PT-2024-1648 · Microsoft · Outlook+5

Haifei Li

·

Published

2024-02-13

·

Updated

2026-05-06

·

CVE-2024-21413

CVSS v2.0

10

Critical

VectorAV:N/AC:L/Au:N/C:C/I:C/A:C
Name of the Vulnerable Software and Affected Versions Microsoft Office 2016 Microsoft Office LTSC 2021 Microsoft 365 Apps for Enterprise Microsoft Office 2019
Description A critical vulnerability in Microsoft Outlook allows remote attackers to execute arbitrary code and affect the system. The vulnerability is caused by improper input validation when opening emails with malicious links using vulnerable Outlook versions. It can be exploited by sending a malicious email to the victim, which can bypass Protected View and execute code via the preview pane. The estimated number of potentially affected devices worldwide is over 155,000 Outlook instances accessible over the internet. Real-world incidents have been reported where this issue was exploited, with attackers using malicious Office documents to bypass Protected View, steal NTLM credentials, and run arbitrary code.
Recommendations Microsoft Office 2016: Update to the latest version to mitigate the risk of exploitation. Microsoft Office LTSC 2021: Update to the latest version to mitigate the risk of exploitation. Microsoft 365 Apps for Enterprise: Update to the latest version to mitigate the risk of exploitation. Microsoft Office 2019: Update to the latest version to mitigate the risk of exploitation. As a temporary workaround, consider disabling the preview pane in Outlook until a patch is available. Restrict access to malicious email links to minimize the risk of exploitation. Avoid using vulnerable Outlook versions until the issue is resolved.

Exploit

Fix

RCE

Weakness Enumeration

Related Identifiers

BDU:2024-01322
CVE-2024-21413

Affected Products

365 Apps For Enterprise
Office 2016
Office 2019
Office Ltsc 2021
Outlook
Office