Microsoft has released security updates to address a critical vulnerability affecting multiple products, including Windows, Office, and Azure services.
Microsoft Addresses Critical Vulnerability CVE-2026-26111 in Multiple Products
Microsoft has released critical security updates to address CVE-2026-26111, a vulnerability affecting multiple products. The vulnerability could allow remote code execution. Organizations must apply these updates immediately.
Impact Assessment
CVE-2026-26111 carries a CVSS score of 8.8, classified as High severity. Exploitation could allow an attacker to execute arbitrary code with elevated privileges. No public proof-of-concept exploits are currently reported. However, Microsoft warns that exploitation is likely.
The vulnerability affects the following products:
- Windows 10 (version 21H2 and later)
- Windows 11 (all versions)
- Microsoft Office 2019 and later
- Microsoft Office for Mac
- Azure DevOps Server
- Azure Services
Technical Details
CVE-2026-26111 is a remote code execution vulnerability in the Microsoft Graphics Component. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user.
The vulnerability exists when the Microsoft Graphics Component improperly handles objects in memory. An attacker could exploit this by convincing a user to open a specially crafted file or visit a malicious website.
Microsoft has confirmed that this vulnerability is being exploited in limited targeted attacks. The vulnerability was discovered by security researchers at Google Project Zero.
Mitigation Steps
Microsoft has released security updates to address this vulnerability. Organizations should apply these updates as soon as possible.
Update Instructions
- Windows Systems: Install the latest security updates through Windows Update or download from the Microsoft Security Update Guide
- Office Products: Update through the Microsoft Update service or download from the Office Updates page
- Azure Services: Apply updates through the Azure portal or contact Microsoft support
Workarounds
If immediate patching is not possible, Microsoft recommends the following workarounds:
- Disable the Microsoft Graphics Component via Group Policy
- Implement Microsoft Defender Application Control to block untrusted applications
- Configure Windows Defender Exploit Guard to mitigate exploitation attempts
Timeline
- Discovery: January 15, 2026
- Notification to Vendors: January 16, 2026
- Patch Release: January 18, 2026 (Patch Tuesday)
- Public Disclosure: January 22, 2026
Additional Resources
For more information, see:
Organizations experiencing issues with the updates should contact Microsoft Support through the Microsoft Support portal.
Comments
Please log in or register to join the discussion