#Vulnerabilities

Critical Microsoft Vulnerability CVE-2026-32792 Allows Remote Code Execution

Vulnerabilities Reporter
1 min read

Microsoft has addressed a critical remote code execution vulnerability in multiple products. Organizations must apply patches immediately to prevent exploitation.

Microsoft has released security updates to address a critical vulnerability affecting multiple products. CVE-2026-32792 allows an attacker to execute arbitrary code with elevated privileges on vulnerable systems. This vulnerability carries a CVSS score of 9.8 and is actively being exploited in the wild.

The vulnerability exists in how Microsoft Windows handles objects in memory. An attacker who successfully exploits this vulnerability could take control of the affected system. Users whose accounts are configured to have fewer user rights could be less impacted than users who operate with administrative user rights.

Affected Products:

  • Windows 10 Version 1809 and later
  • Windows 11 Version 22H2 and later
  • Windows Server 2019 and later
  • Microsoft Office 2019 and Microsoft 365 Apps

Microsoft has released security updates to address this vulnerability. Organizations should apply these updates immediately. For systems that cannot be patched immediately, Microsoft has provided guidance on mitigating factors that could reduce the likelihood of exploitation.

To protect against this vulnerability:

  1. Apply the latest security updates immediately
  2. Enable Enhanced Mitigation Experience Toolkit (EMET)
  3. Restrict access to affected systems
  4. Implement network segmentation
  5. Monitor for suspicious activity

Microsoft has classified this update as "Critical" for all affected products. The updates were released as part of the December 2025 Security Updates. For detailed information about the specific updates for each product, refer to the Microsoft Security Update Guide.

Organizations should also review the Microsoft Security Response Center blog for additional information about this vulnerability and any emerging threats related to it.

The Cybersecurity and Infrastructure Security Agency (CISA) has added this vulnerability to its Known Exploited Vulnerabilities Catalog, requiring federal civilian agencies to address it by December 15, 2025. Other organizations are strongly encouraged to prioritize this update as well.

Comments

Loading comments...