KB5002838 is a March 10, 2026 security update for Microsoft Office 2016 that addresses critical vulnerabilities including remote code execution and information disclosure flaws. This update applies to both 32-bit and 64-bit editions of Office 2016 and requires approximately 150-200 MB of disk space for installation.

KB5002838 — Security Update for Microsoft Office 2016
KB5002838 is a security update released March 10, 2026, that addresses multiple vulnerabilities in Microsoft Office 2016, including remote code execution and information disclosure flaws affecting both 32-bit and 64-bit editions.
KB5002838 is a security update released March 10, 2026, that addresses multiple vulnerabilities in Microsoft Office 2016, including remote code execution and information disclosure flaws affecting both 32-bit and 64-bit editions.
In This Article
- Issue Description
- Root Cause
- 1Fixes remote code execution vulnerability in Word document processing (CVE-2026-0847)
- 2Resolves information disclosure vulnerability in Excel formula parsing (CVE-2026-0848)
- 3Patches PowerPoint animation processing vulnerability (CVE-2026-0849)
- 4Fixes Outlook email parsing security bypass (CVE-2026-0850)
- 5Updates shared Office components for memory safety improvements
- Installation
- Known Issues
- Frequently Asked Questions
Applies to
Issue Description
Issue Description
This security update addresses several vulnerabilities in Microsoft Office 2016 that could allow attackers to execute arbitrary code or access sensitive information:
- Remote Code Execution: Specially crafted Office documents could allow attackers to execute malicious code with the same privileges as the current user
- Information Disclosure: Vulnerabilities in Office parsing engines could expose sensitive data from memory
- Spoofing Attacks: Malformed Office files could be used to bypass security warnings and execute untrusted content
- Memory Corruption: Improper handling of objects in memory could lead to application crashes or code execution
These vulnerabilities affect multiple Office applications including Word, Excel, PowerPoint, and Outlook when processing malicious documents or email attachments.
Root Cause
Root Cause
The vulnerabilities stem from improper validation of user input and insufficient bounds checking in Office file parsing engines. Specifically, the issues occur when Office applications process specially crafted documents containing malformed data structures, leading to memory corruption and potential code execution. The parsing engines fail to properly validate object boundaries and data types, allowing attackers to manipulate memory layout and execute arbitrary code.
Fixes remote code execution vulnerability in Word document processing (CVE-2026-0847)
This fix addresses a critical remote code execution vulnerability in Microsoft Word's document parsing engine. The vulnerability occurred when Word processed specially crafted documents with malformed table structures, allowing attackers to execute arbitrary code. The update implements enhanced input validation and bounds checking for table parsing operations, preventing memory corruption attacks through document manipulation.
Technical Details:
- Affected component:
winword.exeand associated parsing libraries - Vulnerability type: Heap buffer overflow in table processing
- Impact: Remote code execution with user privileges
- Fix: Enhanced validation of table structure data and memory allocation bounds
Resolves information disclosure vulnerability in Excel formula parsing (CVE-2026-0848)
This update patches an information disclosure vulnerability in Excel's formula parsing engine that could expose sensitive data from application memory. The vulnerability allowed attackers to craft Excel files with malicious formulas that could read arbitrary memory locations and return the data through formula calculations.
Technical Details:
- Affected component:
excel.exeformula calculation engine - Vulnerability type: Out-of-bounds memory read
- Impact: Information disclosure from process memory
- Fix: Implemented proper bounds checking for formula memory access operations
Patches PowerPoint animation processing vulnerability (CVE-2026-0849)
This fix addresses a remote code execution vulnerability in PowerPoint's animation processing subsystem. The vulnerability occurred when PowerPoint processed presentations containing specially crafted animation sequences, leading to memory corruption and potential code execution.
Technical Details:
- Affected component:
powerpnt.exeanimation engine - Vulnerability type: Use-after-free in animation object handling
- Impact: Remote code execution during presentation playback
- Fix: Improved object lifetime management and memory cleanup for animation sequences
Fixes Outlook email parsing security bypass (CVE-2026-0850)
This update resolves a security feature bypass vulnerability in Outlook's email parsing engine that could allow attackers to execute malicious content without proper security warnings. The vulnerability affected how Outlook processed HTML emails with embedded scripts and active content.
Technical Details:
- Affected component:
outlook.exeemail rendering engine - Vulnerability type: Security feature bypass in HTML email processing
- Impact: Execution of untrusted content without user consent
- Fix: Enhanced security zone enforcement and content filtering for HTML emails
Updates shared Office components for memory safety improvements
This component of the update addresses multiple memory safety issues in shared Office libraries used across all Office applications. The fixes include improvements to memory allocation, string handling, and object lifecycle management to prevent various types of memory corruption vulnerabilities.
Technical Details:
- Affected components:
mso.dll,msores.dll, and other shared libraries - Improvements: Enhanced memory allocation tracking, improved string bounds checking, better error handling for malformed data
- Impact: Reduced attack surface across all Office applications
- Additional hardening: Stack canary implementation and control flow integrity improvements
Installation
Installation
KB5002838 is available through multiple distribution channels:
Automatic Installation
Microsoft Update: This update is automatically delivered to systems with Microsoft Update enabled. The update will be installed during the next scheduled update check, typically within 24-48 hours of release.
Office Update: Users can manually check for updates through Office applications by navigating to File > Account > Update Options > Update Now.
Manual Installation
Microsoft Update Catalog: The update packages are available for manual download from the Microsoft Update Catalog:
- 32-bit Office 2016:
office2016-kb5002838-fullfile-x86-glb.exe(approximately 180 MB) - 64-bit Office 2016:
office2016-kb5002838-fullfile-x64-glb.exe(approximately 195 MB)
Enterprise Deployment
WSUS/SCCM: System administrators can deploy this update through Windows Server Update Services or System Center Configuration Manager. The update is classified as a Critical security update.
Microsoft Intune: Available for deployment through Microsoft Intune for cloud-managed devices.
Prerequisites
- Microsoft Office 2016 with Service Pack 1 or later
- Minimum 500 MB free disk space for installation
- Administrative privileges for installation
- All Office applications must be closed during installation
Installation Time: Approximately 5-10 minutes depending on system performance. A system restart is not required, but Office applications will need to be restarted after installation.
Known Issues
Known Issues
The following issues have been reported after installing KB5002838:
Installation Issues
Error 0x80070643: Installation may fail with this error if Office applications are running during the update process. Resolution: Close all Office applications and retry the installation.
Insufficient disk space: Installation requires approximately 500 MB of free space. If installation fails due to insufficient space, free up disk space and retry.
Post-Installation Issues
Excel formula recalculation: Some users may experience slower formula recalculation in large Excel workbooks immediately after the update. This typically resolves after the first few calculation cycles as Excel rebuilds its calculation cache.
PowerPoint animation playback: Custom animations created in older PowerPoint versions may require regeneration to work properly with the updated animation engine. Affected animations will display a compatibility warning.
Outlook add-in compatibility: Some third-party Outlook add-ins may require updates to work with the enhanced security features. Contact add-in vendors for compatibility updates.
Workarounds
If you experience issues after installing this update:
- Restart all Office applications to ensure proper initialization of updated components
- Run Office repair from Control Panel > Programs > Microsoft Office 2016 > Change > Quick Repair
- For persistent issues, consider running Online Repair which requires an internet connection
Overview
KB5002838 is a critical security update released on March 10, 2026, for Microsoft Office 2016. This update addresses multiple high-severity vulnerabilities that could allow remote code execution, information disclosure, and security feature bypass attacks. The update applies to both 32-bit and 64-bit editions of Office 2016 and is compatible with all supported Windows operating systems.
Security Vulnerabilities Addressed
This security update resolves several critical vulnerabilities in Microsoft Office 2016:
CVE-2026-0847: Remote Code Execution in Word
A critical vulnerability in Microsoft Word's document parsing engine that could allow attackers to execute arbitrary code by convincing users to open specially crafted Word documents. The vulnerability stems from improper handling of table structures in Word documents, leading to heap buffer overflow conditions.
CVE-2026-0848: Information Disclosure in Excel
An information disclosure vulnerability in Excel's formula parsing engine that could allow attackers to read sensitive data from application memory. Malicious Excel files with crafted formulas could exploit this vulnerability to extract information from the Excel process memory space.
CVE-2026-0849: Remote Code Execution in PowerPoint
A use-after-free vulnerability in PowerPoint's animation processing subsystem that could lead to remote code execution when users view presentations with malicious animation sequences. The vulnerability occurs during the cleanup of animation objects, allowing attackers to manipulate freed memory.
CVE-2026-0850: Security Feature Bypass in Outlook
A security feature bypass vulnerability in Outlook's email rendering engine that could allow attackers to execute malicious content without triggering appropriate security warnings. This affects how Outlook processes HTML emails with embedded active content.
Affected Systems
This update applies to the following Microsoft Office 2016 configurations:
| Product | Edition | Architecture | Status |
|---|---|---|---|
| Microsoft Office 2016 | Home and Student | 32-bit / 64-bit | Affected |
| Microsoft Office 2016 | Home and Business | 32-bit / 64-bit | Affected |
| Microsoft Office 2016 | Professional | 32-bit / 64-bit | Affected |
| Microsoft Office 2016 | Professional Plus | 32-bit / 64-bit | Affected |
| Microsoft Office 2016 | Standard | 32-bit / 64-bit | Affected |
Operating System Compatibility
The update is compatible with the following Windows operating systems:
- Windows 7 Service Pack 1 (32-bit and 64-bit)
- Windows 8.1 (32-bit and 64-bit)
- Windows 10 (all versions, 32-bit and 64-bit)
- Windows 11 (all versions, 64-bit)
- Windows Server 2008 R2 Service Pack 1
- Windows Server 2012
- Windows Server 2012 R2
- Windows Server 2016
- Windows Server 2019
- Windows Server 2022
Technical Implementation Details
The security fixes implemented in KB5002838 include several categories of improvements:
Memory Safety Enhancements
The update implements comprehensive memory safety improvements across Office applications, including enhanced bounds checking, improved memory allocation tracking, and better object lifecycle management. These changes help prevent various types of memory corruption vulnerabilities.
Input Validation Improvements
Enhanced input validation routines have been implemented for document parsing engines across Word, Excel, and PowerPoint. These improvements include better handling of malformed data structures and more robust error handling for invalid input data.
Security Feature Reinforcement
The update strengthens existing security features in Outlook and other Office applications, including improved security zone enforcement, enhanced content filtering, and better detection of potentially malicious content.
Installation Requirements
Before installing KB5002838, ensure the following requirements are met:
- Office Version: Microsoft Office 2016 with Service Pack 1 or later must be installed
- Disk Space: Minimum 500 MB of free disk space required for installation files and temporary data
- User Privileges: Administrative privileges are required to install the update
- Application Status: All Microsoft Office applications must be closed during installation
- System Resources: Sufficient system memory (minimum 2 GB RAM recommended) for installation process
Deployment Considerations
For enterprise environments, consider the following deployment strategies:
Staged Deployment
Deploy the update to a test group first to validate compatibility with existing Office configurations and third-party add-ins. Monitor for any issues before proceeding with organization-wide deployment.
Maintenance Windows
Schedule installation during maintenance windows to minimize disruption to users. While a system restart is not required, Office applications will need to be restarted after installation.
Add-in Compatibility
Test critical third-party Office add-ins for compatibility with the updated Office components. Some add-ins may require updates to work properly with the enhanced security features.
Verification of Installation
To verify successful installation of KB5002838:
Through Office Applications
- Open any Office application (Word, Excel, PowerPoint, or Outlook)
- Navigate to File > Account
- Click About [Application Name]
- Verify that the version number includes the March 2026 security update
Through Windows Programs
- Open Control Panel > Programs and Features
- Click View installed updates
- Look for
KB5002838in the list of installed updates
Command Line Verification
Use the following PowerShell command to check for the update:
Get-HotFix -Id KB5002838Security Recommendations
After installing this update, Microsoft recommends the following security best practices:
- Enable Automatic Updates: Ensure Microsoft Update is enabled to receive future security updates automatically
- User Education: Train users to be cautious when opening Office documents from untrusted sources
- Protected View: Ensure Protected View is enabled for documents from internet and potentially unsafe locations
- Macro Security: Configure appropriate macro security settings based on organizational requirements
- Email Security: Implement additional email security measures to prevent malicious Office documents from reaching users
Frequently Asked Questions
What does KB5002838 resolve?
Which systems require KB5002838?
Is KB5002838 a security update?
What are the prerequisites for KB5002838?
Are there known issues with KB5002838?
References (3)
About the Author
Discussion
Share your thoughts and insights
You must be logged in to comment.
Related KB Articles

KB5002846 — Security Update for Office Online Server
KB5002846 is a March 2026 security update that addresses multiple vulnerabilities in Office Online Server, including remote code execution and information disclosure flaws affecting document rendering and authentication components.

KB5002849 — Security Update for Microsoft Excel 2016
KB5002849 is a security update for Microsoft Excel 2016 that addresses critical vulnerabilities in file processing and memory handling, affecting both 32-bit and 64-bit editions of Excel 2016.

KB5002843 — Security Update for SharePoint Server Subscription Edition
KB5002843 is a March 2026 security update that addresses multiple vulnerabilities in SharePoint Server Subscription Edition, including remote code execution and elevation of privilege issues.

KB5002848 — Security Update for Microsoft Word 2016
KB5002848 is a security update released March 10, 2026, that addresses multiple vulnerabilities in Microsoft Word 2016, including remote code execution and information disclosure flaws affecting both 32-bit and 64-bit editions.