Tech

US government warns users to patch this critical Microsoft Outlook bug

Share
Share


  • CISA adds an Outlook improper input validation bug to KEV
  • The deadline to patch is February 27 2025
  • Criminals are using it for remote code execution

The US Cybersecurity and Infrastructure Security Agency (CISA) has added a 2024 Outlook flaw to its catalog of known vulnerabilities, warning users about in-the-wild abuse, and giving federal agencies three weeks (until February 27) to patch up or stop using the tool entirely.

CVE-2024-21413 is an improper input validation flaw plaguing Microsoft Outlook. It was discovered in 2024 by Check Point’s researcher Haifei Li, and was given a severity score of 9.8/10 (critical). Cybercriminals could craft special email messages, loaded with a certain type of hyperlink, that would allow them to run arbitrary code remotely. By exploiting this vulnerability, attackers can bypass Outlook’s Protected View (a feature designed to open potentially harmful files in read-only mode) and instead open malicious files in editing mode.

Share

Leave a comment

Leave a Reply

Your email address will not be published. Required fields are marked *

Related Articles