Site icon WinCert

Microsoft fixes major Outlook security flaw in June update

<p>This month’s &&num;8220&semi;Patch Tuesday&&num;8221&semi; update from Microsoft addressed a significant security flaw in Outlook&period; Most systems should have received the update automatically&comma; but users who have disabled Windows Update should re-enable it and apply the patch immediately&period; This vulnerability allows an attack to occur simply by opening an email&period;<&sol;p>&NewLine;<p><img class&equals;"alignnone size-full wp-image-5457" src&equals;"https&colon;&sol;&sol;www&period;wincert&period;net&sol;wp-content&sol;uploads&sol;2024&sol;06&sol;control-2633861&lowbar;640&period;png" alt&equals;"" width&equals;"640" height&equals;"336" &sol;><&sol;p>&NewLine;<p>The security company Morphisec discovered the threat and explained that this flaw is especially dangerous as it allows attackers to control the victim’s computer remotely&comma; potentially spreading malware&comma; installing ransomware&comma; or stealing sensitive information&period;<&sol;p>&NewLine;<p>Morphisec collaborated with Microsoft to address the issue and did not disclose the vulnerability until Microsoft released a fix&period; Detailed technical information about the bug will be shared at a security conference later this year&period;<&sol;p>&NewLine;<p>The vulnerability is activated when a user opens a compromised email in most Microsoft Outlook clients&comma; without needing to open an attachment or click a link&period; This is particularly risky as some Outlook clients automatically open the first email in the inbox upon startup&comma; increasing the chance of an attack if the first email is malicious&period;<&sol;p>&NewLine;<p>Microsoft identified the bug as CVE-2024-30103 and did include a fix in the June 2024 Security Update&comma; which began rolling out on June 11&period; The company classified the bug as &&num;8220&semi;important&&num;8221&semi; rather than &&num;8220&semi;critical&&num;8221&semi; since there is no evidence yet of active exploitation by hackers&period; However&comma; now that the flaw is public&comma; the risk of exploitation could increase&period;<&sol;p>&NewLine;<p>Microsoft advises users to keep security updates set to download and install automatically&period; Those who have chosen manual updates should immediately install the fix if they use Outlook&period;<&sol;p>&NewLine;

Exit mobile version