What We Do
How We Do
Resources
Company
Partners
Get Started
Security advisories

CVE-2023-23397 - Microsoft Outlook Elevation of Privilege Zero-Day Vulnerability

March 15, 2023 | 2 MINS READ

Speak With A Security Expert Now

TALK TO AN EXPERT

THE THREAT

On March 14th, as part of Microsoft’s monthly Patch Tuesday release, the company disclosed a critical, actively exploited vulnerability impacting Microsoft Office and Outlook. The vulnerability is tracked as CVE-2023-23397 (CVSS: 9.8) - Microsoft Outlook Elevation of Privilege vulnerability. Exploitation of this vulnerability would allow a threat actor to access an impacted user’s Net-NTLMv2 hash, enabling future NTLM Relay attacks to authenticate to other services as the user.

CVE-2023-23397 is relatively simple to exploit, and its success has already been proven in real world attacks; as such, widespread exploitation is expected in the immediate future. As exploitation has been observed in limited cases, immediate patching of CVE-2023-23397 is critical. eSentire Threat Intelligence assesses it is almost certain threat actors will adopt the technique for use in attacks in the immediate future. 

What we’re doing about it

What you should do about it

Additional information

CVE-2023-23397 is highly concerning as exploitation does not require previous access or any user interaction. In an attack scenario, threat actors would deliver a crafted email containing the PidLidReminderFileParameter extended Messaging Application Programming Interface (MAPI) property. This property is modified to reference an external universal naming convention (UNC) path to a Server Message Block (SMB) share on an attacker-controlled server. If the reminder triggers while Outlook is open, a connection to the SMB share is initiated containing the user’s hashed password in an NTLM negotiation message. These credentials can then be used in NTLM relay attacks against the victim. No user interaction is required.

Reports suggest the vulnerability is currently being leveraged by Russian state-sponsored APT groups. Microsoft acknowledges CERT-UA in the vulnerability report, implying that exploitation of the vulnerability was likely operationalized in Ukraine.

Exploitation of CVE-2023-23397 is not complex and technical reports on the vulnerability are already publicly available. While current exploitation is attributed to Russian actors, eSentire Threat Intelligence assesses it is almost certain other state actors and financially motivated threat actors will adopt the technique for use in attacks in the immediate future.

Impacted Products:

References:

[1] https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2023-23397
[2] https://attack.mitre.org/techniques/T1557/001/
[3] https://microsoft.github.io/CSS-Exchange/Security/CVE-2023-23397/
[4] https://www.mdsec.co.uk/2023/03/exploiting-cve-2023-23397-microsoft-outlook-elevation-of-privilege-vulnerability/

View Most Recent Advisories