Tech

US government warns users to patch this critical Microsoft Outlook bug

Share
Share


  • CISA adds an Outlook improper input validation bug to KEV
  • The deadline to patch is February 27 2025
  • Criminals are using it for remote code execution

The US Cybersecurity and Infrastructure Security Agency (CISA) has added a 2024 Outlook flaw to its catalog of known vulnerabilities, warning users about in-the-wild abuse, and giving federal agencies three weeks (until February 27) to patch up or stop using the tool entirely.

CVE-2024-21413 is an improper input validation flaw plaguing Microsoft Outlook. It was discovered in 2024 by Check Point’s researcher Haifei Li, and was given a severity score of 9.8/10 (critical). Cybercriminals could craft special email messages, loaded with a certain type of hyperlink, that would allow them to run arbitrary code remotely. By exploiting this vulnerability, attackers can bypass Outlook’s Protected View (a feature designed to open potentially harmful files in read-only mode) and instead open malicious files in editing mode.

Share

Leave a comment

Leave a Reply

Your email address will not be published. Required fields are marked *

Related Articles
HR departments could soon be set for a major shake-up as AI takes hold
Tech

HR departments could soon be set for a major shake-up as AI takes hold

Agentic AI adoption will rise by 327% by 2027, boosting productivity by...

ChatGPT is getting smarter, but its hallucinations are spiraling
Tech

ChatGPT is getting smarter, but its hallucinations are spiraling

OpenAI’s latest AI models, GPT o3 and o4-mini, hallucinate significantly more often...

You can now edit images in Gemini directly
Tech

You can now edit images in Gemini directly

Google’s Gemini can now edit both AI-generated and personal images using text...