Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-26110: CWE-843: Access of Resource Using Incompatible Type ('Type Confusion') in Microsoft Microsoft 365 Apps for Enterprise

0
High
VulnerabilityCVE-2026-26110cvecve-2026-26110cwe-843
Published: Tue Mar 10 2026 (03/10/2026, 17:05:19 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Microsoft 365 Apps for Enterprise

Description

Access of resource using incompatible type ('type confusion') in Microsoft Office allows an unauthorized attacker to execute code locally.

AI-Powered Analysis

AILast updated: 03/10/2026, 18:18:53 UTC

Technical Analysis

CVE-2026-26110 is a vulnerability classified under CWE-843 (Access of Resource Using Incompatible Type, or type confusion) affecting Microsoft 365 Apps for Enterprise, specifically version 16.0.1. The vulnerability allows an attacker to exploit improper type handling within the application, enabling access to resources using incompatible types. This leads to the possibility of executing arbitrary code locally on the affected system without requiring any privileges or user interaction. The vulnerability is rated with a CVSS 3.1 score of 8.4 (high severity), reflecting its significant impact on confidentiality, integrity, and availability. The attack vector is local (AV:L), with low attack complexity (AC:L), no privileges required (PR:N), and no user interaction needed (UI:N). The scope is unchanged (S:U), meaning the impact is confined to the vulnerable component. Although no public exploits are known yet, the vulnerability's characteristics make it a serious threat, especially in environments where attackers can gain local access through other means. The lack of available patches at the time of publication necessitates immediate attention to monitoring and mitigation strategies. This vulnerability underscores the importance of secure type handling in complex software like Microsoft 365 Apps, which are widely deployed in enterprise environments.

Potential Impact

The vulnerability allows unauthorized local attackers to execute arbitrary code with the privileges of the current user, potentially leading to full system compromise. This can result in unauthorized data access, modification, or deletion (confidentiality and integrity impact), as well as disruption of services (availability impact). Since Microsoft 365 Apps for Enterprise is widely used in corporate environments, exploitation could facilitate lateral movement within networks, data exfiltration, or deployment of further malware. The absence of required privileges or user interaction lowers the barrier for exploitation once local access is achieved, increasing risk in environments with shared or poorly secured endpoints. The overall impact is significant for organizations relying on Microsoft 365 productivity tools, potentially affecting business continuity, regulatory compliance, and sensitive information security.

Mitigation Recommendations

Organizations should immediately inventory affected Microsoft 365 Apps for Enterprise versions and plan for rapid deployment of security updates once patches are released by Microsoft. Until patches are available, implement strict application whitelisting and endpoint protection controls to prevent execution of unauthorized code. Employ least privilege principles to limit user permissions, reducing the impact of local exploits. Monitor local system activity for unusual behavior indicative of exploitation attempts, such as unexpected process launches or code injections. Consider isolating critical systems and enforcing network segmentation to limit lateral movement from compromised endpoints. Regularly update and audit security configurations and educate users about the risks of local compromise. Engage with Microsoft support channels for any interim mitigations or workarounds. Finally, maintain robust incident response plans to quickly address any exploitation attempts.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
microsoft
Date Reserved
2026-02-11T15:52:13.910Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69b05631ea502d3aa87d6b17

Added to database: 3/10/2026, 5:34:41 PM

Last enriched: 3/10/2026, 6:18:53 PM

Last updated: 3/14/2026, 12:25:36 AM

Views: 100

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses