CVE-2025-29805

7.5 HIGH

📋 TL;DR

CVE-2025-29805 is an information disclosure vulnerability in Outlook for Android that allows unauthorized attackers to access sensitive information over a network. This affects users of Outlook for Android who have the vulnerable version installed. The vulnerability exposes potentially confidential data to attackers who can reach the affected device.

💻 Affected Systems

Products:
  • Microsoft Outlook for Android
Versions: Versions prior to the patched release
Operating Systems: Android
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Outlook for Android; other Outlook clients and platforms are not affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could access sensitive emails, attachments, calendar entries, and contact information stored in Outlook, potentially leading to data breaches, corporate espionage, or identity theft.

🟠

Likely Case

Attackers could access recent emails, calendar appointments, and contact details, enabling social engineering attacks, credential harvesting, or business intelligence gathering.

🟢

If Mitigated

With proper network segmentation and access controls, impact would be limited to data accessible within the compromised user's Outlook account only.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability allows network-based exploitation without authentication, making it relatively easy to exploit if the attacker has network access to the device.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Latest version available in Google Play Store

Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29805

Restart Required: No

Instructions:

1. Open Google Play Store on Android device. 2. Search for 'Microsoft Outlook'. 3. Tap 'Update' if available. 4. Alternatively, uninstall and reinstall the latest version.

🔧 Temporary Workarounds

Disable Outlook Network Access

android

Temporarily restrict Outlook's network access to prevent exploitation

Use Web Version

all

Switch to Outlook Web Access (OWA) via browser until patched

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate mobile devices from untrusted networks
  • Use mobile device management (MDM) to enforce security policies and monitor for suspicious activity

🔍 How to Verify

Check if Vulnerable:

Check Outlook version in app settings: Settings > Help & Feedback > App Version

Check Version:

Not applicable - check via app settings UI

Verify Fix Applied:

Verify Outlook version is updated to latest from Google Play Store

📡 Detection & Monitoring

Log Indicators:

  • Unusual network connections from mobile devices to unknown IPs
  • Multiple failed authentication attempts followed by successful data access

Network Indicators:

  • Unexpected data exfiltration from mobile devices
  • Suspicious network traffic patterns to/from Outlook app

SIEM Query:

source="mobile_device_logs" app="outlook" (event="data_access" OR event="network_connection") dest_ip!=corporate_network

🔗 References

📤 Share & Export