Microsoft recently patched a high-risk zero-click vulnerability in the Windows operating system. The flaw identified as CVE-2025-21298 carries a near-maximum CVSS severity rating of 9.8 and could allow attackers to remotely execute malicious code on Windows systems without requiring any user interaction.
The vulnerability resides in the Windows ole32.dll component, specifically in the UtOlePresStmToContentsStm
function, which processes OLE objects embedded in emails and files. This flaw is particularly dangerous because it can be triggered simply through email preview functionality in Outlook or when opening documents in Microsoft Word.
According to the technical analysis, the vulnerability creates a "vulnerability window" during memory processing. When Outlook or Word renders embedded OLE objects, ole32.dll allocates a CONTENTS stream in memory but fails to nullify the pointer after the first free operation, creating a dangling pointer to freed memory.

If an attacker can trigger a failure in UtReadOlePresStmHeader
during this window, the cleanup routine attempts to free the same memory location again, corrupting the heap memory management structures.
This double-free operation compromises system memory management, potentially allowing attackers to take control of the process. The impact is severe since this occurs in applications like Outlook that often run with elevated privileges.
According to Censys data, approximately 482,270 Exchange Servers and Outlook Web Access Portals were exposed. While these servers aren't directly vulnerable to CVE-2025-21298 (as the flaw is in the Windows OLE component rather than Exchange or Outlook themselves), they highlight the potential scale of vulnerable systems.
Security experts strongly recommend that organizations immediately install Microsoft's security patch to protect against this vulnerability. Given the no-click nature of this exploit and its ability to execute through preview functionality alone, the patch should be considered a critical priority for all Windows environments.