Severity
8.8HIGH
EPSS
19.0%
top 4.67%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedAug 17
Latest updateMay 24

Description

A remote code execution vulnerability exists in Microsoft Outlook when the software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could take control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose acco

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:NExploitability: 1.3 | Impact: 3.6

Affected Packages7 packages

CVEListV5microsoft/microsoft_outlook_201616.0.0.0publication
CVEListV5microsoft/microsoft_outlook_2010_service_pack_213.0.0.0publication
CVEListV5microsoft/microsoft_outlook_2013_service_pack_115.0.0.0publication
NVDmicrosoft/outlook2010, 2013, 2016+2
CVEListV5microsoft/microsoft_office_201919.0.0https://aka.ms/OfficeSecurityReleases

Patches

🔴Vulnerability Details

2
GHSA
GHSA-2c4m-3h92-jwwp: A remote code execution vulnerability exists in Microsoft Outlook when the software fails to properly handle objects in memory, aka 'Microsoft Outlook2022-05-24
CVEList
Microsoft Outlook Memory Corruption Vulnerability2020-08-17

📋Vendor Advisories

1
Microsoft
Microsoft Outlook Memory Corruption Vulnerability2020-08-11
CVE-2020-1483 (HIGH CVSS 8.8) | A remote code execution vulnerabili | cvebase.io