CVE-2025-21298: Windows OLE Remote Code Execution
Can Windows OLE be exploited via email?
A critical use-after-free vulnerability in Windows OLE (Object Linking and Embedding). Attackers can execute arbitrary code by sending a specially crafted email or document. The vulnerability can be triggered through Outlook preview pane — no user interaction required beyond previewing the email.
Impact & Exploitation
Zero-click exploitation via Outlook preview. Affects all supported Windows versions. Enables complete system compromise through email delivery.
How Precogs AI Detects Windows OLE Remote Code Execution
Precogs AI Binary SAST detects use-after-free patterns in compiled Windows applications and OLE-dependent software, identifying vulnerable code paths in binary artifacts.