DNA View

⚠️ CISA Known Exploited Vulnerability

Active Threat

This vulnerability is listed in CISA's Known Exploited Vulnerabilities (KEV) catalog. Active exploitation has been observed in the wild. This poses significant risk to federal enterprises and should be prioritized for immediate patching.

CVE-2017-11774

High CISA KEV
Low Medium High Critical
7.8
CVSS Score
Published: Oct 13, 2017
Last Modified: Oct 22, 2025

Vulnerability Description

Microsoft Outlook 2010 SP2, Outlook 2013 SP1 and RT SP1, and Outlook 2016 allow an attacker to execute arbitrary commands, due to how Microsoft Office handles objects in memory, aka "Microsoft Outlook Security Feature Bypass Vulnerability."

CVSS Metrics

Common Vulnerability Scoring System

Vector String:

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Attack Vector
L
Attack Complexity
L
Privileges Required
N
User Interaction
R
Scope
U
Confidentiality
H
Integrity
H
Availability
H

Known Affected Software

3 configuration(s) from 1 vendor(s)

outlook
Version:
2013
CPE:
cpe:2.3:a:microsoft:outlook:2013:-:-:*:-:-:*:*
outlook
Version:
2010
CPE:
cpe:2.3:a:microsoft:outlook:2010:sp2:*:*:*:*:*:*
outlook
Version:
2016
CPE:
cpe:2.3:a:microsoft:outlook:2016:*:*:*:*:*:x64:*
This vulnerability affects 3 software configuration(s). Ensure you patch all affected systems.

Severity Details

7.8
out of 10.0
High

CISA KEV Status

Active Exploitation

Listed in CISA's Known Exploited Vulnerabilities catalog

Key Information

Published Date
October 13, 2017