CVE-2023-29324
vulnerability analysis and mitigation

Overview

Windows MSHTML Platform Security Feature Bypass Vulnerability (CVE-2023-29324) was discovered and patched in May 2023. This vulnerability affects all Windows versions and is particularly significant as it enables the bypass of a previous critical vulnerability fix. The vulnerability received a CVSS base score of 6.5 (Medium) (NVD).

Technical details

The vulnerability exists in the Windows MSHTML platform and stems from complex handling of paths in Windows. It allows attackers to craft malicious URLs that can bypass internet security zone checks. The flaw received a CVSS v3.1 score of 6.5 with the vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L (NVD, Hacker News).

Impact

The vulnerability enables unauthenticated attackers to coerce an Outlook client to connect to an attacker-controlled server, resulting in NTLM credentials theft. It is particularly concerning as it's a zero-click vulnerability, meaning it can be triggered without any user interaction (Help Net Security, Hacker News).

Mitigation and workarounds

Microsoft has released patches to address this vulnerability as part of its May 2023 Patch Tuesday updates. Users are recommended to install both the main security update and Internet Explorer Cumulative updates to address vulnerabilities in the MSHTML platform and scripting engine. The patches for both CVE-2023-23397 and CVE-2023-29324 should be applied in that order for complete protection (Hacker News).

Community reactions

Security researchers from Akamai disagree with Microsoft's 'important' severity rating, arguing that the vulnerability's ability to re-enable a critical flaw makes it more severe. They recommend completely removing the custom reminder sound feature as it poses more security risks than it provides value to users (Help Net Security).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management