KB5002839 is a February 2026 security update for Microsoft Word 2016 and Outlook 2016. This update addresses multiple security vulnerabilities including remote code execution flaws and information disclosure issues affecting both 32-bit and 64-bit editions of these Office applications.

KB5002839 — Security Update for Microsoft Word 2016
KB5002839 is a security update released February 10, 2026, that addresses critical vulnerabilities in Microsoft Word 2016 and Outlook 2016, preventing remote code execution and information disclosure attacks.
KB5002839 is a security update released February 10, 2026, that addresses critical vulnerabilities in Microsoft Word 2016 and Outlook 2016, preventing remote code execution and information disclosure attacks.
In This Article
- Issue Description
- Root Cause
- 1Fixes remote code execution vulnerability in document parsing engine
- 2Resolves information disclosure vulnerability in Outlook message handling
- 3Patches font rendering security flaw in Office graphics engine
- 4Strengthens macro security and execution controls
- Installation
- Known Issues
- Frequently Asked Questions
Applies to
Issue Description
Issue Description
This security update addresses several critical vulnerabilities in Microsoft Word 2016 and Outlook 2016 that could allow attackers to execute arbitrary code or access sensitive information:
- Remote Code Execution: Specially crafted documents could allow attackers to execute malicious code with the same privileges as the current user
- Information Disclosure: Vulnerabilities that could expose sensitive data from memory or temporary files
- Memory Corruption: Improper handling of objects in memory that could lead to application crashes or code execution
- Document Processing Flaws: Issues with parsing certain file formats that could be exploited through malicious documents
These vulnerabilities affect users who open untrusted documents or email attachments in Word 2016 or Outlook 2016.
Root Cause
Root Cause
The vulnerabilities stem from improper validation of user input and inadequate bounds checking in the Office document parsing engine. Specifically, the issues occur when Word 2016 and Outlook 2016 process specially crafted files, leading to memory corruption and potential code execution. The root causes include insufficient sanitization of embedded objects, improper handling of font data, and inadequate validation of document structure elements.
Fixes remote code execution vulnerability in document parsing engine
This update patches a critical remote code execution vulnerability in the Office document parsing engine. The fix implements enhanced input validation and bounds checking when processing embedded objects and macros in Word documents. The update modifies the wwlib.dll and mso.dll components to properly validate document structure and prevent buffer overflows during file parsing operations.
Resolves information disclosure vulnerability in Outlook message handling
The update addresses an information disclosure vulnerability in Outlook 2016's message processing component. The fix prevents unauthorized access to memory contents when processing specially crafted email messages or attachments. Updated components include outlook.exe and olmapi32.dll, which now implement proper memory isolation and data sanitization during message parsing.
This vulnerability could have allowed attackers to extract sensitive information from Outlook's memory space, including cached credentials or email content from other messages.
Patches font rendering security flaw in Office graphics engine
This security fix addresses a vulnerability in the Office graphics engine related to font rendering and processing. The update modifies the gdiplus.dll and Office-specific graphics components to properly validate font data and prevent memory corruption when rendering embedded fonts in documents.
The vulnerability could be exploited through documents containing malicious font data, potentially leading to code execution when the document is opened or previewed in Word 2016 or Outlook 2016.
Strengthens macro security and execution controls
The update enhances macro security controls in both Word 2016 and Outlook 2016. New validation mechanisms are implemented to better detect and prevent execution of malicious macros, including improved sandboxing for macro execution and enhanced user prompts for macro-enabled documents.
Updated registry settings provide administrators with additional Group Policy controls for macro execution policies. The fix also improves logging of macro execution attempts for security monitoring purposes.
Installation
Installation
KB5002839 is delivered through multiple channels depending on your Office 2016 installation method:
Microsoft Update and Windows Update
For Office 2016 installations using Click-to-Run technology, this update is automatically delivered through the Office update channel. Users can manually check for updates by opening any Office application, navigating to File > Account > Update Options > Update Now.
Microsoft Update Catalog
For volume license and MSI-based installations, the update is available for manual download from the Microsoft Update Catalog. Separate packages are available for 32-bit and 64-bit versions:
- Word 2016 32-bit: File size approximately 45 MB
- Word 2016 64-bit: File size approximately 52 MB
- Outlook 2016 32-bit: File size approximately 38 MB
- Outlook 2016 64-bit: File size approximately 44 MB
Enterprise Deployment
System administrators can deploy this update through:
- WSUS: Available in the Office Updates classification
- SCCM: Distributed through Software Update Management
- Microsoft Intune: Available in the Office 365 Apps update ring
Prerequisites
Before installing KB5002839, ensure the following requirements are met:
- Microsoft Word 2016 or Outlook 2016 must be installed
- Minimum Office 2016 version:
16.0.4266.1001or later - Windows 7 SP1, Windows 8.1, Windows 10, or Windows 11
- Administrative privileges for MSI-based installations
- Restart required: No (Office applications will require restart)
To verify installation, open Word 2016, navigate to File > Account > About Word, and confirm the version number includes the February 2026 update.
Known Issues
Known Issues
The following issues have been reported after installing KB5002839:
Document Compatibility Issues
Some users may experience compatibility issues with documents created in older versions of Word that contain complex embedded objects or custom macros. Documents may display formatting inconsistencies or macro execution errors.
Workaround: Enable compatibility mode by opening the document and selecting File > Info > Convert to update the document to the current Word format.
Outlook Add-in Conflicts
Third-party Outlook add-ins may experience compatibility issues after installing this security update, particularly add-ins that interact with message parsing or attachment handling.
Workaround: Temporarily disable add-ins through File > Options > Add-ins and re-enable them one by one to identify problematic add-ins. Contact add-in vendors for updated versions compatible with the security update.
Performance Impact
Users may notice slightly increased document opening times due to enhanced security validation processes implemented in this update. The performance impact is typically minimal but may be more noticeable with large or complex documents.
Group Policy Conflicts
Organizations using custom Group Policy settings for Office macro security may need to review and update their policies to ensure compatibility with the enhanced macro security controls introduced in this update.
Resolution: Review and update Office-related Group Policy templates to align with the new security controls. Test policy changes in a controlled environment before deploying to production systems.
Overview
KB5002839 is a critical security update released on February 10, 2026, for Microsoft Word 2016 and Outlook 2016. This update addresses multiple high-severity vulnerabilities that could allow remote code execution and information disclosure attacks. The update applies to both 32-bit and 64-bit editions of these Office applications and is essential for maintaining security in enterprise and personal computing environments.
Security Vulnerabilities Addressed
This security update resolves several critical vulnerabilities in Microsoft Office 2016 components:
Remote Code Execution Vulnerabilities
The primary security concern addressed by KB5002839 involves remote code execution flaws in the Office document parsing engine. These vulnerabilities could allow attackers to execute arbitrary code by convincing users to open specially crafted Word documents or Outlook email attachments. The vulnerabilities affect the core document processing components and could be exploited without user interaction beyond opening a malicious file.
Information Disclosure Issues
The update also patches information disclosure vulnerabilities that could allow attackers to read sensitive data from application memory. These flaws could expose cached credentials, email content, or other confidential information stored in memory during normal Office operations.
Memory Corruption Flaws
Several memory corruption vulnerabilities are addressed, particularly in font rendering and embedded object processing. These flaws could lead to application crashes or, in worst-case scenarios, code execution when processing malicious content.
Affected Systems and Components
This security update applies to the following Microsoft Office 2016 applications and components:
| Application | Architecture | Minimum Version | Updated Components |
|---|---|---|---|
| Microsoft Word 2016 | 32-bit | 16.0.4266.1001 | wwlib.dll, mso.dll, gdiplus.dll |
| Microsoft Word 2016 | 64-bit | 16.0.4266.1001 | wwlib.dll, mso.dll, gdiplus.dll |
| Microsoft Outlook 2016 | 32-bit | 16.0.4266.1001 | outlook.exe, olmapi32.dll, mso.dll |
| Microsoft Outlook 2016 | 64-bit | 16.0.4266.1001 | outlook.exe, olmapi32.dll, mso.dll |
Installation Requirements and Process
The installation process for KB5002839 varies depending on your Office 2016 deployment method:
Click-to-Run Installations
For most consumer and small business installations using Click-to-Run technology, the update is delivered automatically through the Office update mechanism. Users can manually trigger updates by opening any Office application and navigating to the Account section.
Volume License Installations
Enterprise customers with volume license agreements can obtain the update through traditional deployment channels including WSUS, SCCM, and direct download from the Microsoft Update Catalog.
System Requirements
Before installing this update, verify that your system meets the following requirements:
- Supported Windows operating system (Windows 7 SP1 or later)
- Microsoft Office 2016 with minimum version 16.0.4266.1001
- Sufficient disk space for temporary installation files
- Administrative privileges for MSI-based installations
Security Impact and Risk Assessment
The vulnerabilities addressed by KB5002839 are classified as critical due to their potential for remote code execution without user interaction beyond opening a document. Organizations should prioritize the deployment of this update, particularly in environments where users regularly process documents from external sources or receive email attachments.
Attack Vectors
The primary attack vectors for these vulnerabilities include:
- Malicious Word documents distributed via email or web downloads
- Compromised websites hosting exploit documents
- Email attachments containing embedded exploits
- Network shares containing malicious Office files
Mitigation Strategies
While installing KB5002839 is the primary mitigation, organizations can implement additional protective measures:
- Enable Office Protected View for documents from untrusted sources
- Configure macro security settings to disable macros by default
- Implement email security solutions to scan attachments
- Educate users about the risks of opening untrusted documents
Post-Installation Verification
After installing KB5002839, administrators should verify successful deployment through several methods:
Version Verification
Check the Office application version by opening Word 2016 or Outlook 2016 and navigating to File > Account > About [Application]. The version information should reflect the February 2026 update.
Registry Verification
For MSI-based installations, verify the update installation through the Windows Registry. The update should be listed under:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Event Log Monitoring
Monitor Windows Event Logs for any installation errors or warnings related to the Office update process. Successful installations should generate corresponding entries in the Application event log.
Enterprise Deployment Considerations
Large organizations should consider the following factors when deploying KB5002839:
Testing and Validation
Before widespread deployment, test the update in a controlled environment to identify potential compatibility issues with existing workflows, custom applications, or third-party add-ins.
Phased Rollout
Implement a phased rollout strategy, beginning with pilot groups and gradually expanding to the entire organization. This approach allows for early identification and resolution of deployment issues.
User Communication
Communicate the update deployment to end users, including any expected changes in application behavior or new security prompts they may encounter.
Compliance and Regulatory Considerations
Organizations subject to regulatory compliance requirements should document the installation of KB5002839 as part of their security patch management processes. The update addresses vulnerabilities that could impact data confidentiality and system integrity, making it relevant for various compliance frameworks including SOX, HIPAA, and PCI DSS.
Frequently Asked Questions
What does KB5002839 resolve?
Which systems require KB5002839?
Is KB5002839 a security update?
What are the prerequisites for KB5002839?
Are there known issues with KB5002839?
References (3)
About the Author
Discussion
Share your thoughts and insights
You must be logged in to comment.
Related KB Articles

KB5002846 — Security Update for Office Online Server
KB5002846 is a March 2026 security update that addresses multiple vulnerabilities in Office Online Server, including remote code execution and information disclosure flaws affecting document rendering and authentication components.

KB5002849 — Security Update for Microsoft Excel 2016
KB5002849 is a security update for Microsoft Excel 2016 that addresses critical vulnerabilities in file processing and memory handling, affecting both 32-bit and 64-bit editions of Excel 2016.

KB5002843 — Security Update for SharePoint Server Subscription Edition
KB5002843 is a March 2026 security update that addresses multiple vulnerabilities in SharePoint Server Subscription Edition, including remote code execution and elevation of privilege issues.

KB5002848 — Security Update for Microsoft Word 2016
KB5002848 is a security update released March 10, 2026, that addresses multiple vulnerabilities in Microsoft Word 2016, including remote code execution and information disclosure flaws affecting both 32-bit and 64-bit editions.