Security experts at Morphisec recently uncovered a significant security flaw in Outlook. Known as CVE-2024-38021, this vulnerability allows remote code execution (RCE) without the need for any user interaction.
The vulnerability affects most Microsoft Outlook applications and poses serious risks such as data breaches, unauthorized access, and the execution of malicious code.
The fact that this vulnerability does not require user authentication makes it extremely dangerous and urgent to address. While Microsoft initially classified it as a “high” risk, security researchers suggest it should be considered “critical” and assume that it is already being actively exploited.
Although Morphisec reported CVE-2024-38021 at the end of April and Microsoft confirmed it shortly after, a security patch was not released until July 9 as part of the Tuesday updates.
Given the assumption that attackers are already taking advantage of this security flaw, it is crucial to act promptly. Ensure that all Microsoft Outlook and Office applications are updated with the latest patches as soon as possible to mitigate the risks.
For added security, consider implementing additional measures such as setting up authentication and disabling automatic email previews, especially if you use Outlook for business purposes.
Laura, a dedicated gamer and entertainment enthusiast, has a background in communication science and has been writing about technology and PC-related topics since her time at PCMagazin and Connect Living. As a permanent editor at PC-WELT since May 2024, she continues to share her expertise in the field.