Share this article
Latest news
With KB5043178 to Release Preview Channel, Microsoft advises Windows 11 users to plug in when the battery is low
Copilot in Outlook will generate personalized themes for you to customize the app
Microsoft will raise the price of its 365 Suite to include AI capabilities
Death Stranding Director’s Cut is now Xbox X|S at a huge discount
Outlook will let users create custom account icons so they can tell their accounts apart easier
Outlook’s decades-old vulnerability allowed for catastrophic attacks without any user interaction
Fortunately, the vulnerability was addressed.
2 min. read
Updated onFebruary 16, 2024
updated onFebruary 16, 2024
Share this article
Read our disclosure page to find out how can you help Windows Report sustain the editorial teamRead more
The latest Outlook vulnerability, known as CVE-2024-21413, allowed for relatively easy access into organisations’ infrastructure requiring no used interaction, to catastrophic effect.
The vulnerability, discovered by X user (formerly known as Twitter),Haifei Li, had existed for decades, but according to the user, the vulnerability was overlooked, so it was not addressed at all.
The crazy part for me when discovering the issue is that this is a very easy-to-find problem but overlooked for like decades – nothing special, I just typed the “!” in hyperlinks on Outlook.
CVE-2024-21413 was able to be exploited by unauthorized users in remote situations without requiring user interactions at all. What’s even more intriguing, and equally devastating, if we put it this way, is that the vulnerability would release malware at a mere previewing of the documents. They didn’t need to be open to infect devices.
How would it work? According to Microsoft, the vulnerability allowed attackers to bypass several security procedures and gain high-privilege rights on documents, including editing potentially malicious Protected View documents, by inserting an exclamation mark ‘!’ following the document extension it its embedded link.
An attacker who successfully exploited this vulnerability could gain high privileges, which include read, write, and delete functionality. An attacker could craft a malicious link that bypasses the Protected View Protocol, which leads to the leaking of local NTLM credential information and remote code execution (RCE).
The Redmond-based tech giant managed to quickly address Outlook’s CVE-2024-21413 vulnerability and it is no longer exploitable, just 2 days after the company validated its existence.
The full advisory can be foundhere, with all the details on this vulnerability.
Microsoft has been targeted by exploited recently, so the fact that the Redmond-based tech giant addressed this vulnerability in such as short time, makes sense: for instance,Word and Excelwere the targets of hackers these past days, whileMicrosoft SmartScreenwas also exploited quite severely.
More about the topics:Outlook,Outlook Errors
Flavius Floare
Tech Journalist
Flavius is a writer and a media content producer with a particular interest in technology, gaming, media, film and storytelling.
He’s always curious and ready to take on everything new in the tech world, covering Microsoft’s products on a daily basis. The passion for gaming and hardware feeds his journalistic approach, making him a great researcher and news writer that’s always ready to bring you the bleeding edge!
User forum
0 messages
Sort by:LatestOldestMost Votes
Comment*
Name*
Email*
Commenting as.Not you?
Save information for future comments
Comment
Δ
Flavius Floare
Tech Journalist
Flavius is a writer and a media content producer with a particular interest in technology, gaming, media, film and storytelling.