MS.Outlook.CVE-2023-23397.Elevation.Of.Privilege

description-logoDescription

This indicates an attack attempt to exploit an Elevation of Privilege vulnerability in Microsoft Outlook.
The vulnerability is due to a insufficient validation when parsing a crafted email. A remote attacker could exploit this to access a user's Net-NTLMv2 hash.

description-logoOutbreak Alert

CVE-2023-23397 is a critical elevation of privilege (EoP) vulnerability in Microsoft Outlook. It is a zero-touch exploit, meaning the security flaw requires no user interaction to be abused. All supported versions of Microsoft Outlook for Windows are affected including other versions of Microsoft Outlook such as Android, iOS, Mac, as well as Outlook on the web.

View the full Outbreak Alert Report

affected-products-logoAffected Products

Microsoft Outlook 2016 (64-bit edition)
Microsoft Outlook 2013 Service Pack 1 (32-bit editions)
Microsoft Outlook 2013 RT Service Pack 1
Microsoft Outlook 2013 Service Pack 1 (64-bit editions)
Microsoft Office 2019 for 32-bit editions
Microsoft 365 Apps for Enterprise for 32-bit Systems
Microsoft Office 2019 for 64-bit editions
Microsoft 365 Apps for Enterprise for 64-bit Systems
Microsoft Office LTSC 2021 for 64-bit editions
Microsoft Outlook 2016 (32-bit edition)
Microsoft Office LTSC 2021 for 32-bit editions

Impact logoImpact

Privilege Escalation: Remote attackers can leverage their privileges on vulnerable systems.

recomended-action-logoRecommended Actions

Refer to the vendor's advisory for updates:
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-23397

Telemetry logoTelemetry

Coverage

IPS (Regular DB)
IPS (Extended DB)

Version Updates

Date Version Detail
2024-03-20 27.752 Sig Added
2024-02-19 26.735 Sig Added
2023-07-12 25.599 Sig Added
2023-04-24 23.539 Sig Added
2023-03-22 23.518 Default_action:pass:drop
2023-03-21 23.517 Sig Added
2023-03-17 23.515