Skip to content

Microsoft Outlook Elevation of Privilege Vulnerability - CVE-2023-23397

Overview

Critical Outlook elevation of privilege security flaw exploitable without user interaction in low-complexity attacks.

The attacker could exploit this vulnerability by sending a specially crafted email which triggers automatically when it is retrieved and processed by the Outlook client. This could lead to exploitation BEFORE the email is viewed in the Preview Pane

What is vulnerable?

  • CVE-2023-23397: Microsoft Outlook Elevation of Privilege Vulnerability

Recommendation

Microsoft recommends immediately patching CVE-2023-23397 to mitigate this vulnerability to thwart any incoming attacks. DGov advises agencies should move towards using Windows Autopatch for Microsoft endpoint device fleets where possible.

The company also advises adding users to the Protected Users group in Active Directory and blocking outbound SMB (TCP port 445) if patching is not immediately possible, which might limit the impact of CVE-2023-2339.

Additional References

National Vulnerability Database - https://nvd.nist.gov/vuln/detail/CVE-2023-23397

Microsoft Outlook Elevation of Privilege Vulnerability - https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-23397