Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-21260: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in Microsoft Microsoft 365 Apps for Enterprise

0
High
VulnerabilityCVE-2026-21260cvecve-2026-21260cwe-200
Published: Tue Feb 10 2026 (02/10/2026, 17:51:18 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Microsoft 365 Apps for Enterprise

Description

Exposure of sensitive information to an unauthorized actor in Microsoft Office Outlook allows an unauthorized attacker to perform spoofing over a network.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/22/2026, 00:37:22 UTC

Technical Analysis

CVE-2026-21260 is a vulnerability identified in Microsoft 365 Apps for Enterprise, specifically targeting Microsoft Office Outlook version 16.0.1. The flaw allows an unauthorized attacker to perform network-based spoofing that results in the exposure of sensitive information to unauthorized parties. Classified under CWE-200, this vulnerability involves the unintended disclosure of confidential data, which could include emails, attachments, or other sensitive Outlook content. The CVSS v3.1 score of 7.5 (high) reflects the vulnerability's ease of exploitation (network vector, no privileges or user interaction required) and its significant impact on confidentiality. The vulnerability does not affect integrity or availability but compromises data confidentiality, which can lead to further attacks such as phishing or social engineering. No patches have been released at the time of publication, and no known exploits are reported in the wild, but the vulnerability's characteristics make it a critical concern for organizations relying on Microsoft 365 Apps for Enterprise. The flaw likely stems from insufficient validation or improper handling of network data within Outlook, enabling attackers to spoof legitimate sources and gain access to sensitive information without authentication.

Potential Impact

The primary impact of CVE-2026-21260 is the unauthorized disclosure of sensitive information, which can severely compromise organizational confidentiality. Exposure of emails or related data can lead to intellectual property theft, leakage of personally identifiable information (PII), and loss of competitive advantage. Attackers could leverage the disclosed information to conduct targeted phishing campaigns, social engineering attacks, or further network intrusions. Since the vulnerability requires no privileges or user interaction, it can be exploited remotely and at scale, increasing the risk for large enterprises and government entities. The absence of patches at the time of disclosure means organizations remain exposed until updates are available and applied. This vulnerability could also undermine trust in Microsoft 365 Apps for Enterprise, affecting business continuity and compliance with data protection regulations such as GDPR or HIPAA.

Mitigation Recommendations

Organizations should immediately inventory their Microsoft 365 Apps for Enterprise deployments to identify affected Outlook versions (16.0.1). Until official patches are released, network-level mitigations should be implemented, including restricting inbound and outbound traffic to trusted sources and employing intrusion detection/prevention systems to monitor for suspicious spoofing attempts. Administrators should enforce strict email authentication protocols such as SPF, DKIM, and DMARC to reduce the risk of spoofed emails being accepted internally. Additionally, organizations should enhance monitoring of email traffic and audit logs for unusual access patterns or data exfiltration attempts. User awareness training should be reinforced to recognize phishing and spoofing indicators. Once Microsoft releases patches, organizations must prioritize rapid deployment across all affected systems. Finally, consider isolating critical Outlook instances or using virtual desktop infrastructure (VDI) to reduce exposure.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
microsoft
Date Reserved
2025-12-11T21:02:05.737Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 698b76014b57a58fa120a059

Added to database: 2/10/2026, 6:16:33 PM

Last enriched: 3/22/2026, 12:37:22 AM

Last updated: 4/6/2026, 6:12:46 PM

Views: 159

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses