Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-21413— Microsoft Outlook Remote Code Execution Vulnerability

CVSS 9.8 · Critical KEV EPSS 92.96% · P100
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2024-21413

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Microsoft Outlook Remote Code Execution Vulnerability
Source: NVD (National Vulnerability Database)
Vulnerability Description
Microsoft Outlook Remote Code Execution Vulnerability
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Source: NVD (National Vulnerability Database)
Vulnerability Type
输入验证不恰当
Source: NVD (National Vulnerability Database)
Vulnerability Title
Microsoft Outlook 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Microsoft Outlook是美国微软(Microsoft)公司的一套电子邮件应用程序。 Microsoft Outlook 存在安全漏洞。以下产品和版本受到影响:Microsoft Office 2019 for 32-bit editions,Microsoft Office 2019 for 64-bit editions,Microsoft 365 Apps for Enterprise for 32-bit Systems,Microsoft 365 Apps for Enterprise
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Shenlong Deep Dive — AI Deep Analysis

10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.

Affected Products

VendorProductAffected VersionsCPESubscribe
MicrosoftMicrosoft Office 2019 19.0.0 ~ https://aka.ms/OfficeSecurityReleases -
MicrosoftMicrosoft 365 Apps for Enterprise 16.0.1 ~ https://aka.ms/OfficeSecurityReleases -
MicrosoftMicrosoft Office LTSC 2021 16.0.1 ~ https://aka.ms/OfficeSecurityReleases -
MicrosoftMicrosoft Office 2016 16.0.0 ~ 16.0.5435.1001 -

II. Public POCs for CVE-2024-21413

#POC DescriptionSource LinkShenlong Link
1Microsoft Outlook Information Disclosure Vulnerability (leak password hash) - Expect Script POChttps://github.com/duy-31/CVE-2024-21413POC Details
2Microsoft-Outlook-Remote-Code-Execution-Vulnerabilityhttps://github.com/xaitax/CVE-2024-21413-Microsoft-Outlook-Remote-Code-Execution-VulnerabilityPOC Details
3Microsoft Outlook Information Disclosure Vulnerability (leak password hash) - CVE-2024-21413 POChttps://github.com/r00tb1t/CVE-2024-21413-POCPOC Details
4Microsoft Outlook Information Disclosure Vulnerability (leak password hash)https://github.com/labesterOct/CVE-2024-21413POC Details
5CVE-2024-21413 PoC for THM Labhttps://github.com/CMNatic/CVE-2024-21413POC Details
6CVE-2024-21413 Açığını Kullanarak Giriş Bilgilerini Almahttps://github.com/MSeymenD/CVE-2024-21413POC Details
7Nonehttps://github.com/Mdusmandasthaheer/CVE-2024-21413-Microsoft-Outlook-Remote-Code-Execution-VulnerabilityPOC Details
8Bu betik, Microsoft Outlook'ta keşfedilen ve CVSS değeri 9.8 olan önemli bir güvenlik açığı olan CVE-2024-21413 için bir kavram kanıtı (PoC) sunmaktadır. MonikerLink hatası olarak adlandırılan bu güvenlik açığı, yerel NTLM bilgilerinin potansiyel sızıntısı ve uzaktan kod çalıştırma olasılığı dahil olmak üzere geniş kapsamlı etkilere sahiptir.https://github.com/ahmetkarakayaoffical/CVE-2024-21413-Microsoft-Outlook-Remote-Code-Execution-VulnerabilityPOC Details
9CVE-2024-21413 exploithttps://github.com/DevAkabari/CVE-2024-21413POC Details
10Nonehttps://github.com/dshabani96/CVE-2024-21413POC Details
11CVE-2024-21413 Microsoft Outlook RCE Exploithttps://github.com/X-Projetion/CVE-2024-21413-Microsoft-Outlook-RCE-ExploitPOC Details
12Nonehttps://github.com/th3Hellion/CVE-2024-21413POC Details
13This script is the Proof of Concept (PoC) of the CVE-2024-21413, a significant security vulnerability discovered in the Microsoft Windows Outlook having a strong 9.8 critical CVSS score. Named as #MonikerLink Bug, this vulnerability allows the attacker to execute the arbitrary code remotely on the victim's machine, thus becomes a full-fledged RCE. https://github.com/ShubhamKanhere307/CVE-2024-21413POC Details
14CVE-2024-21413 PoChttps://github.com/olebris/CVE-2024-21413POC Details
15This is a mailer that use console prompt to exploit this vulnerabilityhttps://github.com/DerZiad/CVE-2024-21413POC Details
16Nonehttps://github.com/Redfox-Secuirty/Unveiling-Moniker-Link-CVE-2024-21413-Navigating-the-Latest-Cybersecurity-LandscapePOC Details
17Microsoft Outlook Remote Code Execution Vulnerability.https://github.com/HYZ3K/CVE-2024-21413POC Details
18CVE-2024-21413 | Microsoft Outlook Remote Code Execution Vulnerability PoChttps://github.com/ThemeHackers/CVE-2024-21413POC Details
19Nonehttps://github.com/D1se0/CVE-2024-21413-Vulnerabilidad-Outlook-LABPOC Details
20Nonehttps://github.com/Cyber-Trambon/CVE-2024-21413-exploitPOC Details
21The project was created to demonstrate the use of various tools for capturing NTLM hashes from users on a network and for executing phishing attacks using email. This showcases how network authentication vulnerabilities and phishing methods can be exploited to compromise systems.https://github.com/ArtemCyberLab/Project-NTLM-Hash-Capture-and-Phishing-Email-Exploitation-for-CVE-2024-21413POC Details
22Nonehttps://github.com/Redfox-Security/Unveiling-Moniker-Link-CVE-2024-21413-Navigating-the-Latest-Cybersecurity-LandscapePOC Details
23Nonehttps://github.com/PolarisXSec/CVE-2024-21413POC Details
24Nonehttps://github.com/MQKGitHub/Moniker-Link-CVE-2024-21413POC Details
25Nonehttps://github.com/yass2400012/Email-exploit-Moniker-Link-CVE-2024-21413-POC Details
26This repository contains research notes and a high-level proof-of-concept (PoC) for CVE-2024-21413, a vulnerability observed in certain mail clients when handling SMB/moniker-style links embedded in messages. The PoC and experiments documented here were performed in a controlled lab environment on systems.https://github.com/gurleen-147/CVE-2024-21413-Microsoft-Outlook-Remote-Code-Execution-Vulnerability-PoCPOC Details
27Nonehttps://github.com/hau2212/Moniker-Link-CVE-2024-21413-POC Details
28Outlook exploitationhttps://github.com/mmathivanan17/CVE-2024-21413POC Details
29ב־13 בפברואר 2024 פרסמה Microsoft חולשת אבטחה חמורה ב־Microsoft Outlook, אשר קיבלה את הזיהוי CVE-2024-21413, ומוכרת בשם Moniker Link Vulnerability. החולשה מאפשרת לתוקף לעקוף את מנגנון Protected View של Outlookhttps://github.com/eylommaayan/THM---CVE-2024-21413-Moniker-Link-Microsoft-Outlook-POC Details
30Nonehttps://github.com/ViniciusFariasDev/cve-2024-21413-outlook-monikerlink-labPOC Details
31Nonehttps://github.com/dionissh/CVE-2024-21413POC Details
32Technical write-up on CVE-2024-21413 (Moniker Link vulnerability)https://github.com/securenetexpert/CVE-2024-21413-Moniker-Link-WriteupPOC Details
33Laboratorio criado para PenTest da Vuln CVE 2024-214113(MONIKER LINK)https://github.com/SallocinAvalcante/lab-SMB-responder-CVE-2024-21413POC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2024-21413

登录查看更多情报信息。

Same Patch Batch · Microsoft · 2024-02-13 · 72 CVEs total

CVE-2024-214019.8 CRITICALMicrosoft Entra Jira Single-Sign-On Plugin Elevation of Privilege Vulnerability
CVE-2024-214109.8 CRITICALMicrosoft Exchange Server Elevation of Privilege Vulnerability
CVE-2024-213649.3 CRITICALMicrosoft Azure Site Recovery Elevation of Privilege Vulnerability
CVE-2024-214039.0 CRITICALMicrosoft Azure Kubernetes Service Confidential Container Elevation of Privilege Vulnerabi
CVE-2024-213769.0 CRITICALMicrosoft Azure Kubernetes Service Confidential Container Remote Code Execution Vulnerabil
CVE-2024-213538.8 HIGHMicrosoft WDAC ODBC Driver Remote Code Execution Vulnerability
CVE-2024-213688.8 HIGHMicrosoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
CVE-2024-213528.8 HIGHMicrosoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
CVE-2024-213508.8 HIGHMicrosoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
CVE-2024-213698.8 HIGHMicrosoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
CVE-2024-213498.8 HIGHMicrosoft ActiveX Data Objects Remote Code Execution Vulnerability
CVE-2024-213918.8 HIGHMicrosoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
CVE-2024-213728.8 HIGHWindows OLE Remote Code Execution Vulnerability
CVE-2024-213758.8 HIGHMicrosoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
CVE-2024-214208.8 HIGHMicrosoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
CVE-2024-213618.8 HIGHMicrosoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
CVE-2024-213658.8 HIGHMicrosoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
CVE-2024-213678.8 HIGHMicrosoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
CVE-2024-213788.8 HIGHMicrosoft Outlook Remote Code Execution Vulnerability
CVE-2024-213708.8 HIGHMicrosoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability

Showing top 20 of 72 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2024-21413

No comments yet


Leave a comment