EUVD-2026-22615

| CVE-2026-33095 HIGH
2026-04-14 microsoft
7.8
CVSS 3.1
Temporal: 6.8
Share

CVSS VectorNVD

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Attack Vector
Local
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

1
Analysis Generated
Apr 14, 2026 - 19:23 vuln.today

DescriptionNVD

Use after free in Microsoft Office Word allows an unauthorized attacker to execute code locally.

AnalysisAI

Use-after-free memory corruption in Microsoft Office Word enables local code execution with high privileges when victims open malicious documents. Affects Microsoft 365 Apps for Enterprise and Office LTSC 2021/2024 for Windows and Mac (versions below 16.108.26041219 for Mac; click-to-run editions require latest security updates). …

Sign in for full analysis, threat intelligence, and remediation guidance.

RemediationAI

Within 24 hours: Identify all systems running Microsoft 365 Apps for Enterprise, Office LTSC 2021, or Office LTSC 2024 (Windows and macOS) and verify current versions against patch baseline. Within 7 days: Deploy Microsoft Office security updates to all affected systems, ensuring macOS deployments reach version 16.108.26041219 or later and Windows click-to-run editions receive latest security updates per Microsoft advisory. …

Sign in for detailed remediation steps.

Share

EUVD-2026-22615 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy