https://blog.0patch.com/2026/03/micropatches-released-for-desktop.html
| Web site | https://0patch.com |
| https://twitter.com/0patch | |
| Search | tfr |
| Web site | https://0patch.com |
| https://twitter.com/0patch | |
| Search | tfr |
Patches were written for:
- Microsoft Office 2016 and 2019 click-to-run with all available updates (version 2508, build 19127.20302)
- Microsoft Office 2010 and 2013 with all available updates
Office 2016 and 2019 volume license received an official patch from Microsoft.
We'd like to thank Alberto Bruscino (https://x.com/ErPaciocco) for sharing vulnerability details and POC, which allowed us to create a patch for this issue and protect our users.
The attacker would have to convince the user to open their malicious Excel document. Upon opening the document, Excel complains that the document was damaged and offers to recover it; choosing "Yes" to start the recovery process leads to the vulnerability being triggered.
Among our security-adopted (https://support.0patch.com/hc/en-us/artic
les/4403751356050-Which-Windows-products-has-0patch-security-adopted
) Office versions, we found this vulnerability to affect not only Office 2016 and 2019 click-to-run, but also Office 2013. Office 2010 is not affected.