CVE-2024-21378
vulnerability analysis and mitigation

Overview

CVE-2024-21378 is a remote code execution vulnerability in Microsoft Outlook discovered in 2023 by NetSPI. The vulnerability was disclosed to Microsoft on September 29, 2023, and a patch was released on February 13, 2024. The vulnerability affects Microsoft Outlook and various Microsoft Office products including Microsoft 365 Apps Enterprise, Office 2019, Office LTSC 2021, and Outlook 2016 (NetSPI Blog).

Technical details

The vulnerability exists in Outlook's form syncing capability, specifically in how it handles IPM.Microsoft.FolderDesign.FormsDescription objects. The vulnerability allows authenticated users to create arbitrary registry keys under HKCR, place files at arbitrary locations on disk, and create forms that when executed lead to Outlook loading registered COM objects by CLSID. The vulnerability has a CVSS v3.1 base score of 8.8 (HIGH) with vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H (NVD).

Impact

When successfully exploited, the vulnerability allows an authenticated attacker to execute arbitrary code through Microsoft Outlook. The attacker could gain the ability to create registry keys, write files to disk, and execute code within the context of the Outlook process (NetSPI Blog).

Mitigation and workarounds

Microsoft has released security updates to address this vulnerability. Users should apply the latest security patches available through Microsoft Update. The fix was released on February 13, 2024, as part of Microsoft's regular patch cycle (Microsoft Support).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
David EstlickCISO
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
Adam FletcherChief Security Officer
“We know that if Wiz identifies something as critical, it actually is.”
Greg PoniatowskiHead of Threat and Vulnerability Management