Skip to main content

CVE-2024-1187: CWE-404 Denial of Service in Munsoft Easy Outlook Express Recovery

Low
VulnerabilityCVE-2024-1187cvecve-2024-1187cwe-404
Published: Fri Feb 02 2024 (02/02/2024, 17:31:04 UTC)
Source: CVE
Vendor/Project: Munsoft
Product: Easy Outlook Express Recovery

Description

A vulnerability, which was classified as problematic, has been found in Munsoft Easy Outlook Express Recovery 2.0. This issue affects some unknown processing of the component Registration Key Handler. The manipulation leads to denial of service. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. The identifier VDB-252677 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 07/04/2025, 18:27:16 UTC

Technical Analysis

CVE-2024-1187 is a denial of service (DoS) vulnerability identified in Munsoft Easy Outlook Express Recovery version 2.0. The vulnerability stems from improper handling within the Registration Key Handler component of the software. Specifically, certain manipulations of this component can cause the application to crash or become unresponsive, resulting in a denial of service condition. The vulnerability requires local access to the affected system, meaning an attacker must have some level of access to the machine where the software is installed. No user interaction is needed once local access is obtained, and the attack complexity is low. The vulnerability does not impact confidentiality or integrity but affects availability by causing the application to fail. The CVSS v3.1 base score is 3.3, categorized as low severity, reflecting the limited scope and impact. The vendor Munsoft was contacted but did not respond to the disclosure. No patches or updates have been released to address this issue, and while the exploit has been publicly disclosed, there are no known active exploits in the wild at this time. The vulnerability is classified under CWE-404, which relates to improper resource shutdown or release, indicating that the software fails to properly handle resources during the registration key processing, leading to the DoS condition.

Potential Impact

For European organizations, the impact of CVE-2024-1187 is relatively limited due to the low severity and local access requirement. However, organizations using Munsoft Easy Outlook Express Recovery 2.0 for email data recovery or related tasks could experience service interruptions if an attacker gains local access to affected systems. This could disrupt business continuity for teams relying on this software for email recovery operations. While the vulnerability does not expose sensitive data or allow privilege escalation, the denial of service could delay critical recovery processes, potentially impacting incident response or forensic investigations. In environments with shared workstations or insufficient endpoint security, malicious insiders or attackers with limited access could exploit this vulnerability to cause disruption. Given the lack of vendor response and absence of patches, organizations must consider compensating controls to mitigate risk. The threat is less critical for organizations that do not use this product or have strict access controls preventing local exploitation.

Mitigation Recommendations

To mitigate CVE-2024-1187, European organizations should first identify and inventory any installations of Munsoft Easy Outlook Express Recovery 2.0 within their environment. Since no official patch is available, organizations should implement strict local access controls to limit who can execute or interact with the software. This includes enforcing least privilege principles, restricting administrative rights, and using endpoint protection solutions to monitor and block unauthorized local activities. Additionally, organizations can isolate systems running this software from untrusted users and networks to reduce the risk of local exploitation. Regular backups and alternative recovery tools should be prepared to ensure continuity if the software becomes unavailable due to a DoS attack. Monitoring for unusual application crashes or service interruptions related to this software can help detect potential exploitation attempts. Finally, organizations should maintain communication with Munsoft for any future updates or patches and consider vendor alternatives if the risk is unacceptable.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2024-02-02T06:46:04.939Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0fa1484d88663aec2d7

Added to database: 5/20/2025, 6:59:06 PM

Last enriched: 7/4/2025, 6:27:16 PM

Last updated: 7/26/2025, 3:28:00 AM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats