Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Microsoft | Microsoft 365 Apps for Enterprise | 16.0.1 ~ https://aka.ms/OfficeSecurityReleases | - | |
| Microsoft | Microsoft Office 2016 | 16.0.0 ~ 16.0.5539.1001 | - | |
| Microsoft | Microsoft Office 2019 | 19.0.0 ~ 16.0.10417.20095 | - | |
| Microsoft | Microsoft Office LTSC 2021 | 16.0.1 ~ https://aka.ms/OfficeSecurityReleases | - | |
| Microsoft | Microsoft Office LTSC 2024 | 16.0.0 ~ https://aka.ms/OfficeSecurityReleases | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | CVE-2026-21509 | https://github.com/kimstars/Ashwesker-CVE-2026-21509 | POC Details |
| 2 | Educational PoC for CVE‑2026‑21509 (Microsoft Office security feature bypass). Generates a harmless DOCX with dummy OLE artifacts to study EDR/AV visibility. Not an exploit. For isolated labs only; see README for 7‑Zip inspection steps and mitigation references. | https://github.com/gavz/CVE-2026-21509-PoC | POC Details |
| 3 | Powershell script with Detection and Remediation for CVE-2026-21509 | https://github.com/ksk-itdk/KSK-ITDK-CVE-2026-21509-Mitigation | POC Details |
| 4 | New Physics Disclosure This repository contains a full weaponized exploit for **CVE-2026-21509**, targeting the Windows Network File System (NFSv4.1) kernel-mode driver (`nfssvr.sys`). | https://github.com/SimoesCTT/CTT-NFS-Vortex-RCE | POC Details |
| 5 | Microsoft just released emergency patches for CVE-2026-21509, a zero-day in the Office Suite that bypasses OLE/COM mitigations when a user simply opens a file. They think their "Service-side change" for Office 2021+ is a solid wall. | https://github.com/SimoesCTT/SCTT-2026-33-0007-The-OLE-Vortex-Laminar-Bypass- | POC Details |
| 6 | CVE-2026-21509 is a critical bypass in the Microsoft Office OLE (Object Linking and Embedding) validation engine. While standard "laminar" exploits attempt to manipulate static COM objects, this repository utilizes Theorem 4.2 to achieve a speculative race-condition bypass of the Object Definition Rule (ODR). | https://github.com/SimoesCTT/CTT-MICROSOFT-OFFICE-OLE-MANIFOLD-BYPASS-CVE-2026-21509 | POC Details |
| 7 | YARA rule and python script to detect potential exploits for the CVE-2026-21509 vulnerability in MS Office | https://github.com/decalage2/detect_CVE-2026-21509 | POC Details |
| 8 | None | https://github.com/kaizensecurity/CVE-2026-21509 | POC Details |
| 9 | CVE-2026-21509 Mitigation | https://github.com/planetoid/cve-2026-21509-mitigation | POC Details |
No public POC found.
Login to generate AI POCNo comments yet