Site icon TheCyberThrone

Microsoft Outlook Patched Zero Day Vulnerability Details CVE-2023-23397

Advertisements

A critical vulnerability that is identified as a Zeroday in the Microsoft Outlook/365 applications suite is being actively abused in the wild and requires a mandatory patching.

The vulnerability tracked as CVE-2023-23397, with the CVSS score of 9.8, lets a remote and unauthenticated attacker breaches the system by sending a specially crafted email that allows them to steal the recipient’s credentials.

The victim doesn’t even need to open the malicious email: As Microsoft notes in its own guidance for the Microsoft 365 vulnerability: “The email] triggers automatically when it is retrieved and processed by the Outlook client. This could lead to exploitation BEFORE the email is viewed in the Preview Pane.”

Advertisements

This vulnerability for microsoft outlook affects both 32 and 64-bit versions of Microsoft 365 Apps for Enterprise. Office 2013, 2016, and 2019 (as well as LTSC) are also vulnerable to attack, which is triggered by a malicious email that causes a connection from the victim to a location under attacker control; leaking the Net-NTLMv2 hash of the victim to the attacker who can then relay this to another service and authenticate as the victim.

Microsoft Outlook vulnerability CVE-2023-23397 mitigations

These findings are attributed to CERT-UA, Microsoft Incident Response, and Microsoft Threat Intelligence (MSTI) and did not disclose how widespread attacks are, but they are likely to become so very fast as the patch is reverse-engineered and offensive security researchers identify how the exploit works and share POCs.

Exit mobile version