Wednesday, May 14, 2025
HomeCVE/vulnerabilityMicrosoft Patches Outlook Zero-Click RCE Vulnerability Exploited Via Email

Microsoft Patches Outlook Zero-Click RCE Vulnerability Exploited Via Email

Published on

SIEM as a Service

Follow Us on Google News

Microsoft issued a critical security patch addressing a newly discovered vulnerability in Outlook, designated as CVE-2025-21298.

This flaw, characterized as a zero-click remote code execution (RCE) vulnerability, poses a significant risk to users by potentially allowing attackers to execute arbitrary code simply by sending a malicious email.

Vulnerability Details

CVE-2025-21298 arises from a “Use After Free” weakness (CWE-416), which can be exploited over a network with low complexity and no user interaction required.

- Advertisement - Google News

The CVSS (Common Vulnerability Scoring System) score for this vulnerability stands at 9.8, indicating its critical severity.

Investigate Real-World Malicious Links & Phishing Attacks With Threat Intelligence Lookup - Try for Free

The potential impact on confidentiality, integrity, and availability is rated high, further emphasizing the urgency for users to apply the patch.

While the vulnerability has not been publicly disclosed nor exploited at the time of the patch release, experts indicate that its exploitability is more likely, making it crucial for users to act swiftly.

Microsoft has confirmed the vulnerability and strongly advises users to update their systems without delay.

To mitigate the risks posed by CVE-2025-21298, Microsoft suggests several best practices:

  1. Update Outlook: The primary defense is to install the official patch immediately. This update fixes the underlying vulnerability and protects against potential exploitation.
  2. Email Viewing Settings: Users are encouraged to configure Microsoft Outlook to read email messages in plain text format. This setting reduces the risk of automatically executing malicious content embedded in rich text formats. For detailed guidance on setting up plain text email viewing, users can refer to Microsoft’s official documentation.
  3. Caution with Attachments: Users should exercise caution when opening RTF files and other attachments from unknown or untrusted sources, as these can be vehicles for exploitation.

In light of CVE-2025-21298’s critical nature, all Outlook users are strongly urged to prioritize updating their software and adhering to the recommended safety practices.

By staying vigilant and proactive, users can significantly mitigate their risk of falling victim to this serious security threat and ensure their systems remain protected against potential exploits.

Integrating Application Security into Your CI/CD Workflows Using Jenkins & Jira -> Free Webinar

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

Windows Ancillary for WinSock 0-Day Vulnerability Actively Exploited to Gain Admin Access

Microsoft has confirmed active exploitation of a critical privilege escalation vulnerability in the Windows...

Earth Ammit Hackers Deploy New Tools to Target Military Drones

The threat actor group known as Earth Ammit, believed to be associated with Chinese-speaking...

New Microsoft Scripting Engine Vulnerability Exposes Systems to Remote Code Attacks

Critical zero-day vulnerability in Microsoft’s Scripting Engine (CVE-2025-30397) has been confirmed to enable remote...

Critical Microsoft Office Vulnerabilities Enable Malicious Code Execution

Microsoft has addressed three critical security flaws in its Office suite, including two vulnerabilities...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Windows Ancillary for WinSock 0-Day Vulnerability Actively Exploited to Gain Admin Access

Microsoft has confirmed active exploitation of a critical privilege escalation vulnerability in the Windows...

Earth Ammit Hackers Deploy New Tools to Target Military Drones

The threat actor group known as Earth Ammit, believed to be associated with Chinese-speaking...

New Microsoft Scripting Engine Vulnerability Exposes Systems to Remote Code Attacks

Critical zero-day vulnerability in Microsoft’s Scripting Engine (CVE-2025-30397) has been confirmed to enable remote...