top of page

A 17-Year-Old PowerPoint Bug Is Being Exploited in 2026

  • Writer: Patrick Duggan
    Patrick Duggan
  • Jan 12
  • 2 min read


The Absurdity


CISA added CVE-2009-0556 to the Known Exploited Vulnerabilities catalog on January 7, 2026.


Read that again.


A vulnerability discovered in 2009 - when Obama was inaugurated, when Avatar was in theaters, when the iPhone 3G was cutting edge - is actively being exploited in the wild. Right now. In 2026.



The Vulnerability


CVE-2009-0556 - Microsoft Office PowerPoint Memory Corruption


  • CVSS: 8.8 (High)

  • Attack Vector: User opens malicious PowerPoint file

  • Impact: Arbitrary code execution

  • Affected: Office 2000, 2002, 2003, 2007

  • CISA Deadline: January 28, 2026

The attack is simple: Send a .ppt file. User opens it. Game over.



Why This Still Works


1. Legacy Systems Never Die


  • A manufacturing plant runs Office 2003 on air-gapped Windows XP

  • A government contractor uses Office 2007 for "compatibility"

  • A small business never upgraded because "it still works"

These systems exist by the millions. Most are unpatched. Many are internet-connected despite policies saying otherwise.


2. Patching Is Political


"We can't patch - it might break the ERP integration." "Legal said no changes until the audit is complete." "IT is understaffed, we'll get to it next quarter."


Every excuse is a vector. Every delay is an opportunity.


3. Users Still Click


17 years of security awareness training. 17 years of "don't open attachments from strangers."


Users still click. They always will.



The Real Story


The PowerPoint bug isn't the scariest thing CISA added this week.


  • CVSS: 10.0 (Critical)

  • Attack: Unauthenticated RCE

  • Impact: Full system compromise

  • Deadline: January 28, 2026

No user interaction required. No authentication needed. Just internet exposure and you're owned.


But the PowerPoint bug is the story. Because it exposes the uncomfortable truth:


We haven't fixed problems. We've just added new ones on top.



The Patch Debt



Year

CVEs Published

CVEs From That Year Still Exploited

2009

~5,000

Unknown, but CVE-2009-0556 proves: at least 1

2015

~6,500

Several EternalBlue-era vulns

2020

~18,000

Active Log4Shell exploitation

2024

~29,000

Most of them


The vulnerability backlog grows faster than we can patch. We're losing.



What To Do


  1. Disconnect it from the network

  2. Migrate to modern Office

  3. If you can't migrate, block .ppt attachments at the mail gateway

  1. Patch immediately (versions before 11.00 are vulnerable)

  2. Check for indicators of compromise

  3. Assume breach if internet-exposed

  • Audit your legacy software inventory

  • Assume every unpatched system is compromised

  • Block file types at the perimeter (.ppt, .doc, .xls from external sources)


The Meta-Point


A vulnerability from 2009 being actively exploited in 2026 isn't a technical failure.


It's a governance failure.


Somewhere, a risk assessment said "legacy Office is acceptable risk." Somewhere, a budget request for upgrades was denied. Somewhere, "it's working fine" won over "it's vulnerable."


Technical debt isn't just about code quality. It's about attack surface.


Every legacy system is a liability. Every unpatched box is a breach waiting to happen.


And apparently, some organizations need 17 years to learn that lesson.




Her name is Renee Nicole Good.






Get Free IOCs


Subscribe to our threat intelligence feeds for free, machine-readable IOCs:


AlienVault OTX: https://otx.alienvault.com/user/pduggusa STIX 2.1 Feed: https://analytics.dugganusa.com/api/v1/stix-feed



Comments

Rated 0 out of 5 stars.
No ratings yet

Add a rating
bottom of page