Remote Code Execution Vulnerability in Microsoft Outlook by Microsoft
CVE-2020-1349

7.8HIGH

Key Information:

Badges

👾 Exploit Exists🟡 Public PoC

Summary

A remote code execution vulnerability has been identified in Microsoft Outlook. This vulnerability arises when Outlook improperly manages objects in memory, potentially allowing an attacker to execute arbitrary code within the context of the application. An attacker exploiting this vulnerability could gain the same user privileges as the logged-in user. Successful exploitation might enable the attacker to install programs; view, change, or delete data; or create new accounts with full user rights. Mitigating this risk involves applying the latest security patches provided by Microsoft.

Affected Version(s)

Microsoft 365 Apps for Enterprise for 32-bit Systems = unspecified

Microsoft 365 Apps for Enterprise for 64-bit Systems = unspecified

Microsoft Office 2019 for 32-bit editions

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

CVSS V3.1

Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged

Timeline

  • 🟡

    Public PoC available

  • 👾

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

.