Skip to content
logo The magazine for digital lifestyle and entertainment
January Patchday

Dangerous Security Vulnerability in Outlook Mail! Microsoft Urgently Recommends an Update

Outlook logo and lettering
Microsoft has now addressed a critical security vulnerability in Outlook Photo: Getty Images

January 18, 2025, 9:37 am | Read time: 3 minutes

On the occasion of the January Patchday, Microsoft has once again addressed many errors and problem areas. One security vulnerability in Outlook is particularly critical.

Share article

In everyday life, consumers hardly notice, but the provision of internet services is like a constant arms race between companies that want to ensure the security of their products and customers and cybercriminals. As a result, new problems are constantly arising that manufacturers have to solve. Microsoft is no exception and has made improvements in several areas for the January patch day. One security vulnerability in Outlook stands out.

Vulnerability in Outlook Classified as Critical

The core issue is the security vulnerability in Outlook, which is designated as CVE-2025-21298. As Microsoft itself writes, this has received a CVSS base score of 9.8 and is therefore considered particularly serious. The CVSS is a standard for classifying the severity of security vulnerabilities. Specifically, it concerns OLE technology (Object Linking and Embedding). This enables embedding and linking with documents and other objects.

The manufacturer mentions remote code execution as a possible effect of the security gap in Outlook. For this, the perpetrators prepare emails with malicious code and send them. The victim does not even have to actively open the message to inject the malicious software. In fact, a preview in the Outlook program is said to be enough to trigger the dangerous process.

Microsoft classifies the complexity of the attack as low. This means that it is comparatively easy to exploit the corresponding vulnerability in Outlook – at least not many prerequisites are necessary.

More on the topic

Be Sure to Install Patches

According to the Zero Day Initiative, there is an error in the analysis of RTF files that makes the security risk possible in the first place. This means that usage data is not validated correctly. This could, in turn, lead to memory corruption. All previous versions of Windows 10 and 11 as well as Windows Server 2008 (R2), 2012, 2016, 2019, 2022, and 2025 are affected.

Nevertheless, Microsoft is not currently aware of any cases of CVE-2025-21298 being exploited. Nevertheless, those responsible believe it is likely that this could still happen. The company has already provided patches that users should install quickly. As an alternative workaround, Microsoft also mentions the option of reading emails in “text-only” format. This is because the messages do not contain any images, special fonts, animations, or other rich text content, which are responsible for the security vulnerability in Outlook in the first place.

According to the Zero Day Initiative, Microsoft has its hands full with keeping its own systems secure: This month alone, they have published and worked on 161 different vulnerabilities of varying severity.

This article is a machine translation of the original German version of TECHBOOK and has been reviewed for accuracy and quality by a native speaker. For feedback, please contact us at info@techbook.de.

Topics Microsoft News Security Windows
Your data privacy when using the share function
To share this article or other content via social networks, we need your consent for this .
You have successfully withdrawn your consent to the processing of personal data through tracking and advertising when using this website. You can now consent to data processing again or object to legitimate interests.