On 14.03.2023, Microsoft announced the “Elevation of Privilege in Microsoft Outlook” vulnerability.
The vulnerability is tracked as CVE-2023-23397 and its exploit causes password hashes to be stolen.
The vulnerability is in such a critical state that the exploit code has already been released and the
vulnerability has been exploited.
It is a fact that we are almost racing against time against vulnerability. For this, it is of great importance to take the necessary actions without wasting time.
We have prepared a small guide for you.
You can reduce the impact of the attack by applying the following list to your organizations.
Looking at the details of the vulnerability, attackers can exploit the vulnerability by sending MAPI-capable messages containing UNC routes to an SMB share (TCP 445) under their control.
The vulnerability affects all versions of Microsoft Outlook, but not Android, iOS, or macOS.
Affected Systems
IoC’s
-
Recommended Solution(s)
CVE / CWE
CVE-2023-23397
Related Website(s)
* CVSS 3.1 score (out of 9.8) 9.1/“high”
* Those between 9.0-10.0 are considered as “critical” vulnerabilities.
+90 216 504 53 32
Aydınevler Mahallesi,İsmet İnönü Cadddesi,Küçükyalı Ofis Park A Blok,No:20/1 Maltepe İstanbul
+90 312 235 44 51
You can register to our newsletter on the home page to be instantly informed about security vulnerabilities.