Microsoft Patches Critical Zero-Click Outlook Vulnerability Threatening Enterprises
Microsoft patches critical zero-click Outlook RCE vulnerability CVE-2026-40361 affecting enterprises.
Summary
Microsoft released a patch for CVE-2026-40361, a critical zero-click remote code execution vulnerability in Outlook's email rendering engine that can be exploited when victims read or preview emails. Researcher Haifei Li, who discovered the flaw, compared it to BadWinmail (CVE-2015-6172), an "enterprise killer" vulnerability from over a decade ago with identical attack vectors. The vulnerability affects a DLL shared by Word and Outlook, and while Microsoft rated it as "exploitation more likely," Li emphasized that threat actors should not be underestimated despite only releasing a proof-of-concept.
Full text
One of the 137 vulnerabilities patched by Microsoft with its Patch Tuesday updates is a critical Outlook flaw that could pose a serious threat to enterprises. The Outlook vulnerability is tracked as CVE-2026-40361 and it has been described by Microsoft as a remote code execution vulnerability affecting Word. Haifei Li, developer of the zero-day detection system Expmon, has been credited by the tech giant for reporting the vulnerability.In a post on X, Li explained that the vulnerability affects a DLL used heavily by both Word and Outlook, and he demonstrated its potential impact in an Outlook and Exchange Server environment. According to the researcher, CVE-2026-40361 is a zero-click use-after-free bug that can be exploited for remote code execution against Outlook users. “You definitely want to patch this sooner rather than later,” Li warned, adding, “The danger of such 0-click bugs in Outlook is that they are triggered as soon as the victim reads or previews the email — no clicking of links or attachments is required.” “Since the bugs reside in Outlook’s email rendering engine, it is difficult to mitigate or block (though specifically setting Outlook to render emails only in plain text format is a valid mitigation),” the researcher said.Advertisement. Scroll to continue reading. Li compared CVE-2026-40361 to an Outlook vulnerability he discovered more than a decade ago. That flaw, tracked as CVE-2015-6172 and named BadWinmail, was dubbed an “enterprise killer” at the time by the researcher, and the new flaw has the same attack vector and the same potential impact. “Essentially, anyone could compromise a CEO or CFO just by sending an email,” Li explained. “The threat perfectly bypasses enterprise firewalls and is delivered directly to the inbox.” Microsoft has assigned the vulnerability an ‘exploitation more likely’ rating. On the other hand, Li admitted that he developed only a PoC for CVE-2026-40361, rather than a working exploit that achieves code execution. He noted that while developing a working exploit would not be easy, the creativity of threat actors should not be underestimated. Related: Adobe Patches 52 Vulnerabilities in 10 Products Related: FBI Confirms Kash Patel Email Hack as US Offers $10M Reward for Hackers Related: Flickr Security Incident Tied to Third-Party Email System Written By Eduard Kovacs Eduard Kovacs (@EduardKovacs) is senior managing editor at SecurityWeek. He worked as a high school IT teacher before starting a career in journalism in 2011. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering. More from Eduard Kovacs BWH Hotels Says Hackers Had Access to Reservation Data for 6 MonthsApple Patches Dozens of Vulnerabilities in macOS, iOSClaude Mythos Finds Only One Curl Vulnerability; Experts Divided on What It Really MeansFrame Security Emerges From Stealth With $50M for Awareness and Training PlatformGoogle Detects First AI-Generated Zero-Day ExploitCloudflare Lays Off 1,100 Employees in AI-Driven RestructuringNew ‘Dirty Frag’ Linux Vulnerability Possibly Exploited in AttacksPolish Security Agency Reports ICS Breaches at Five Water Treatment Plants Latest News 716,000 Impacted by OpenLoop Health Data BreachFortinet, Ivanti Patch Critical VulnerabilitiesChipmaker Patch Tuesday: Intel and AMD Patch 70 VulnerabilitiesHundreds of Malicious Packages Force RubyGems to Suspend RegistrationsICS Patch Tuesday: New Security Advisories From Siemens, Schneider, CISAMicrosoft Patches 137 VulnerabilitiesExaforce Raises $125 Million for Agentic SOC PlatformAdobe Patches 52 Vulnerabilities in 10 Products Trending Daily Briefing NewsletterSubscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts. Webinar: ROSI for CPS Security Programs May 13, 2026 In cyber-physical systems (CPS), just one hour of downtime can outweigh an entire annual security budget. Learn how to master the Return on Security Investment (ROSI) to align security goals with the bottom-line priorities. Register Virtual Event: Threat Detection and Incident Response Summit May 20, 2026 Delve into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization. Register People on the MoveMalwarebytes has named Chung Ip as Chief Financial Officer.Semperis has appointed John Podboy as Chief Information Security Officer.Randy Menon has become Chief Product and Marketing Officer at One Identity.More People On The MoveExpert Insights Is the SOC Obsolete, and We Just Haven’t Admitted It Yet? Many AI-first enterprises have already embraced sovereign architectures for general AI initiatives; cybersecurity—and the SOC—should be next. (Danelle Au) The Mythos Moment: Enterprises Must Fight Agents with Agents Only with the right platform and an agentic, AI-driven defense, will enterprises be able to protect themselves in the agentic era. (Etay Maor) Why Cybersecurity Must Rethink Defense in the Age of Autonomous Agents From autonomous code generation to decision-making systems that initiate actions without human intervention, the industry is entering a new phase. (Torsten George) Government Can’t Win the Cyber War Without the Private Sector Securing national resilience now depends on faster, deeper partnerships with the private sector. (Steve Durbin) The Hidden ROI of Visibility: Better Decisions, Better Behavior, Better Security Beyond monitoring and compliance, visibility acts as a powerful deterrent, shaping user behavior, improving collaboration, and enabling more accurate, data-driven security decisions. (Joshua Goldfarb) Flipboard Reddit Whatsapp Whatsapp Email
Indicators of Compromise
- cve — CVE-2026-40361
- cve — CVE-2015-6172