CVE-2025-21298: Windows OLE Remote Code Execution

CRITICAL
9.8CRITICAL
Published: 2025-01-14Affected: Microsoft Windows (all supported versions)CWE-416

Can Windows OLE be exploited via email?

A critical use-after-free vulnerability in Windows OLE (Object Linking and Embedding). Attackers can execute arbitrary code by sending a specially crafted email or document. The vulnerability can be triggered through Outlook preview pane — no user interaction required beyond previewing the email.

Impact & Exploitation

Zero-click exploitation via Outlook preview. Affects all supported Windows versions. Enables complete system compromise through email delivery.

How Precogs AI Detects Windows OLE Remote Code Execution

Precogs AI Binary SAST detects use-after-free patterns in compiled Windows applications and OLE-dependent software, identifying vulnerable code paths in binary artifacts.

Precogs Logo

Precogs Research

This vulnerability intelligence report was analyzed and enriched by the Precogs AI Security Team. Our researchers continuously monitor emerging threats across AI code, LLM pipelines, and binary architectures to ensure accurate real-time remediation guidance.