Critical Zero-Click Windows Vulnerability Patched by PoC Release

1 min read


Researchers discovered a critical zero-click Windows vulnerability that allows remote code execution without user interaction. The vulnerability was introduced in a Microsoft patch and can be triggered through Outlook and File Explorer. Despite patching, new bypasses and vulnerabilities were found, highlighting the importance of ongoing security evaluations.

Microsoft’s wide reach makes it a target for attackers who study vulnerabilities in their products. Researchers at Akamai found a zero-click RCE vulnerability in Windows, triggered by Outlook and File Explorer.

The vulnerability, introduced in a Microsoft patch, allowed for zero-click remote code execution against the Outlook client. Despite patching, new vulnerabilities were found, emphasizing the need for ongoing security evaluations even in fixed components.

The patch aimed at mitigating the initial flaw created a new attack surface, demonstrating the complexity of vulnerability analysis and patch development.

Researchers at Akamai explored methods of making Windows Explorer vulnerable through a shortcut (.lnk file) to an insecure path, showing the importance of analyzing patches for vulnerabilities.

Overall, the discovery of this critical zero-click Windows vulnerability highlights the importance of comprehensive security evaluations and ongoing vigilance in the face of evolving threats.

Previous Story

Delinea launches Secret Server patches addressing crucial vulnerability

Next Story

Increased cyber attacks target open source projects in latest trends

Latest from News