Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-20955: CWE-822: Untrusted Pointer Dereference in Microsoft Office Online Server

0
High
VulnerabilityCVE-2026-20955cvecve-2026-20955cwe-822
Published: Tue Jan 13 2026 (01/13/2026, 17:56:47 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Office Online Server

Description

Untrusted pointer dereference in Microsoft Office Excel allows an unauthorized attacker to execute code locally.

AI-Powered Analysis

AILast updated: 01/13/2026, 18:27:50 UTC

Technical Analysis

CVE-2026-20955 is a vulnerability classified under CWE-822 (Untrusted Pointer Dereference) affecting Microsoft Office Online Server version 16.0.0.0. The issue arises from improper handling of pointers within Microsoft Office Excel components, leading to dereferencing of untrusted pointers. This flaw enables an unauthorized attacker to execute arbitrary code locally on the target system. The attack vector requires local access (AV:L), low attack complexity (AC:L), no privileges (PR:N), and user interaction (UI:R), with unchanged scope (S:U). The vulnerability impacts confidentiality, integrity, and availability at a high level (C:H/I:H/A:H). Although no public exploits are known, the vulnerability's nature allows an attacker to craft malicious Excel files that, when opened by a user, could trigger code execution. This could lead to full system compromise, data theft, or disruption of services hosted on Office Online Server. The vulnerability was reserved in December 2025 and published in January 2026, with no patches currently listed, indicating that mitigation relies on interim controls until official updates are released.

Potential Impact

For European organizations, the impact of CVE-2026-20955 could be substantial. Microsoft Office Online Server is widely used in enterprises and public sector institutions for collaborative document editing and sharing. Successful exploitation could lead to local code execution on servers or client machines, resulting in unauthorized data access, data corruption, or service disruption. This is particularly critical for organizations handling sensitive or regulated data under GDPR and other compliance frameworks. The requirement for local access and user interaction somewhat limits remote exploitation but does not eliminate risk, especially in environments where users frequently open Excel files from external or untrusted sources. The vulnerability could be leveraged in targeted attacks against government agencies, financial institutions, and large enterprises, potentially leading to espionage, data breaches, or operational outages.

Mitigation Recommendations

Given the absence of an official patch at this time, European organizations should implement several specific mitigations: 1) Enforce strict file validation and scanning policies for Excel files before opening, using advanced endpoint protection solutions capable of detecting malicious payloads. 2) Limit user privileges to prevent unauthorized local code execution and restrict the ability to open untrusted documents. 3) Employ application whitelisting and sandboxing for Office Online Server and client environments to contain potential exploitation. 4) Educate users about the risks of opening unsolicited or suspicious Excel files, emphasizing the need for caution with email attachments and shared documents. 5) Monitor logs and system behavior for unusual activity related to Office Online Server and Excel processes. 6) Prepare for rapid deployment of patches once Microsoft releases updates by maintaining an effective vulnerability management process. 7) Consider network segmentation to isolate Office Online Server from critical infrastructure to reduce lateral movement risk.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
microsoft
Date Reserved
2025-12-04T20:04:16.340Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69668ae5a60475309f9ae244

Added to database: 1/13/2026, 6:11:49 PM

Last enriched: 1/13/2026, 6:27:50 PM

Last updated: 1/14/2026, 5:35:41 AM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats