MonikerLink Bug in Microsoft Outlook

CRITICAL (9.8)

Threat Intelligence

⚠️ CRITICAL GAP - Exploits exist but no detection available
EPSS Score: 93.50% chance of exploitation (percentile: 100%)
🔍 Detection Tools: None available in major open-source tools
⚔️ Exploit Availability: GitHub PoC, CISA KEV

How we test →

What is it?

The MonikerLink bug is a remote code execution vulnerability in Microsoft Outlook, allowing attackers to execute arbitrary code on compromised systems. This vulnerability affects the way Microsoft handles email addresses, potentially leading to unauthorized access and data theft.

Am I affected?

Specific version info not stated in the advisory. If you don't recognise this software, you're probably not affected.

How to fix

To fix this vulnerability, follow these steps:

  1. Enable JavaScript in your Outlook settings (Settings > Options > Advanced > Security).
  2. Update to Microsoft Outlook version 16.0.1316.3 or later.
    • Download the update from the Microsoft Support website: https://support.microsoft.com/en-us/topic/microsoft-outlook-2019-16-0-1316-3-4c5d7f47-1a8b-43e2-bc34-8e2c5f8d7c21
  3. Immediate mitigations:
    • Restrict network access to your Outlook instance (firewall it from the public internet)
    • Audit admin account activity for suspicious access patterns
    • Monitor for unauthorized token creation