Categories: Microsoft

Microsoft Outlook RCE Zero-day Exploits Now Selling for $400,000

Microsoft Outlook RCE Zero-day Exploits Now Selling for $400,000

Exploit broker Zerodium has announced a pay jump to 400,000 for zero-day vulnerabilities that allow remote code execution (RCE) in Microsoft Outlook email client.

The new payout is not permanent, the company says in a short tweet, but the end date for submissions is still to be disclosed.

Also Read: How to Send Mass Email Without Showing Addresses: 2 Great Workarounds

Zero-click exploits expected

Zerodium’s regular bounty for RCE vulnerability in Microsoft Outlook for windows is $250,000, expected to be “accompanied by a fully functional and reliable exploit.”

For $400,000, Zerodium is awaiting an exploit that achieves remote code execution without any interaction, the so-called ‘zero-click,’ when Microsoft’s email client is receiving or downloading messages.

“We are temporarily increasing our payout for Microsoft Outlook RCEs from $250,000 to $400,000. We are looking for zero-click exploits leading to remote code execution when receiving/downloading emails in Outlook, without requiring any user interaction such as reading the malicious email message or opening an attachment” – Zerodium

The company is not ruling out a bounty for exploits that require an email to be opened or read, although the submitter will get a lower, undisclosed payout.

Zerodium is also reminding that it currently offers up to $200,000 for exploits leading to remote code execution in Mozilla Thunderbird, the same amount offered since 2019.

source: Zerodium

The same conditions apply for the exploit payouts for Mozilla Thunderbird as in the case of Microsoft Outlook. An RCE in an email client would grant attackers access to all available accounts.

While the company did not specify an end date for submitting zero-click Microsoft Outlook exploits, the period may be quite long.

Also Read: CCTV Law Singapore Edition: Know Your Rights and Responsibilities

On March 31, 2021, Zerodium announced that it was temporarily tripling the bounty for WordPress RCE exploits and the offer still stands today.

The regular payout for an exploit in the most popular open-source content management system (CMS) is $100.000.

At the moment, only WordPress, Mozilla Thunderbird, and Microsoft Outlook are listed as active on the page with temporarily increased bounties.

Recently expired temporary offers are for RCE and sandbox escape in Google Chrome (both up to $400,000), and RCE in VMware vCenter server (up to $150,000).

Privacy Ninja

Recent Posts

Role of Enhanced Access Controls in Safeguarding Personal Data in Telecommunications

Role of Enhanced Access Controls in Safeguarding Personal Data in Telecommunications that every Organisation in…

1 week ago

Role of Effective Incident Response Procedures in Strengthening Data Security

Effective Incident Response Procedures in Strengthening Data Security that every Organisation in Singapore should know…

1 week ago

Strengthening Your Cyber Defenses: The Crucial Role of Regular Vulnerability Scanning

Crucial Role of Regular Vulnerability Scanning that every Organisation in Singapore should know. Strengthening Your…

1 week ago

Enhancing Data Security with Multi-Factor Authentication

Enhancing Data Security with Multi-Factor Authentication that every Organisation in Singapore should know. Enhancing Data…

2 weeks ago

A Strong Password Policy: Your Organization’s First Line of Defense Against Data Breaches

Strong Password Policy as a first line of defense against data breaches for Organisations in…

2 weeks ago

Enhancing Website Security: The Importance of Efficient Access Controls

Importance of Efficient Access Controls that every Organisation in Singapore should take note of. Enhancing…

3 weeks ago