2026-26113
Published: 10 March 2026
Summary
CVE-2026-26113 is a high-severity Untrusted Pointer Dereference (CWE-822) vulnerability in Microsoft Office Long Term Servicing Channel. Its CVSS base score is 8.4 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Privilege Escalation (T1068); ranked at the 6.6th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-16 (Memory Protection) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly remediates the untrusted pointer dereference vulnerability through timely patching of the affected Microsoft Office software.
Implements memory protection mechanisms like ASLR and DEP to prevent arbitrary code execution from untrusted pointer dereferences in Microsoft Office.
Deploys malicious code protection that can block or detect exploitation attempts targeting the pointer dereference flaw in Microsoft Office.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Local untrusted pointer dereference in Microsoft Office with no privileges or user interaction required directly enables arbitrary code execution, mapping to Exploitation for Privilege Escalation (T1068) and Exploitation for Client Execution (T1203).
NVD Description
Untrusted pointer dereference in Microsoft Office allows an unauthorized attacker to execute code locally.
Deeper analysisAI
CVE-2026-26113 is an untrusted pointer dereference vulnerability (CWE-822) affecting Microsoft Office. Published on 2026-03-10, it has a CVSS v3.1 base score of 8.4 (AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) and enables an unauthorized attacker to execute code locally.
An unauthorized local attacker can exploit this vulnerability with low attack complexity, requiring no privileges or user interaction. Successful exploitation grants the attacker the ability to execute arbitrary code on the affected system, with high impacts to confidentiality, integrity, and availability.
The Microsoft Security Response Center update guide at https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26113 provides details on associated patches and mitigations.
Details
- CWE(s)