First published: Tue Feb 13 2024(Updated: )
Microsoft Outlook contains an improper input validation vulnerability that allows for remote code execution. Successful exploitation of this vulnerability would allow an attacker to bypass the Office Protected View and open in editing mode rather than protected mode.
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Office 2019 for Mac | ||
Microsoft Office 2019 for Mac | ||
Microsoft Office LTSC 2021 | ||
Microsoft Office LTSC 2021 | ||
Microsoft Office Professional Plus 2016 | ||
Microsoft Office Professional Plus 2016 | ||
Microsoft Outlook | ||
Microsoft 365 Apps for Enterprise | ||
Microsoft 365 Apps for Enterprise | ||
Microsoft 365 Apps for enterprise | ||
Microsoft Office | =2016 | |
Microsoft Office | =2019 | |
Microsoft Office Long Term Servicing Channel | =2021 |
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2024-21413 is categorized as a critical remote code execution vulnerability in Microsoft Outlook.
To mitigate CVE-2024-21413, ensure you apply the latest security updates provided by Microsoft for the affected software.
CVE-2024-21413 affects Microsoft 365 Apps for Enterprise, Microsoft Office 2019, Microsoft Office 2016, Microsoft Office LTSC 2021, and Microsoft Exchange Server.
Yes, CVE-2024-21413 can be exploited remotely, potentially allowing attackers to execute arbitrary code on affected systems.
Exploitation of CVE-2024-21413 could lead to unauthorized access, data breaches, and complete control of affected systems.