Microsoft releases update to address zero-day vulnerability in Microsoft Office
嗯,用户让我用中文总结一下这篇文章,控制在100字以内,而且不需要特定的开头。首先,我需要仔细阅读文章内容,抓住主要信息。 文章提到微软在2026年1月发布了三个OOB更新,其中一个修复了CVE-2026-21509漏洞,这个漏洞影响Office软件,已经被野外利用。另外两个更新是为了解决安装标准补丁后出现的操作问题。这个漏洞被评定为“重要”,CVSS评分7.8,属于本地漏洞,需要攻击者有系统访问权限或者诱使用户打开恶意文档。CISA已经将其加入已知被利用漏洞列表。微软还提供了缓解指南,并且Talos发布了新的SNORT规则来检测这些漏洞的利用尝试。 接下来,我需要将这些信息浓缩到100字以内。重点包括:微软发布三个OOB更新,修复CVE-2026-21509漏洞及其影响、评级、攻击方式、CISA列表加入情况,以及Talos的规则发布。 确保语言简洁明了,直接描述内容,不使用总结性的开头。可能的结构是:微软发布三个OOB更新,修复Office漏洞CVE-2026-21509(重要/7.8),该漏洞已被利用;Talos发布检测规则。 检查字数是否在限制内,并确保所有关键点都涵盖。 </think> 微软于2026年1月发布了三个紧急更新,修复了影响Microsoft Office的高危漏洞CVE-2026-21509(CVSS 7.8),该漏洞已被野外利用。Talos发布了SNORT规则以检测相关攻击活动。 2026-1-29 14:49:14 Author: blog.talosintelligence.com(查看原文) 阅读量:2 收藏

  • Microsoft has published three out-of-band (OOB) updates so far in January 2026. One of these updates was released to address a vulnerability, CVE-2026-21509, affecting Microsoft Office that has been reportedly exploited in the wild. 
  • Additional OOB updates have been published to resolve operational issues experienced following installation of the updates released as part of the standard Microsoft Patch Tuesday process.

CVE-2026-21509 was published to address a security feature bypass vulnerability affecting Microsoft Office. This vulnerability was rated as “Important” and received a CVSS 3.1 score of 7.8. This vulnerability is considered “local,” meaning that it must be triggered by an attacker with access to an affected system, or by convincing a victim to open a malicious Office document that triggers the vulnerability. It has also been added to the CISA Known Exploited Vulnerabilities (KEV) list. Microsoft reports that this vulnerability cannot be triggered via the Preview Pane in Microsoft Office. Microsoft has also released mitigation guidance for CVE-2026-21509 as part of this advisory.  

In response to these vulnerability disclosures, Talos is releasing a new SNORT® ruleset that detects attempts to exploit some of them. Please note that additional rules may be released at a future date, and current rules are subject to change pending additional information. Cisco Security Firewall customers should use the latest update to their ruleset by updating their SRU. Open-source Snort Subscriber Ruleset customers can stay up to date by downloading the latest rule pack available for purchase on Snort.org

Snort2 rules included in this release that protect against the exploitation of many of these vulnerabilities are: 65823-65830.  

The following Snort3 rules are also available: 301384-301387. 

The following ClamAV signature has been released to detect activity associated with this vulnerability: 

  • Rtf.Exploit.CVE_2026_21509-10059214-0 

文章来源: https://blog.talosintelligence.com/microsoft-oob-update-january-2026/
如有侵权请联系:admin#unsafe.sh