Microsoft Patches Critical Zero-Click Outlook Vulnerability Threatening Enterprises
Security WeekArchived May 13, 2026✓ Full text saved
CVE-2026-40361 is similar to a vulnerability found a decade ago, BadWinmail, which at the time was dubbed an “enterprise killer”. The post Microsoft Patches Critical Zero-Click Outlook Vulnerability Threatening Enterprises appeared first on SecurityWeek .
Full text archived locally
✦ AI Summary· Claude Sonnet
One of the 137 vulnerabilities patched by Microsoft with its Patch Tuesday updates is a critical Outlook flaw that could pose a serious threat to enterprises.
The Outlook vulnerability is tracked as CVE-2026-40361 and it has been described by Microsoft as a remote code execution vulnerability affecting Word.
Haifei Li, developer of the zero-day detection system Expmon, has been credited by the tech giant for reporting the vulnerability.
In a post on X, Li explained that the vulnerability affects a DLL used heavily by both Word and Outlook, and he demonstrated its potential impact in an Outlook and Exchange Server environment.
According to the researcher, CVE-2026-40361 is a zero-click use-after-free bug that can be exploited for remote code execution against Outlook users.
“You definitely want to patch this sooner rather than later,” Li warned, adding, “The danger of such 0-click bugs in Outlook is that they are triggered as soon as the victim reads or previews the email — no clicking of links or attachments is required.”
“Since the bugs reside in Outlook’s email rendering engine, it is difficult to mitigate or block (though specifically setting Outlook to render emails only in plain text format is a valid mitigation),” the researcher said.
Li compared CVE-2026-40361 to an Outlook vulnerability he discovered more than a decade ago. That flaw, tracked as CVE-2015-6172 and named BadWinmail, was dubbed an “enterprise killer” at the time by the researcher, and the new flaw has the same attack vector and the same potential impact.
“Essentially, anyone could compromise a CEO or CFO just by sending an email,” Li explained. “The threat perfectly bypasses enterprise firewalls and is delivered directly to the inbox.”
Microsoft has assigned the vulnerability an ‘exploitation more likely’ rating.
On the other hand, Li admitted that he developed only a PoC for CVE-2026-40361, rather than a working exploit that achieves code execution. He noted that while developing a working exploit would not be easy, the creativity of threat actors should not be underestimated.
Related: Adobe Patches 52 Vulnerabilities in 10 Products
Related: FBI Confirms Kash Patel Email Hack as US Offers $10M Reward for Hackers
Related: Flickr Security Incident Tied to Third-Party Email System
WRITTEN BY
Eduard Kovacs
Eduard Kovacs (@EduardKovacs) is senior managing editor at SecurityWeek. He worked as a high school IT teacher before starting a career in journalism in 2011. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.
More from Eduard Kovacs
BWH Hotels Says Hackers Had Access to Reservation Data for 6 Months
Apple Patches Dozens of Vulnerabilities in macOS, iOS
Claude Mythos Finds Only One Curl Vulnerability; Experts Divided on What It Really Means
Frame Security Emerges From Stealth With $50M for Awareness and Training Platform
Google Detects First AI-Generated Zero-Day Exploit
Cloudflare Lays Off 1,100 Employees in AI-Driven Restructuring
New ‘Dirty Frag’ Linux Vulnerability Possibly Exploited in Attacks
Polish Security Agency Reports ICS Breaches at Five Water Treatment Plants
Latest News
Government to Scrutinize Instructure on Canvas Disruption, Data Breach
716,000 Impacted by OpenLoop Health Data Breach
Fortinet, Ivanti Patch Critical Vulnerabilities
Chipmaker Patch Tuesday: Intel and AMD Patch 70 Vulnerabilities
Hundreds of Malicious Packages Force RubyGems to Suspend Registrations
ICS Patch Tuesday: New Security Advisories From Siemens, Schneider, CISA
Microsoft Patches 137 Vulnerabilities
Exaforce Raises $125 Million for Agentic SOC Platform
Trending
Webinar: ROSI For CPS Security Programs
May 13, 2026
In cyber-physical systems (CPS), just one hour of downtime can outweigh an entire annual security budget. Learn how to master the Return on Security Investment (ROSI) to align security goals with the bottom-line priorities.
Register
Virtual Event: Threat Detection And Incident Response Summit
May 20, 2026
Delve into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization.
Register
People on the Move
Malwarebytes has named Chung Ip as Chief Financial Officer.
Semperis has appointed John Podboy as Chief Information Security Officer.
Randy Menon has become Chief Product and Marketing Officer at One Identity.
More People On The Move
Expert Insights
Is The SOC Obsolete, And We Just Haven’t Admitted It Yet?
Many AI-first enterprises have already embraced sovereign architectures for general AI initiatives; cybersecurity—and the SOC—should be next. (Danelle Au)
The Mythos Moment: Enterprises Must Fight Agents With Agents
Only with the right platform and an agentic, AI-driven defense, will enterprises be able to protect themselves in the agentic era. (Etay Maor)
Why Cybersecurity Must Rethink Defense In The Age Of Autonomous Agents
From autonomous code generation to decision-making systems that initiate actions without human intervention, the industry is entering a new phase. (Torsten George)
Government Can’t Win The Cyber War Without The Private Sector
Securing national resilience now depends on faster, deeper partnerships with the private sector. (Steve Durbin)
The Hidden ROI Of Visibility: Better Decisions, Better Behavior, Better Security
Beyond monitoring and compliance, visibility acts as a powerful deterrent, shaping user behavior, improving collaboration, and enabling more accurate, data-driven security decisions. (Joshua Goldfarb)
Flipboard
Reddit
Whatsapp
Email