CVE-2026-26134
HIGHCVSS Vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Lifecycle Timeline
2Description
Integer overflow or wraparound in Microsoft Office allows an authorized attacker to elevate privileges locally.
Analysis
Microsoft Office is vulnerable to an integer overflow that allows authenticated local users to escalate their privileges and gain full system control. An attacker with valid credentials can exploit this numeric calculation flaw to execute arbitrary code with elevated permissions. …
Sign in for full analysis, threat intelligence, and remediation guidance.
Remediation
Within 24 hours: Inventory all Microsoft Office deployments and identify users with administrative or sensitive data access. Within 7 days: Implement application whitelisting and restrict Office macro execution to trusted sources; disable unnecessary Office features (DDE, ActiveX) via Group Policy. …
Sign in for detailed remediation steps.
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today