More

    US government warns users to patch this critical Microsoft Outlook bug




    • CISA adds an Outlook improper input validation bug to KEV
    • The deadline to patch is February 27 2025
    • Criminals are using it for remote code execution

    The US Cybersecurity and Infrastructure Security Agency (CISA) has added a 2024 Outlook flaw to its catalog of known vulnerabilities, warning users about in-the-wild abuse, and giving federal agencies three weeks (until February 27) to patch up or stop using the tool entirely.

    CVE-2024-21413 is an improper input validation flaw plaguing Microsoft Outlook. It was discovered in 2024 by Check Point’s researcher Haifei Li, and was given a severity score of 9.8/10 (critical). Cybercriminals could craft special email messages, loaded with a certain type of hyperlink, that would allow them to run arbitrary code remotely. By exploiting this vulnerability, attackers can bypass Outlook’s Protected View (a feature designed to open potentially harmful files in read-only mode) and instead open malicious files in editing mode.

    https://cdn.mos.cms.futurecdn.net/89bxEtNaSo2H7h4SqvoeRd-1200-80.jpg



    Source link

    Latest articles

    spot_imgspot_img

    Related articles

    Leave a reply

    Please enter your comment!
    Please enter your name here

    spot_imgspot_img