Untrusted search path in Microsoft Office allows an unauthorized attacker to execute code locally.
According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to prepare the target environment to improve exploit reliability. Are there additional steps I need to take to be protected from this vulnerability? Customers should download the latest Office Deployment Tool (ODT) and ensure that this version, or any newer version, is used for all future deployments to remain protected against CVE-2026-20943. According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? A user would need to be tricked into opening a folder that contains a specially crafted file. Is the Preview Pane an attack vector for this vulnerability? No, the Preview Pane is not an attack vector.
Kazuma Matsumoto, Security Researcher at GMO Cybersecurity by IERAE, Inc.