Outlook Information Disclosure Vulnerability

CVE-2023-35636
6.5MEDIUM

Key Information

Vendor
Microsoft
Status
Microsoft Office 2019
Microsoft 365 Apps for Enterprise
Microsoft Office LTSC 2021
Microsoft Office 2016
Vendor
CVE Published:
12 December 2023

Badges

😄 Trended👾 Exploit Exists🔴 Public PoC📰 News Worthy

Summary

The Outlook Information Disclosure Vulnerability (CVE-2023-35636) affects Microsoft Outlook and can be exploited by convincing a victim to open a specially crafted file delivered via email or hosted on a malicious website. Exploitation of this vulnerability can lead to the disclosure of NTLM hashes, which could be leveraged as part of an NTLM relay or “pass the hash” attack. This could allow an attacker to masquerade as a legitimate user without having to log in. The nature of the vulnerability, its potential impact, and known exploits in the wild, particularly by ransomware groups, make it critical for organizations to apply the patch promptly to mitigate the risk.

Affected Version(s)

Microsoft Office 2019 < 19.0.0

Microsoft 365 Apps for Enterprise < 16.0.1

Microsoft Office LTSC 2021 < 16.0.1

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

News Articles

CVSS V3.1

Score:
6.5
Severity:
MEDIUM
Confidentiality:
High
Integrity:
None
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged

Timeline

  • Vulnerability started trending.

  • 👾

    Exploit exists.

  • First article discovered by LinkedIn

  • Vulnerability published.

  • Vulnerability Reserved.

Collectors

NVD DatabaseMitre DatabaseMicrosoft Feed1 Proof of Concept(s)9 News Article(s)
.