According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? This vulnerability requires that a user with an affected version of Outlook open a malicious meeting or appointment invite from the attacker. According to the CVSS metric, privileges required is low (PR:L). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to have access to the location where the target file will be run. They would then need to plant a specific file that would be used as part of the exploitation. What privileges could be gained by an attacker who successfully exploited the vulnerability? An attacker who successfully exploited this vulnerability could gain specific limited SYSTEM privileges.
<a href="https://pl.linkedin.com/in/mateusz-tyl">Mateusz Tyl</a> with <a href="https://www.stmcyber.pl/">STM Cyber</a>, Anonymous