A newly identified vulnerability, CVE-2024-30103, in Microsoft Outlook poses a serious cybersecurity threat. This "zero-click" remote code execution (RCE) flaw can be exploited simply by opening and previewing an email that contains a malicious payload in the body of the email, requiring no further interaction from the user. Although there are no known exploits in the wild yet, it is crucial for organizations to update their Outlook installs with the Microsoft patch as soon as possible.
The CVE-2024-30103 vulnerability leverages a flaw in how Microsoft Outlook handles specific types of email content. An attacker can embed malicious code within the body of an email, which gets executed as soon as the email is opened. This can lead to unauthorized access, data breaches, and further network compromise.
Despite no exploits being reported (as of this writing), the potential impact of this vulnerability necessitates urgent attention. Assume that cybercriminals are already working on ways to exploit this flaw, making preemptive measures essential.
Here at IRONSCALES, we forced an immediate update to every device using Microsoft Outlook. Here are the steps we used:
Log in to the M365 Admin Center:
Set Update Channel:
Force Immediate Update Deadline:
Log in to Microsoft Intune:
Configure Update Channel via Intune:
Set Update Deadline in Intune:
Save and Deploy:
Acting now to update Microsoft Outlook will significantly reduce the risk posed by the CVE-2024-30103 vulnerability. While different organizations may use various tools or methods, the strategy remains the same: enforce immediate updates to protect against potential exploitation.