{"uuid": "a8826d4d-8b90-4261-8037-95b49377a690", "vulnerability": {"vulnId": "CVE-2024-21413", "altId": []}, "gcve": {"origin_uuid": "405284c2-e461-4670-8979-7fd2c9755a60", "object_uuid": "a8826d4d-8b90-4261-8037-95b49377a690"}, "status": {"exploited": true, "status_reason": "confirmed", "status_updated_at": "2025-02-06T00:00:00+00:00"}, "characteristics": {}, "timestamps": {"asserted_at": "2025-02-06T00:00:00Z", "recorded_at": "2026-02-02T13:24:01Z", "first_seen_at": "2025-02-06T00:00:00Z"}, "scope": {"notes": "KEV entry: Microsoft Outlook Improper Input Validation Vulnerability | Affected: Microsoft / Office Outlook | Description: Microsoft Outlook contains an improper input validation vulnerability that allows for remote code execution. Successful exploitation of this vulnerability would allow an attacker to bypass the Office Protected View and open in editing mode rather than protected mode. | Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Due date: 2025-02-27 | Known ransomware campaign use (KEV): Unknown | Notes (KEV): https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21413 ; https://nvd.nist.gov/vuln/detail/CVE-2024-21413"}, "evidence": [{"type": "vendor_report", "source": "cisa-kev", "signal": "successful_exploitation", "confidence": 0.8, "details": {"cwes": ["CWE-20"], "feed": "CISA Known Exploited Vulnerabilities Catalog", "product": "Office Outlook", "due_date": "2025-02-27", "date_added": "2025-02-06", "vendorProject": "Microsoft", "vulnerabilityName": "Microsoft Outlook Improper Input Validation Vulnerability", "knownRansomwareCampaignUse": "Unknown"}}], "references": [{"id": "CVE-2024-21413", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2024-21413"}]}
