CVE Vulnerabilities

CVE-2026-21511

Deserialization of Untrusted Data

Published: Feb 10, 2026 | Modified: Feb 11, 2026
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
RedHat/V2
RedHat/V3
Ubuntu
root.io logo minimus.io logo echo.ai logo

Deserialization of untrusted data in Microsoft Office Outlook allows an unauthorized attacker to perform spoofing over a network.

Weakness

The product deserializes untrusted data without sufficiently ensuring that the resulting data will be valid.

Affected Software

NameVendorStart VersionEnd Version
365_appsMicrosoft- (including)- (including)
OfficeMicrosoft2019 (including)2019 (including)
Office_long_term_servicing_channelMicrosoft2021 (including)2021 (including)
Office_long_term_servicing_channelMicrosoft2024 (including)2024 (including)
Sharepoint_serverMicrosoft*16.0.19127.20518 (excluding)
Sharepoint_serverMicrosoft2016 (including)2016 (including)
Sharepoint_serverMicrosoft2019 (including)2019 (including)
WordMicrosoft2016 (including)2016 (including)

Potential Mitigations

  • Make fields transient to protect them from deserialization.
  • An attempt to serialize and then deserialize a class containing transient fields will result in NULLs where the transient data should be. This is an excellent way to prevent time, environment-based, or sensitive variables from being carried over and used improperly.

References