Home > Common Problem > Zerodium announces $400,000 payout for Microsoft Outlook Zero-Click RCE security vulnerability

Zerodium announces $400,000 payout for Microsoft Outlook Zero-Click RCE security vulnerability

王林
Release: 2023-04-29 21:28:05
forward
937 people have browsed it
  • Click to enter:ChatGPT tool plug-in navigation
Zerodium 宣布为 Microsoft Outlook 零点击 RCE 安全漏洞支付 400,000 美元

Zerodium is a security vulnerability exploitation supplier. Earlier today Time announced that it is increasing bounty payouts for Microsoft Outlook Zero-Click Remote Code Execution (RCE) by 60% to $400,000 from the previous $250,000.

Zero-click attacks are particularly dangerous because they require no user interaction at all to deliver the malicious payload to a potential victim’s device. Zerodium noted, however, that the increase in payout was "temporary," meaning the decision could be revised later.

Here is the full announcement:

We are temporarily increasing payouts for Microsoft Outlook RCE from $250,000 to $400,000. We are looking for zero-click vulnerabilities that lead to remote code execution when receiving/downloading emails in Outlook without any user interaction, such as reading the malicious email or opening an attachment. Exploits that rely on opening/reading emails may receive lower rewards.

In related Outlook news, Microsoft's One Outlook Project Monarch has apparently been delayed, but it's reportedly still making progress.

Alongside Microsoft’s Outlook payments announcement, Zerodium also announced Mozilla’s Thunderbird platform with a $200,000 bounty.

We are looking for zero-click vulnerabilities that affect Thunderbird and lead to remote code execution when receiving/downloading an email, without any user interaction such as reading the malicious email or opening an attachment. Exploits that rely on opening/reading emails may receive lower rewards.

The above is the detailed content of Zerodium announces $400,000 payout for Microsoft Outlook Zero-Click RCE security vulnerability. For more information, please follow other related articles on the PHP Chinese website!

Related labels:
source:yundongfang.com
Statement of this Website
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn
Popular Tutorials
More>
Latest Downloads
More>
Web Effects
Website Source Code
Website Materials
Front End Template