Microsoft Office Protected View chain CVE (deferred from §4; see CVE-2026-21509 series)
cve · CVE-2026-21514
Coverage timeline
1
first 2026-05-08 → last 2026-05-08
Briefs
1
1 distinct
Sources cited
18
12 hosts
Sections touched
0
—
Co-occurring entities
0
no co-occurrence
Story timeline
- 2026-05-08CTI Daily Brief — 2026-05-08
Source distribution
- microsoft.com5 (28%)
- github.com3 (17%)
- blog.talosintelligence.com1 (6%)
- cert.europa.eu1 (6%)
- cisa.gov1 (6%)
- helpnetsecurity.com1 (6%)
- isc.sans.edu1 (6%)
- malwarebytes.com1 (6%)
- other4 (22%)
External references
All cited sources (18)
- nvd.nist.govprimaryinlineNVD — CVE-2026-32202https://nvd.nist.gov/vuln/detail/CVE-2026-32202
- blog.talosintelligence.cominlineCisco Talos, 2026-05-05https://blog.talosintelligence.com/cloudz-pheno-infostealer/
- cert.europa.euinlineCERT-EUROPA advisory 2026-005 update, 2026-05-08https://cert.europa.eu/publications/security-advisories/2026-005/
- cisa.govinlineCISA KEV entry CVE-2026-31431https://www.cisa.gov/known-exploited-vulnerabilities-catalog
- github.cominlineResearcher write-up (V4bel), 2026-05-07https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md
- github.cominlineGitHub Security Advisory GHSA-2ww3-72rp-wpp4, 2026-05-07https://github.com/microsoft/semantic-kernel/security/advisories/GHSA-2ww3-72rp-wpp4
- github.cominlineGitHub Security Advisory GHSA-xjw9-4gw8-4rqx, 2026-05-07https://github.com/microsoft/semantic-kernel/security/advisories/GHSA-xjw9-4gw8-4rqx
- helpnetsecurity.cominlineHelp Net Security, 2026-05-08https://www.helpnetsecurity.com/2026/05/08/dirty-frag-linux-vulnerability-cve-2026-43284-cve-2026-43500/
- isc.sans.eduinlineSANS ISC Diary, 2026-05-04https://isc.sans.edu/diary/Cleartext+Passwords+in+MS+Edge+In+2026/32954/
- malwarebytes.cominlineMalwarebytes — Shub Stealer earlier wave, 2026-03https://www.malwarebytes.com/blog/threat-intel/2026/03/fake-cleanmymac-site-installs-shub-stealer-and-backdoors-crypto-wallets
- microsoft.cominlineMicrosoft Security Blog, 2026-05-01https://www.microsoft.com/en-us/security/blog/2026/05/01/cve-2026-31431-copy-fail-vulnerability-enables-linux-root-privilege-escalation/
- microsoft.cominlineMicrosoft Threat Intelligence, 2026-05-04https://www.microsoft.com/en-us/security/blog/2026/05/04/breaking-the-code-multi-stage-code-of-conduct-phishing-campaign-leads-to-aitm-token-compromise/
- microsoft.cominlineMicrosoft Security Blog, 2026-05-06https://www.microsoft.com/en-us/security/blog/2026/05/06/clickfix-campaign-uses-fake-macos-utilities-lures-deliver-infostealers/
- microsoft.cominlineMicrosoft Security Blog, 2026-05-07https://www.microsoft.com/en-us/security/blog/2026/05/07/prompts-become-shells-rce-vulnerabilities-ai-agent-frameworks/
- microsoft.cominlineMicrosoft Security Blog, 2026-05-08https://www.microsoft.com/en-us/security/blog/2026/05/08/active-attack-dirty-frag-linux-vulnerability-expands-post-compromise-risk/
- msrc.microsoft.cominlineMicrosoft MSRC — CVE-2026-32202https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32202
- security-hub.ncsc.admin.chinlineNCSC-CH advisory 12547, 2026-05-08https://security-hub.ncsc.admin.ch/api/posts/12547/details
- wiz.ioinlineWiz Research, 2026-05-08https://www.wiz.io/blog/dirty-frag-linux-kernel-local-privilege-escalation-via-esp-and-rxrpc
Items in briefs about Microsoft Office Protected View chain CVE (deferred from §4; see CVE-2026-21509 series)
No parsed item heading or body matches this entity yet. Items match by exact CVE id (for CVE entities), by lead-segment substring of the title in the item heading or body, or by a distinctive anchor token from the title appearing in the item heading. Coverage that lives inside a broader section (no per-item heading) is captured by the Story timeline above.