Among these, CVE-2025-32705-a remote code execution (RCE) vulnerability in Microsoft Outlook has drawn attention due to its potential for local code execution via an out-of-bounds read weakness.
The vulnerability, rated Important with a CVSSv3 score of 7.8, stems from improper memory handling in Outlook.
An attacker could exploit CVE-2025-32705 by sending a specially crafted file to the target user via email or other means.
Once the user opens the malicious file in an affected version of Microsoft Outlook, the out-of-bounds read error can be triggered, allowing the attacker to execute arbitrary code on the local system.
This could lead to complete system compromise, data theft, or further malware deployment.
Notably, the Outlook Preview Pane is not an attack vector for this vulnerability, so simply previewing an email will not trigger the exploit. The user must actively open the malicious file for the attack to succeed.
Microsoft credited Haifei Li from EXPMON for discovering the vulnerability and recognized the broader security community’s role in coordinated vulnerability disclosure.
| Risk Factors | Details |
| Affected Products | Microsoft Office LTSC 2021 (32/64-bit), LTSC 2024 (32/64-bit), Microsoft 365 Apps (32/64-bit) |
| Impact | Remote Code Execution (Arbitrary code execution via local attack vector) |
| Exploit Prerequisites | User must open a specially crafted malicious file in Microsoft Outlook |
| CVSS 3.1 Score | 7.8 (Important) |
Microsoft assigned itself as the CNA (CVE Numbering Authority) for this vulnerability and promptly released security updates as part of the May 2025 Patch Tuesday.
The updates cover multiple editions of Microsoft Office LTSC 2021 and 2024, as well as Microsoft 365 Apps for Enterprise, for both 32-bit and 64-bit systems.
The affected products and update links include:
All updates are classified as Important and address Remote Code Execution vulnerabilities. Users and organizations are strongly urged to apply these patches immediately to mitigate potential exploitation risks.
This vulnerability highlights the ongoing risks posed by out-of-bounds memory errors in widely used software like Microsoft Outlook.
The combination of local attack vector with user interaction requirement underscores the importance of user awareness alongside timely patch management to prevent arbitrary code execution attacks.
Leveraging Defensive AI for Endpoint Security to stop threats with 99.5% accuracy – Join Free Seminar
The post Outlook RCE Vulnerability Allows Attackers to Execute Arbitrary Code appeared first on Cyber Security News.
Today's links Ada Palmer's "Inventing the Renaissance": A tour-de-force, a magnum opus, a work of…
Future The People Do Not Yearn for AutomationNilay Patel | The Verge “Not everything about…
The global energy industry has long depended on seismic data to locate oil and gas…
Artificial intelligence is quietly transforming every corner of modern industry. From predictive maintenance in heavy…
Additive manufacturing has always lived in a bit of a gray area. Some see it…
The global energy industry has long depended on seismic data to locate oil and gas…
This website uses cookies.