CVE-2024-42220

A library injection vulnerability exists in Microsoft Outlook 16.83.3 for macOS. A specially crafted library can leverage Outlook's access privileges, leading to a permission bypass. A malicious application could inject a library and start the program to trigger this vulnerability and then make use of the vulnerable application's permissions.
Configurations

Configuration 1 (hide)

cpe:2.3:a:microsoft:outlook:16.83.3:*:*:*:*:macos:*:*

History

22 Aug 2025, 21:29

Type Values Removed Values Added
References () https://talosintelligence.com/vulnerability_reports/TALOS-2024-1972 - () https://talosintelligence.com/vulnerability_reports/TALOS-2024-1972 - Exploit, Third Party Advisory
References () https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-1972 - () https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-1972 - Exploit, Third Party Advisory
First Time Microsoft
Microsoft outlook
CPE cpe:2.3:a:microsoft:outlook:16.83.3:*:*:*:*:macos:*:*

19 Dec 2024, 17:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-12-18 23:15

Updated : 2025-08-22 21:29


NVD link : CVE-2024-42220

Mitre link : CVE-2024-42220

CVE.ORG link : CVE-2024-42220


JSON object : View

Products Affected

microsoft

  • outlook
CWE
CWE-347

Improper Verification of Cryptographic Signature