Coursera Spring Sale
40% Off Coursera Plus Annual!
Grab it
Explore a comprehensive security research presentation examining critical vulnerabilities in Windows' MapUrlToZone API discovered by Microsoft Security Response Center researchers. Learn how nation-state actors exploited zero-click remote code execution vulnerabilities in Outlook through malicious emails, and discover the systematic investigation that uncovered how attackers can trick Windows into treating remote untrusted files as local machine resources. Understand the research methodology used to identify discrepancies between MapUrlToZone and Windows filesystem path parsing, which led to the discovery of a dozen CVEs across multiple vulnerability types. Examine the security implications for critical Windows components including Outlook, Office applications, Windows Shell, and sandboxes that rely on MapUrlToZone for trust decisions. Gain insights into the comprehensive mitigation strategies developed by MSRC in collaboration with internal Microsoft teams, and understand how this research addresses systemic security issues that had received limited attention despite their critical importance to Windows security architecture.