Elevation of Privilege Vulnerability Affects Microsoft Outlook
CVE-2023-23397
Key Information:
- Vendor
- Microsoft
- Status
- Vendor
- CVE Published:
- 14 March 2023
Badges
Summary
A critical elevation of privilege vulnerability, CVE-2023-23397, has been found to affect Microsoft Outlook, with a potential impact of an attacker gaining access to a user's Net-NTLMv2 hash. The vulnerability can be exploited remotely by sending a malicious Outlook object containing a UNC path to an SMB share on a threat actor-controlled server. New samples submitted to VirusTotal indicate that unknown attackers have been exploiting this vulnerability, and Microsoft has confirmed that the exploit bypasses security features. The attacks are utilizing phishing and social engineering techniques to target Windows OS users, posing a risk of remote code execution, security feature bypass, and privilege escalation. It is urged that organizations using Microsoft Outlook update to a patched version to mitigate the risk.
CISA Reported
CISA provides regional cyber and physical services to support security and resilience across the United States. CISA monitor the most dangerious vulnerabilities and have identifed as being exploited but is not known by the CISA to be used in ransomware campaigns. This is subject to change at pace as recent news articles suggest the vulnerability is being used by ransomware groups.
The CISA's recommendation is: Apply updates per vendor instructions.
Affected Version(s)
Microsoft 365 Apps for Enterprise x64-based Systems 16.0.1
Microsoft Office 2019 x64-based Systems 19.0.0
Microsoft Office LTSC 2021 32-bit Systems 16.0.1
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
Get notified when SecurityVulnerability.io launches alerting 🔔
Well keep you posted 📧
News Articles
Microsoft NTLM Zero-Day to Remain Unpatched Until April
The second zero-day vulnerability found in Windows NTLM in the past two months paves the way for relay attacks and credential theft. Microsoft has no patch, but released updated NTLM cyberattack mitigation advice.
1 month ago
Microsoft patches zero-days used by state-sponsored and ransomware threat actors (CVE-2023-23397, CVE-2023-24880) - Help Net Security
For March 2023 Patch Tuesday Microsoft has fixed 2 vulnerabilities actively exploited in the wild (CVE-2023-23397, CVE-2023-24880).
5 months ago
Czechia, Germany targeted by long-term APT28 cyberespionage campaign
Attacks leveraging the critical Microsoft Outlook privilege escalation vulnerability, tracked as CVE-2023-23397, have been launched by Russian state-sponsored threat operation APT28 — also known as Forest Blizzard, BlueDelta, Fancy Bear, and TA422 — against the Czech Republic and Germany as part of ...
8 months ago
References
EPSS Score
88% chance of being exploited in the next 30 days.
CVSS V3.1
Timeline
- 🟡
Public PoC available
- 💰
Used in Ransomware
- 📰
First article discovered by SecurityWeek
- 👾
Exploit known to exist
- 🦅
CISA Reported
Vulnerability published
Vulnerability Reserved