Microsoft has identified a critical remote code execution vulnerability affecting multiple Windows products. Organizations must apply security updates immediately to prevent potential exploitation.
Microsoft has issued a critical security alert for CVE-2026-21712, a vulnerability that allows remote code execution on affected systems. Attackers can exploit this vulnerability by tricking users into opening specially crafted image files.
The vulnerability affects multiple Microsoft products including Windows 10, Windows 11, Windows Server 2019, Windows Server 2022, Microsoft Office 2021, and Microsoft 365 Apps for Enterprise. All affected systems are vulnerable to remote attacks without user authentication.
"This is a critical vulnerability with a CVSS score of 8.8," stated Microsoft in their Security Update Guide. "We strongly recommend all customers apply the updates as soon as possible."
Affected Products:
- Windows 10 Version 21H2 and later
- Windows 11 Version 22H2 and later
- Windows Server 2022
- Windows Server 2019
- Microsoft Office 2021
- Microsoft 365 Apps for Enterprise
Mitigation Steps:
- Apply security updates immediately through Windows Update or Microsoft Update
- For systems that cannot be patched immediately, implement registry changes recommended by Microsoft
- Block access to untrusted image files in email attachments and web content
- Deploy the Enhanced Mitigation Experience Toolkit (EMET) for additional protection
The security updates are available through Windows Update and can be manually downloaded from the Microsoft Security Response Center website. Organizations using Microsoft Endpoint Configuration Manager can deploy the updates through existing infrastructure.
Microsoft discovered the vulnerability during internal security testing and has no evidence of active exploitation. The updates are being released as part of the monthly Patch Tuesday cycle.
For more information about this vulnerability and the available updates, visit the official Microsoft Security Update Guide at https://portal.msrc.microsoft.com/.
Comments
Please log in or register to join the discussion