Microsoft Patch Day: Attackers exploit Windows and Word vulnerabilities

Important security updates have been released for Exchange Server, Hyper-V, Office, and Windows, among others. There are already attacks.

listen Print view
A finger points to the Windows 11 start screen.

(Image: mundissima/Shutterstock.com)

2 min. read

Currently, attackers are exploiting a total of six vulnerabilities in Internet Explorer, Windows, and Word. In the worst-case scenario, malicious code can get onto PCs, and attackers can gain full control. To protect systems from attacks, admins must ensure that Windows Update is active and that the latest security patches are installed. Microsoft is not currently providing details on the extent of the attacks.

Attackers are bypassing the SmartScreen protection mechanism ( CVE-2026-21510high” ) in the context of Windows Shell, for example. This approach warns about opening potentially dangerous applications. If this filter is deactivated, malicious apps could launch without warning. For such an attack to succeed, however, a victim must cooperate and open a link prepared by an attacker.

In the case of a Word vulnerability ( CVE-2026-21514high” ), victims must also open a manipulated document. This is followed by the execution of malicious code. The remaining exploited vulnerabilities affect Desktop Windows Manager ( CVE-2026-21519high” ), Windows Remote Desktop ( CVE-2026-21533high” ), Internet Explorer ( CVE-2026-21513high” ), and Windows Remote Access ( CVE-2026-21525medium” ). If attacks are successful in these cases, it leads to crashes (DoS) or attackers gain higher user privileges.

Microsoft has also closed vulnerabilities in Azure, GitHub Copilot, Defender, and Windows NTLM, among others. Here, malicious code can reach systems. However, information can also leak.

Videos by heise

Microsoft lists further information on the vulnerabilities and updates in the Security Update Guide.

(des)

Don't miss any news – follow us on Facebook, LinkedIn or Mastodon.

This article was originally published in German. It was translated with technical assistance and editorially reviewed before publication.