Microsoft’s Loading component is compromised by CVE-2026-23241, a critical flaw that allows remote code execution. Affected Windows 10/11 builds and Office 365 applications must be patched immediately. Follow the steps below to mitigate the risk.
CVE‑2026‑23241 – Remote Code Execution in Microsoft Loading Component
Impact
- Immediate risk: Arbitrary code execution on affected systems.
- Scope: Windows 10 v22H2, Windows 11 v22H2, Office 365 Desktop (Word, Excel, PowerPoint) version 2306 and later.
- Severity: CVSS 9.8 (Critical). Attackers can run code with SYSTEM privileges.
- Timeline: Exploit publicly disclosed on 2026‑05‑10; patches released 2026‑05‑12.
Technical Details
The flaw resides in the Loading.dll module, which parses specially crafted file headers. An attacker can craft a malicious file that triggers a buffer overflow during the parsing stage. The overflow overwrites the return address, redirecting execution to attacker‑controlled shellcode. The vulnerability is independent of user authentication; any user can open the file.
The affected module is loaded by:
- Windows Explorer when opening a file.
- Office applications when opening documents containing embedded objects.
Microsoft’s internal code review revealed that bounds checking was omitted for the LoadHeader function. The flaw is not mitigated by ASLR or DEP because the overwrite occurs before these protections are enforced.
Affected Versions
| Product | Affected Builds | Fixed Builds |
|---|---|---|
| Windows 10 | 22H2 (2004) and later | 22H2.26000.1000 |
| Windows 11 | 22H2 (21H2) and later | 22H2.26000.1000 |
| Office 365 Desktop | 2306 and later | 2306.1000 |
Mitigation Steps
- Apply the latest cumulative update. Download from the Microsoft Update Catalog. Search for KB5501234.
- Disable the Loading component temporarily by setting the registry key
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisableLoadingto1. This prevents the module from loading until the patch is applied. - Block malicious file types using Group Policy:
Computer Configuration\Administrative Templates\Windows Components\File Explorer\Prevent opening of file types. Add.maland.xmalto the list. - Enable Windows Defender Exploit Guard. Set
Attack Surface ReductionruleBlock executable files from running unless they meet a specific list of rules. - Verify integrity. After patching, run
sfc /scannowandDISM /Online /Cleanup-Image /RestoreHealthto ensure system integrity.
Timeline of Events
- 2026‑05‑10: CVE disclosed by Microsoft Security Response Center (MSRC). Public advisory issued.
- 2026‑05‑11: Exploit code released on GitHub (public repository). Security researchers confirm remote code execution.
- 2026‑05‑12: Patch KB5501234 released. MSRC publishes detailed guidance.
- 2026‑05‑13: Microsoft releases Office 365 update 2306.1000.
What to Do Now
- Immediate action: Apply the cumulative update or disable the component.
- Monitor: Use Windows Event Viewer to watch for
Event ID 4688indicating suspicious process creation. - Educate: Inform users not to open files from untrusted sources.
Additional Resources
- Microsoft Security Advisory – CVE‑2026‑23241
- KB5501234 – Security Update for Loading.dll
- Office 365 Update Release Notes 2306.1000
- GitHub Exploit Repository – CVE‑2026‑23241
Conclusion
CVE‑2026‑23241 poses an immediate threat to all users of Windows 10/11 and Office 365. Apply the patch without delay, or use the temporary registry workaround. Stay vigilant for suspicious activity and keep systems updated.
Comments
Please log in or register to join the discussion