MS Outlook Flood Response Vulnerability

MEDIUM (5.0) No Patch (9424 days)

Threat Intelligence

Low Risk
EPSS Score: 13.02% chance of exploitation (percentile: 94%)
🔍 Detection Tools: None available in major open-source tools
⚔️ Exploit Availability: No public exploits found

How we test →

What is it?

Microsoft email clients in Outlook, Exchange, and Windows Messaging automatically respond to Read Receipt and Delivery Receipt tags. This vulnerability allows an attacker to flood a mail system with responses by forging a Read Receipt request that is redirected to a large distribution list, potentially leading to denial-of-service (DoS) attacks or spamming.

Am I affected?

You're affected if you use Microsoft Outlook 2000 or later versions. Check with: net send /noprofile read receipt in the Command Prompt (Windows only).

Note: This vulnerability is specific to Microsoft email clients and not related to other email services like Gmail or Yahoo.

Affected Products

Microsoft / Outlook

How to fix

Upgrade to Microsoft Outlook 2003 or later.
- Alternatively, disable Read Receipt and Delivery Receipt tags using Group Policy Editor (gpedit.msc) on Windows systems.
- For immediate mitigations:
- Use a network-based solution to filter out malicious responses (e.g., using a spam filter).
- Monitor mail server logs for suspicious activity.