CVE-2023-23397
vulnerability analysis and mitigation

Overview

Microsoft Outlook Elevation of Privilege Vulnerability (CVE-2023-23397) is a critical security flaw discovered and disclosed in March 2023. This vulnerability affects all supported versions of Microsoft Outlook for Windows, while other versions such as Android, iOS, Mac, and Outlook on the web are not impacted. The vulnerability was initially discovered by Microsoft Threat Intelligence team, who identified limited targeted attacks against organizations in Europe (MSRC Blog).

Technical details

CVE-2023-23397 is a critical elevation of privilege (EoP) vulnerability with a CVSS v3.1 base score of 9.8 (Critical). The vulnerability is triggered when an attacker sends a message with an extended MAPI property containing a UNC path to an SMB share on a threat actor-controlled server. The attack requires no user interaction and exploits NTLM authentication, allowing the attacker to capture and relay the user's NTLM negotiation message for authentication against other systems (MSRC Blog).

Impact

The vulnerability enables attackers to perform NTLM credential theft by directing connections to untrusted networks, such as the Internet. This can lead to unauthorized access and privilege escalation in targeted systems. Microsoft has confirmed that a Russia-based threat actor exploited this vulnerability in targeted attacks against organizations in government, transportation, energy, and military sectors in Europe (MSRC Blog).

Mitigation and workarounds

Microsoft has released security updates to address CVE-2023-23397. The Outlook update prevents the use of paths from untrusted network sources for sound playback. Organizations must install the Outlook security update regardless of their mail hosting platform or NTLM authentication support. Additionally, Microsoft has provided a script to help organizations detect potential malicious messages (MSRC Blog).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
David EstlickCISO
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
Adam FletcherChief Security Officer
“We know that if Wiz identifies something as critical, it actually is.”
Greg PoniatowskiHead of Threat and Vulnerability Management