CVE-2023-35636
vulnerability analysis and mitigation

Overview

Microsoft Outlook Information Disclosure Vulnerability (CVE-2023-35636) was discovered and disclosed in December 2023. The vulnerability affects multiple Microsoft products including Microsoft 365 Apps Enterprise, Office 2016, Office 2019, and Office Long Term Servicing Channel 2021 (NVD).

Technical details

The vulnerability specifically affects the calendar sharing function in Microsoft Outlook. It allows attackers to intercept NTLM v2 hashes used for authentication in Microsoft Windows systems by manipulating specific headers in an email. The exploit requires two headers: 'Content-Class' and 'x-sharing-config-url' that point to the attacker's machine. The vulnerability has been assigned a CVSS v3.1 base score of 6.5 (Medium) with the vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N (SecurityOnline).

Impact

When successfully exploited, this vulnerability can lead to information disclosure, specifically the exposure of NTLM v2 hashed passwords. Attackers can utilize these hashes in two ways: through offline brute-force attacks to crack user passwords without leaving network traces, or through authentication relay attacks to gain unauthorized access to the victim's intended server (SecurityOnline).

Mitigation and workarounds

Microsoft released a patch for this vulnerability on December 12, 2023, categorizing it as 'important.' To protect against NTLM v2 attacks, organizations should enable SMB signing, block outgoing NTLM v2 authentication (available in Windows 11 build 25951 and later), and enforce Kerberos authentication where possible (SecurityOnline).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
David EstlickCISO
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
Adam FletcherChief Security Officer
“We know that if Wiz identifies something as critical, it actually is.”
Greg PoniatowskiHead of Threat and Vulnerability Management