Description
An information disclosure vulnerability exists when attaching files to Outlook messages. This vulnerability could potentially allow users to share attached files such that they are accessible by anonymous users where they should be restricted to specific users. To exploit this vulnerability, an attacker would have to attach a file as a link to an email. The email could then be shared with individuals that should not have access to the files, ignoring the default organizational setting. The security update addresses the vulnerability by correcting how Outlook handles file attachment links.
Exploits (1)
References (2)
Core 2
Core References
Third Party Advisory, VDB Entry
http://packetstormsecurity.com/files/169960/Microsoft-Outlook-2019-16.0.12624.20424-Out-Of-Bounds-Read.html
Patch, Vendor Advisory
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1493
Scores
CVSS v3
5.5
EPSS
0.3033
EPSS Percentile
96.7%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
no
Technical Impact
partial
Details
CWE
CWE-922
Status
published
Products (5)
microsoft/365_apps
microsoft/office
2019
microsoft/outlook
2010 sp2
microsoft/outlook
2013 sp1 (2 CPE variants)
microsoft/outlook
2016
Published
Aug 17, 2020
Tracked Since
Feb 18, 2026