• US government warns users

    From Mike Powell@1:2320/105 to All on Fri Feb 7 11:12:00 2025
    US government warns users to patch this critical Microsoft Outlook bug

    Date:
    Fri, 07 Feb 2025 13:04:00 +0000

    Description:
    A critical Outlook flaw is being actively exploited to run code remotely.

    FULL STORY ======================================================================
    - CISA adds an Outlook improper input validation bug to KEV
    - The deadline to patch is February 27 2025
    - Criminals are using it for remote code execution

    The US Cybersecurity and Infrastructure Security Agency (CISA) has added a
    2024 Outlook flaw to its catalog of known vulnerabilities, warning users
    about in-the-wild abuse, and giving federal agencies three weeks (until February 27) to patch up or stop using the tool entirely.

    CVE-2024-21413 is an improper input validation flaw plaguing Microsoft
    Outlook. It was discovered in 2024 by Check Points researcher Haifei Li, and was given a severity score of 9.8/10 (critical). Cybercriminals could craft special email messages, loaded with a certain type of hyperlink, that would allow them to run arbitrary code remotely. By exploiting this vulnerability, attackers can bypass Outlook's Protected View (a feature designed to open potentially harmful files in read-only mode) and instead open malicious files in editing mode.

    Microsoft patched the bug in late 2024, and warned users that the Preview
    Pane can also be used as an attack vector. In other words, victims dont even need to open the email to get infected - previewing it in Outlook would suffice.

    Significant risk

    The vulnerability was found in different Office products, including Microsoft Office LTSC 2021, Microsoft 365 Apps for Enterprise, Microsoft Outlook 2016, and Microsoft Office 2019.

    While there was no evidence of in-the-wild abuse at the time the patch was released, its addition to KEV means the vulnerability is now being actively used by miscreants.

    "These types of vulnerabilities are frequent attack vectors for malicious
    cyber actors and pose significant risks to the federal enterprise," CISA
    says.

    Aside from the Outlook vulnerability, the agency added another four bugs, including a 7-Zip Mark of the Web bypass flaw, a Dante discovery process control flaw, a CyberoamsOS SQL injection flaw, and a Sophos XG Firewall
    buffer overflow bug. Federal agencies need to patch all of these before March 2025.

    ======================================================================
    Link to news story: https://www.techradar.com/pro/security/us-government-warns-users-to-patch-this -critical-microsoft-outlook-bug

    $$
    --- SBBSecho 3.20-Linux
    * Origin: capitolcityonline.net * Telnet/SSH:2022/HTTP (1:2320/105)