383
VMScore

CVE-2020-1493

Published: 17/08/2020 Updated: 19/01/2024
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
CVSS v3 Base Score: 5.5 | Impact Score: 3.6 | Exploitability Score: 1.8
VMScore: 383
Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N

Vulnerability Summary

An information disclosure vulnerability exists when attaching files to Outlook messages. This vulnerability could potentially allow users to share attached files such that they are accessible by anonymous users where they should be restricted to specific users. To exploit this vulnerability, an attacker would have to attach a file as a link to an email. The email could then be shared with individuals that should not have access to the files, ignoring the default organizational setting. The security update addresses the vulnerability by correcting how Outlook handles file attachment links.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

microsoft outlook 2016

microsoft outlook 2010

microsoft outlook 2013

microsoft office 2019

microsoft 365 apps -

Github Repositories

CVE-2020-1493 This vulnerability occurs in Outlook 2019 (1601262420424) installed on Windows 10 1909 x64, Also This vulnerability is zero click vulnerability TLDR; I found this bug usng winafl fuzzer This bug occured when parsing ms-tnef file that attachement of eml file vulnerable method read and using out-of-bounds data to vftable ptr so, when attacker succeceful expl