#Vulnerabilities

Microsoft Addresses Critical Vulnerability CVE-2026-26111 in Multiple Products

Vulnerabilities Reporter
2 min read

Microsoft has released security updates to address a critical vulnerability affecting multiple products, including Windows, Office, and Azure services.

Microsoft Addresses Critical Vulnerability CVE-2026-26111 in Multiple Products

Microsoft has released critical security updates to address CVE-2026-26111, a vulnerability affecting multiple products. The vulnerability could allow remote code execution. Organizations must apply these updates immediately.

Impact Assessment

CVE-2026-26111 carries a CVSS score of 8.8, classified as High severity. Exploitation could allow an attacker to execute arbitrary code with elevated privileges. No public proof-of-concept exploits are currently reported. However, Microsoft warns that exploitation is likely.

The vulnerability affects the following products:

  • Windows 10 (version 21H2 and later)
  • Windows 11 (all versions)
  • Microsoft Office 2019 and later
  • Microsoft Office for Mac
  • Azure DevOps Server
  • Azure Services

Technical Details

CVE-2026-26111 is a remote code execution vulnerability in the Microsoft Graphics Component. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user.

The vulnerability exists when the Microsoft Graphics Component improperly handles objects in memory. An attacker could exploit this by convincing a user to open a specially crafted file or visit a malicious website.

Microsoft has confirmed that this vulnerability is being exploited in limited targeted attacks. The vulnerability was discovered by security researchers at Google Project Zero.

Mitigation Steps

Microsoft has released security updates to address this vulnerability. Organizations should apply these updates as soon as possible.

Update Instructions

  1. Windows Systems: Install the latest security updates through Windows Update or download from the Microsoft Security Update Guide
  2. Office Products: Update through the Microsoft Update service or download from the Office Updates page
  3. Azure Services: Apply updates through the Azure portal or contact Microsoft support

Workarounds

If immediate patching is not possible, Microsoft recommends the following workarounds:

  1. Disable the Microsoft Graphics Component via Group Policy
  2. Implement Microsoft Defender Application Control to block untrusted applications
  3. Configure Windows Defender Exploit Guard to mitigate exploitation attempts

Timeline

  • Discovery: January 15, 2026
  • Notification to Vendors: January 16, 2026
  • Patch Release: January 18, 2026 (Patch Tuesday)
  • Public Disclosure: January 22, 2026

Additional Resources

For more information, see:

Organizations experiencing issues with the updates should contact Microsoft Support through the Microsoft Support portal.

Comments

Loading comments...