Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Email Security

Microsoft Patches Critical Zero-Click Outlook Vulnerability Threatening Enterprises

CVE-2026-40361 is similar to a vulnerability found a decade ago, BadWinmail, which at the time was dubbed an “enterprise killer”.

Microsoft Outlook exploit

One of the 137 vulnerabilities patched by Microsoft with its Patch Tuesday updates is a critical Outlook flaw that could pose a serious threat to enterprises.

The Outlook vulnerability is tracked as CVE-2026-40361 and it has been described by Microsoft as a remote code execution vulnerability affecting Word. 

Haifei Li, developer of the zero-day detection system Expmon, has been credited by the tech giant for reporting the vulnerability.

In a post on X, Li explained that the vulnerability affects a DLL used heavily by both Word and Outlook, and he demonstrated its potential impact in an Outlook and Exchange Server environment.

According to the researcher, CVE-2026-40361 is a zero-click use-after-free bug that can be exploited for remote code execution against Outlook users.

“You definitely want to patch this sooner rather than later,” Li warned, adding, “The danger of such 0-click bugs in Outlook is that they are triggered as soon as the victim reads or previews the email — no clicking of links or attachments is required.”

“Since the bugs reside in Outlook’s email rendering engine, it is difficult to mitigate or block (though specifically setting Outlook to render emails only in plain text format is a valid mitigation),” the researcher said.

Advertisement. Scroll to continue reading.

Li compared CVE-2026-40361 to an Outlook vulnerability he discovered more than a decade ago. That flaw, tracked as CVE-2015-6172 and named BadWinmail, was dubbed an “enterprise killer” at the time by the researcher, and the new flaw has the same attack vector and the same potential impact.

“Essentially, anyone could compromise a CEO or CFO just by sending an email,” Li explained. “The threat perfectly bypasses enterprise firewalls and is delivered directly to the inbox.”

Microsoft has assigned the vulnerability an ‘exploitation more likely’ rating. 

On the other hand, Li admitted that he developed only a PoC for CVE-2026-40361, rather than a working exploit that achieves code execution. He noted that while developing a working exploit would not be easy, the creativity of threat actors should not be underestimated.

Related: Adobe Patches 52 Vulnerabilities in 10 Products

Related: FBI Confirms Kash Patel Email Hack as US Offers $10M Reward for Hackers

Related: Flickr Security Incident Tied to Third-Party Email System

Written By

Eduard Kovacs (@EduardKovacs) is senior managing editor at SecurityWeek. He worked as a high school IT teacher before starting a career in journalism in 2011. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

In cyber-physical systems (CPS), just one hour of downtime can outweigh an entire annual security budget. Learn how to master the Return on Security Investment (ROSI) to align security goals with the bottom-line priorities.

Register

Delve into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization.

Register

People on the Move

Malwarebytes has named Chung Ip as Chief Financial Officer.

Semperis has appointed John Podboy as Chief Information Security Officer.

Randy Menon has become Chief Product and Marketing Officer at One Identity.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.