Microsoft Outlook for Windows 0-Day Vulnerability - CVE-2023-23397

16 Mar / 2023

Microsoft Outlook for Windows 0Day vulnerability

CVE: CVE-2023-23397

WHAT IS VULNERABLE?

  • All versions of Outlook for Windows
  • Outlook Web Access, Mobile and MacOS are unaffected.

WHAT IS HAPPENING?

  • Microsoft recently published an update for Outlook for Windows that patches a previously unknown vulnerability.
  • This vulnerability in Outlook allows an attacker to steal Credentials using NTLM and a malicious server without user intervention.
  • This attacker behaviour has been seen in the wild and is being actively exploited.

KEY FACTS

  • Attackers are using a Privilege Escalation Vulnerability in Outlook to steal NTLM credentials BEFORE the user opens the malicious email.
  • They do this by sending an email with a malicious extended MAPI property supplying a UNC path that does not need to be in your environment.
  • This UNC path is for an SMB Share on an attacker-controlled server.
  • The connection to the SMB Share sends the Users NTLM negotiation message.
  • This allows the malicious actor to use that NTLM negotiation message against other systems in your environment that support NTLM.

WHAT YOU CAN DO?

ASSESSING FOR POSSIBLE IMPACT

  • To determine if your organization was targeted by actors attempting to use this vulnerability, Microsoft is providing documentation and a script at https://aka.ms/CVE-2023-23397ScriptDoc.
  • Organizations should review the output of this script to determine risk. Tasks, email messages and calendar items that are detected and point to an unrecognized share should be reviewed to determine if they are malicious. If objects are detected, they should be removed or clear the parameter.
  • If no objects are detected, it is unlikely the organization was targeted via CVE-2023-23397.

Cythera is committed to protecting our customers from cyber threats and ensuring their business continuity.

Resources

You may be interested in

3 Ways To Check If Your Corporate Identity Is Being Impersonated Online

A guide to taking the first step towards protecting your brand from online impersonationCybersecurity attacks cost businesses financially, opera…

Read More arrow_forward

PaperCut Vulnerability - CVE-2023-27350, CVE-2023-27351

PaperCut MF & PaperCut NG VulnerabilitiesCVE: CVE-2023-27350, CVE-2023-27351 WHAT IS VULNERABLE? PaperCut MF or NG version 8.0 or later, on a…

Read More arrow_forward

How we’re using Secure Web Gateway to quickly adapt customer’s security

Even post-COVID, a permanent shift to more remote and flexible working seems to be a theme for most organisations. This throws up some challenge…

Read More arrow_forward