Go back

Microsoft Patches Two New RCE Vulnerabilities: CVE-2025-47171 and CVE-2025-47176 

Michael Gorelik
Michael Gorelik
11 Jun 2025
3 min read
Morphisec Labs

On June 10, 2025, Microsoft released critical patches addressing multiple Microsoft Outlook remote code execution (RCE) vulnerabilities, which were discovered by the Morphisec team. Building on our previous discoveries, including last year’s Outlook RCE vulnerabilities presented at Defcon and BlueHat, and the form injection RCE CVE-2025-21357 patched in January 2025, we have identified two new severe vulnerabilities: CVE-2025-47171 and CVE-2025-47176

CVE-2025-47171: Custom Forms RCE 

At the heart of CVE-2025-47171 lies Microsoft Outlook’s custom forms, a legacy feature allowing developers and administrators to define specialized behavior for items like mail messages. This vulnerability requires authentication and post-synchronization of a malicious form, with minimal user interaction.  

Disclosure Timeline: 

  • Reported: March 23, 2025
  • Confirmed: May 1, 2025
  • Patched: June 10, 2025 

While serious, it is overshadowed by the second discovery. 

CVE-2025-47176: Synchronization Objects RCE (Critical) 

CVE-2025-47176 introduces a new category of RCE exploits targeting Microsoft Outlook synchronization objects. This vulnerability is: 

  • Trivial to exploit, requiring only authentication 
  • Zero-click, enabling automatic and persistent code execution 
  • Highly dangerous, affecting most versions of classic Outlook clients 

Microsoft classified this as “Important,” but Morphisec deems it Critical due to its ease of exploitation—surpassing even last year’s form injection RCE in simplicity—and its potential for widespread impact

Disclosure Timeline: 

  • Reported: April 17 
  • Confirmed: May 13
  • Patched: June 10, 2025 

Why This Matters 

The attack surface for Microsoft Outlook exploitation is vast, with new critical and important vulnerabilities uncovered and disclosed every Patch Tuesday. Unlike many vulnerabilities that remain theoretical, both CVE-2025-47171 and CVE-2025-47176 have fully functional proofs-of-concept (PoCs) and are extremely easy to exploit.  

Ransomware operators only need a single compromised endpoint to infiltrate an entire organization, making these vulnerabilities prime targets. 

Recommendations 

  • Immediate Action: Update all classic Microsoft Outlook clients to the latest version to mitigate these risks. 
  • Compensatory Controls: Patching alone is not enough. Morphisec’s anti-ransomware solution, powered by patented Automated Moving Target Defense (AMTD) technology, provides a signatureless, preventive approach to minimize the impact of such exploits. 
  • Stay Proactive: With ransomware groups actively seeking entry points, organizations must bolster endpoint security to prevent catastrophic breaches. 

How Morphisec Can Help 

Morphisec’s application of AMTD to Microsoft Office significantly minimizes the exploitable attack surface, delivering proactive mitigation against known and zero-day vulnerabilities. 

AMTD functions as a Virtual Patching layer, intercepting exploitation attempts at runtime and preventing compromise while organizations validate and deploy official security patches. 

Security practitioners can see Morphisec in action by visiting www.morphisec.com/demo

hs-cta-img-a5d9e888-01ef-4e83-9c65-fdccb3682891

Credits 

We extend our gratitude to researchers Arnold Osipov, Shmuel Uzan, and Michael Gorelik for their relentless efforts in discovering these vulnerabilities before they could be weaponized as zero-days. Their work continues to strengthen the security landscape and protect organizations worldwide. 

Responsible Disclosure 

To avoid immediate exploitation, we are withholding technical details. Morphisec plans to release full details in two months, giving organizations time to apply patches. Stay vigilant, prioritize updates, and deploy advanced security measures to protect your environment. 

About the author

Michael Gorelik

Chief Technology Officer

Morphisec CTO Michael Gorelik leads the malware research operation and sets technology strategy. He has extensive experience in the software industry and leading diverse cybersecurity software development projects. Prior to Morphisec, Michael was VP of R&D at MotionLogic GmbH, and previously served in senior leadership positions at Deutsche Telekom Labs. Michael has extensive experience as a red teamer, reverse engineer, and contributor to the MITRE CVE database. He has worked extensively with the FBI and US Department of Homeland Security on countering global cybercrime. Michael is a noted speaker, having presented at multiple industry conferences, such as SANS, BSides, and RSA. Michael holds Bsc and Msc degrees from the Computer Science department at Ben-Gurion University, focusing on synchronization in different OS architectures. He also jointly holds seven patents in the IT space.

Stay up-to-date

Get the latest resources, news, and threat research delivered to your inbox.