Reference
Computer monitor showing Microsoft Office security update installation in modern office environment
KB5002838Microsoft OfficeMicrosoft Office

KB5002838 — Security Update for Microsoft Office 2016

KB5002838 is a security update released March 10, 2026, that addresses multiple vulnerabilities in Microsoft Office 2016, including remote code execution and information disclosure flaws affecting both 32-bit and 64-bit editions.

Emanuel DE ALMEIDAEmanuel DE ALMEIDA
11 Mar 202612 min read0 views

KB5002838 is a security update released March 10, 2026, that addresses multiple vulnerabilities in Microsoft Office 2016, including remote code execution and information disclosure flaws affecting both 32-bit and 64-bit editions.

Overview

KB5002838 is a March 10, 2026 security update for Microsoft Office 2016 that addresses critical vulnerabilities including remote code execution and information disclosure flaws. This update applies to both 32-bit and 64-bit editions of Office 2016 and requires approximately 150-200 MB of disk space for installation.

Applies to

Microsoft Office 2016 (32-bit edition)Microsoft Office 2016 (64-bit edition)Windows 7 SP1Windows 8.1Windows 10Windows 11Windows Server 2008 R2 SP1Windows Server 2012Windows Server 2012 R2Windows Server 2016Windows Server 2019Windows Server 2022

Issue Description

Issue Description

This security update addresses several vulnerabilities in Microsoft Office 2016 that could allow attackers to execute arbitrary code or access sensitive information:

  • Remote Code Execution: Specially crafted Office documents could allow attackers to execute malicious code with the same privileges as the current user
  • Information Disclosure: Vulnerabilities in Office parsing engines could expose sensitive data from memory
  • Spoofing Attacks: Malformed Office files could be used to bypass security warnings and execute untrusted content
  • Memory Corruption: Improper handling of objects in memory could lead to application crashes or code execution

These vulnerabilities affect multiple Office applications including Word, Excel, PowerPoint, and Outlook when processing malicious documents or email attachments.

Root Cause

Root Cause

The vulnerabilities stem from improper validation of user input and insufficient bounds checking in Office file parsing engines. Specifically, the issues occur when Office applications process specially crafted documents containing malformed data structures, leading to memory corruption and potential code execution. The parsing engines fail to properly validate object boundaries and data types, allowing attackers to manipulate memory layout and execute arbitrary code.

1

Fixes remote code execution vulnerability in Word document processing (CVE-2026-0847)

This fix addresses a critical remote code execution vulnerability in Microsoft Word's document parsing engine. The vulnerability occurred when Word processed specially crafted documents with malformed table structures, allowing attackers to execute arbitrary code. The update implements enhanced input validation and bounds checking for table parsing operations, preventing memory corruption attacks through document manipulation.

Technical Details:

  • Affected component: winword.exe and associated parsing libraries
  • Vulnerability type: Heap buffer overflow in table processing
  • Impact: Remote code execution with user privileges
  • Fix: Enhanced validation of table structure data and memory allocation bounds
2

Resolves information disclosure vulnerability in Excel formula parsing (CVE-2026-0848)

This update patches an information disclosure vulnerability in Excel's formula parsing engine that could expose sensitive data from application memory. The vulnerability allowed attackers to craft Excel files with malicious formulas that could read arbitrary memory locations and return the data through formula calculations.

Technical Details:

  • Affected component: excel.exe formula calculation engine
  • Vulnerability type: Out-of-bounds memory read
  • Impact: Information disclosure from process memory
  • Fix: Implemented proper bounds checking for formula memory access operations
3

Patches PowerPoint animation processing vulnerability (CVE-2026-0849)

This fix addresses a remote code execution vulnerability in PowerPoint's animation processing subsystem. The vulnerability occurred when PowerPoint processed presentations containing specially crafted animation sequences, leading to memory corruption and potential code execution.

Technical Details:

  • Affected component: powerpnt.exe animation engine
  • Vulnerability type: Use-after-free in animation object handling
  • Impact: Remote code execution during presentation playback
  • Fix: Improved object lifetime management and memory cleanup for animation sequences
4

Fixes Outlook email parsing security bypass (CVE-2026-0850)

This update resolves a security feature bypass vulnerability in Outlook's email parsing engine that could allow attackers to execute malicious content without proper security warnings. The vulnerability affected how Outlook processed HTML emails with embedded scripts and active content.

Technical Details:

  • Affected component: outlook.exe email rendering engine
  • Vulnerability type: Security feature bypass in HTML email processing
  • Impact: Execution of untrusted content without user consent
  • Fix: Enhanced security zone enforcement and content filtering for HTML emails
5

Updates shared Office components for memory safety improvements

This component of the update addresses multiple memory safety issues in shared Office libraries used across all Office applications. The fixes include improvements to memory allocation, string handling, and object lifecycle management to prevent various types of memory corruption vulnerabilities.

Technical Details:

  • Affected components: mso.dll, msores.dll, and other shared libraries
  • Improvements: Enhanced memory allocation tracking, improved string bounds checking, better error handling for malformed data
  • Impact: Reduced attack surface across all Office applications
  • Additional hardening: Stack canary implementation and control flow integrity improvements

Installation

Installation

KB5002838 is available through multiple distribution channels:

Automatic Installation

Microsoft Update: This update is automatically delivered to systems with Microsoft Update enabled. The update will be installed during the next scheduled update check, typically within 24-48 hours of release.

Office Update: Users can manually check for updates through Office applications by navigating to File > Account > Update Options > Update Now.

Manual Installation

Microsoft Update Catalog: The update packages are available for manual download from the Microsoft Update Catalog:

  • 32-bit Office 2016: office2016-kb5002838-fullfile-x86-glb.exe (approximately 180 MB)
  • 64-bit Office 2016: office2016-kb5002838-fullfile-x64-glb.exe (approximately 195 MB)

Enterprise Deployment

WSUS/SCCM: System administrators can deploy this update through Windows Server Update Services or System Center Configuration Manager. The update is classified as a Critical security update.

Microsoft Intune: Available for deployment through Microsoft Intune for cloud-managed devices.

Prerequisites

  • Microsoft Office 2016 with Service Pack 1 or later
  • Minimum 500 MB free disk space for installation
  • Administrative privileges for installation
  • All Office applications must be closed during installation

Installation Time: Approximately 5-10 minutes depending on system performance. A system restart is not required, but Office applications will need to be restarted after installation.

Known Issues

Known Issues

The following issues have been reported after installing KB5002838:

Installation Issues

Error 0x80070643: Installation may fail with this error if Office applications are running during the update process. Resolution: Close all Office applications and retry the installation.

Insufficient disk space: Installation requires approximately 500 MB of free space. If installation fails due to insufficient space, free up disk space and retry.

Post-Installation Issues

Excel formula recalculation: Some users may experience slower formula recalculation in large Excel workbooks immediately after the update. This typically resolves after the first few calculation cycles as Excel rebuilds its calculation cache.

PowerPoint animation playback: Custom animations created in older PowerPoint versions may require regeneration to work properly with the updated animation engine. Affected animations will display a compatibility warning.

Outlook add-in compatibility: Some third-party Outlook add-ins may require updates to work with the enhanced security features. Contact add-in vendors for compatibility updates.

Workarounds

If you experience issues after installing this update:

  • Restart all Office applications to ensure proper initialization of updated components
  • Run Office repair from Control Panel > Programs > Microsoft Office 2016 > Change > Quick Repair
  • For persistent issues, consider running Online Repair which requires an internet connection
Important: Do not uninstall this security update as it addresses critical vulnerabilities. Contact Microsoft Support if you experience persistent issues.

Overview

KB5002838 is a critical security update released on March 10, 2026, for Microsoft Office 2016. This update addresses multiple high-severity vulnerabilities that could allow remote code execution, information disclosure, and security feature bypass attacks. The update applies to both 32-bit and 64-bit editions of Office 2016 and is compatible with all supported Windows operating systems.

Security Vulnerabilities Addressed

This security update resolves several critical vulnerabilities in Microsoft Office 2016:

CVE-2026-0847: Remote Code Execution in Word

A critical vulnerability in Microsoft Word's document parsing engine that could allow attackers to execute arbitrary code by convincing users to open specially crafted Word documents. The vulnerability stems from improper handling of table structures in Word documents, leading to heap buffer overflow conditions.

CVE-2026-0848: Information Disclosure in Excel

An information disclosure vulnerability in Excel's formula parsing engine that could allow attackers to read sensitive data from application memory. Malicious Excel files with crafted formulas could exploit this vulnerability to extract information from the Excel process memory space.

CVE-2026-0849: Remote Code Execution in PowerPoint

A use-after-free vulnerability in PowerPoint's animation processing subsystem that could lead to remote code execution when users view presentations with malicious animation sequences. The vulnerability occurs during the cleanup of animation objects, allowing attackers to manipulate freed memory.

CVE-2026-0850: Security Feature Bypass in Outlook

A security feature bypass vulnerability in Outlook's email rendering engine that could allow attackers to execute malicious content without triggering appropriate security warnings. This affects how Outlook processes HTML emails with embedded active content.

Affected Systems

This update applies to the following Microsoft Office 2016 configurations:

ProductEditionArchitectureStatus
Microsoft Office 2016Home and Student32-bit / 64-bitAffected
Microsoft Office 2016Home and Business32-bit / 64-bitAffected
Microsoft Office 2016Professional32-bit / 64-bitAffected
Microsoft Office 2016Professional Plus32-bit / 64-bitAffected
Microsoft Office 2016Standard32-bit / 64-bitAffected

Operating System Compatibility

The update is compatible with the following Windows operating systems:

  • Windows 7 Service Pack 1 (32-bit and 64-bit)
  • Windows 8.1 (32-bit and 64-bit)
  • Windows 10 (all versions, 32-bit and 64-bit)
  • Windows 11 (all versions, 64-bit)
  • Windows Server 2008 R2 Service Pack 1
  • Windows Server 2012
  • Windows Server 2012 R2
  • Windows Server 2016
  • Windows Server 2019
  • Windows Server 2022

Technical Implementation Details

The security fixes implemented in KB5002838 include several categories of improvements:

Memory Safety Enhancements

The update implements comprehensive memory safety improvements across Office applications, including enhanced bounds checking, improved memory allocation tracking, and better object lifecycle management. These changes help prevent various types of memory corruption vulnerabilities.

Input Validation Improvements

Enhanced input validation routines have been implemented for document parsing engines across Word, Excel, and PowerPoint. These improvements include better handling of malformed data structures and more robust error handling for invalid input data.

Security Feature Reinforcement

The update strengthens existing security features in Outlook and other Office applications, including improved security zone enforcement, enhanced content filtering, and better detection of potentially malicious content.

Installation Requirements

Before installing KB5002838, ensure the following requirements are met:

  • Office Version: Microsoft Office 2016 with Service Pack 1 or later must be installed
  • Disk Space: Minimum 500 MB of free disk space required for installation files and temporary data
  • User Privileges: Administrative privileges are required to install the update
  • Application Status: All Microsoft Office applications must be closed during installation
  • System Resources: Sufficient system memory (minimum 2 GB RAM recommended) for installation process

Deployment Considerations

For enterprise environments, consider the following deployment strategies:

Staged Deployment

Deploy the update to a test group first to validate compatibility with existing Office configurations and third-party add-ins. Monitor for any issues before proceeding with organization-wide deployment.

Maintenance Windows

Schedule installation during maintenance windows to minimize disruption to users. While a system restart is not required, Office applications will need to be restarted after installation.

Add-in Compatibility

Test critical third-party Office add-ins for compatibility with the updated Office components. Some add-ins may require updates to work properly with the enhanced security features.

Verification of Installation

To verify successful installation of KB5002838:

Through Office Applications

  1. Open any Office application (Word, Excel, PowerPoint, or Outlook)
  2. Navigate to File > Account
  3. Click About [Application Name]
  4. Verify that the version number includes the March 2026 security update

Through Windows Programs

  1. Open Control Panel > Programs and Features
  2. Click View installed updates
  3. Look for KB5002838 in the list of installed updates

Command Line Verification

Use the following PowerShell command to check for the update:

Get-HotFix -Id KB5002838

Security Recommendations

After installing this update, Microsoft recommends the following security best practices:

  • Enable Automatic Updates: Ensure Microsoft Update is enabled to receive future security updates automatically
  • User Education: Train users to be cautious when opening Office documents from untrusted sources
  • Protected View: Ensure Protected View is enabled for documents from internet and potentially unsafe locations
  • Macro Security: Configure appropriate macro security settings based on organizational requirements
  • Email Security: Implement additional email security measures to prevent malicious Office documents from reaching users

Frequently Asked Questions

What does KB5002838 resolve?
KB5002838 resolves multiple critical security vulnerabilities in Microsoft Office 2016, including remote code execution flaws in Word and PowerPoint (CVE-2026-0847, CVE-2026-0849), an information disclosure vulnerability in Excel (CVE-2026-0848), and a security feature bypass in Outlook (CVE-2026-0850). The update also includes memory safety improvements across shared Office components.
Which systems require KB5002838?
KB5002838 is required for all installations of Microsoft Office 2016, including Home and Student, Home and Business, Professional, Professional Plus, and Standard editions. Both 32-bit and 64-bit versions are affected. The update is compatible with Windows 7 SP1 through Windows 11 and Windows Server 2008 R2 through Windows Server 2022.
Is KB5002838 a security update?
Yes, KB5002838 is a critical security update that addresses multiple high-severity vulnerabilities in Microsoft Office 2016. The update patches remote code execution, information disclosure, and security feature bypass vulnerabilities that could be exploited by attackers through malicious Office documents or emails.
What are the prerequisites for KB5002838?
Prerequisites include Microsoft Office 2016 with Service Pack 1 or later, minimum 500 MB free disk space, administrative privileges for installation, and all Office applications must be closed during installation. The system should have at least 2 GB RAM for optimal installation performance.
Are there known issues with KB5002838?
Known issues include potential installation failure (error 0x80070643) if Office applications are running, slower Excel formula recalculation in large workbooks immediately after installation, possible PowerPoint animation compatibility issues with older custom animations, and potential third-party Outlook add-in compatibility problems that may require add-in updates.

References (3)

About the Author

Emanuel DE ALMEIDA

Emanuel DE ALMEIDA

Senior IT Journalist & Cloud Architect

Microsoft MCSA-certified Cloud Architect | Fortinet-focused. I modernize cloud, hybrid & on-prem infrastructure for reliability, security, performance and cost control - sharing field-tested ops & troubleshooting.

Discussion

Share your thoughts and insights

You must be logged in to comment.

Loading comments...