Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-20952: CWE-416: Use After Free in Microsoft Microsoft 365 Apps for Enterprise

0
High
VulnerabilityCVE-2026-20952cvecve-2026-20952cwe-416
Published: Tue Jan 13 2026 (01/13/2026, 17:57:08 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Microsoft 365 Apps for Enterprise

Description

Use after free in Microsoft Office allows an unauthorized attacker to execute code locally.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/02/2026, 00:50:36 UTC

Technical Analysis

CVE-2026-20952 is a use-after-free vulnerability classified under CWE-416, affecting Microsoft 365 Apps for Enterprise version 16.0.1. This vulnerability occurs due to improper handling of memory objects within the application, where a previously freed memory region is accessed again, leading to undefined behavior. An attacker can exploit this flaw to execute arbitrary code locally on the affected system without requiring any privileges or user interaction, as indicated by the CVSS vector (AV:L/AC:L/PR:N/UI:N). The vulnerability impacts confidentiality, integrity, and availability, as successful exploitation allows full control over the affected process. The vulnerability was reserved in December 2025 and published in January 2026, with no known exploits in the wild at the time of disclosure. Microsoft 365 Apps for Enterprise is widely deployed in corporate environments, increasing the potential attack surface. The lack of an available patch at the time of reporting necessitates immediate attention to mitigation strategies. The vulnerability's high CVSS score of 8.4 reflects its critical impact and ease of exploitation under local access conditions.

Potential Impact

The impact of CVE-2026-20952 is significant for organizations using Microsoft 365 Apps for Enterprise, as it allows attackers with local access to execute arbitrary code, potentially leading to full system compromise. This can result in data theft, unauthorized modification or deletion of sensitive information, disruption of business operations, and deployment of malware or ransomware. Since no privileges or user interaction are required, insider threats or attackers who gain limited local access can exploit this vulnerability. The widespread use of Microsoft 365 Apps in enterprises globally amplifies the risk, especially in sectors handling sensitive or regulated data such as finance, healthcare, and government. The vulnerability could also be leveraged as a foothold for lateral movement within networks, escalating the overall threat landscape for affected organizations.

Mitigation Recommendations

1. Monitor Microsoft’s official channels for the release of security patches addressing CVE-2026-20952 and apply updates immediately upon availability. 2. Until patches are released, restrict local access to systems running the vulnerable Microsoft 365 Apps version, limiting it to trusted users only. 3. Employ application whitelisting and endpoint protection solutions to detect and block suspicious behavior related to Microsoft Office processes. 4. Use system hardening techniques such as disabling unnecessary local accounts and enforcing least privilege principles to reduce the risk of exploitation. 5. Implement robust logging and monitoring to detect anomalous local execution attempts or memory corruption indicators. 6. Educate users and administrators about the risk of local exploitation and the importance of reporting unusual system behavior promptly. 7. Consider isolating critical systems or running Microsoft 365 Apps in controlled environments to minimize exposure. 8. Review and tighten access controls on endpoints to prevent unauthorized local access that could lead to exploitation.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
microsoft
Date Reserved
2025-12-04T20:04:16.339Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69668ae5a60475309f9ae23e

Added to database: 1/13/2026, 6:11:49 PM

Last enriched: 3/2/2026, 12:50:36 AM

Last updated: 3/25/2026, 1:43:27 AM

Views: 171

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses