[CVE-2023–23397] Microsoft Outlook Elevation of Privilege Vulnerability
Common Information
Type Value
UUID 0cf99bb2-0d79-4c55-bd41-2ee7a039a15d
Fingerprint 368929907c35deaf
Analysis status DONE
Considered CTI value 2
Text language
Published May 17, 2023, 12:03 p.m.
Added to db May 17, 2023, 2:20 p.m.
Last updated Nov. 17, 2024, 6:54 p.m.
Headline [CVE-2023–23397] Microsoft Outlook Elevation of Privilege Vulnerability
Title [CVE-2023–23397] Microsoft Outlook Elevation of Privilege Vulnerability
Detected Hints/Tags/Attributes 36/1/23
RSS Feed
Details Id Enabled Feed title Url Added to db
Details 167 Cybersecurity on Medium https://medium.com/feed/tag/cybersecurity 2024-08-30 22:08
Attributes
Details Type #Events CTI Value
Details CVE 176
cve-2023-23397
Details Domain 6
delivr.to
Details Domain 2
ulikowski.pl
Details Domain 2
interoperability.blob.core.windows.net
Details Domain 452
msrc.microsoft.com
Details Email 2
marcin@ulikowski.pl
Details File 6
attack.ini
Details File 173
outlook.exe
Details File 23
searchprotocolhost.exe
Details File 2
ulikowski.pl
Details File 2
interoperability.blob
Details sha256 3
47fee24586cd2858cfff2dd7a4e76dc95eb44c8506791ccc2d59c837786eafe3
Details sha256 3
582442ee950d546744f2fa078adb005853a453e9c7f48c6c770e6322a888c2cf
Details sha256 3
6c0087a5cbccb3c776a471774d1df10fe46b0f0eb11db6a32774eb716e1b7909
Details sha256 3
7fb7a2394e03cc4a9186237428a87b16f6bf1b66f2724aea1ec6a56904e5bfad
Details sha256 3
eedae202980c05697a21a5c995d43e1905c4b25f8ca2fff0c34036bc4fd321fa
Details sha256 2
e7a1391dd53f349094c1235760ed0642519fd87baf740839817d47488b9aef02
Details Url 2
https://www.trustedsec.com/blog/critical-outlook-vulnerability-in-depth-technical-analysis-and-recommendations-cve-2023-23397
Details Url 4
https://www.mdsec.co.uk/2023/03/exploiting-cve-2023-23397-microsoft-outlook-elevation-of-privilege-vulnerability
Details Url 2
https://interoperability.blob.core.windows.net/files/ms-oxprops/[ms-oxprops].pdf
Details Url 5
https://msrc.microsoft.com/update-guide/vulnerability/cve-2023-23397
Details Yara rule 2
rule SUSP_EXPL_Msg_CVE_2023_23397_Mar23 {
	meta:
		description = "MSG file with a PidLidReminderFileParameter property, potentially exploiting CVE-2023-23397"
		author = "delivr.to, modified by Florian Roth, Nils Kuhnert, Arnim Rupp, marcin@ulikowski.pl"
		date = "2023-03-15"
		modified = "2023-03-17"
		score = 60
		reference = "https://www.mdsec.co.uk/2023/03/exploiting-cve-2023-23397-microsoft-outlook-elevation-of-privilege-vulnerability/"
		hash = "47fee24586cd2858cfff2dd7a4e76dc95eb44c8506791ccc2d59c837786eafe3"
		hash = "582442ee950d546744f2fa078adb005853a453e9c7f48c6c770e6322a888c2cf"
		hash = "6c0087a5cbccb3c776a471774d1df10fe46b0f0eb11db6a32774eb716e1b7909"
		hash = "7fb7a2394e03cc4a9186237428a87b16f6bf1b66f2724aea1ec6a56904e5bfad"
		hash = "eedae202980c05697a21a5c995d43e1905c4b25f8ca2fff0c34036bc4fd321fa"
	strings:
		$psetid_app = { 02 20 06 00 00 00 00 00 C0 00 00 00 00 00 00 46 }
		$psetid_meeting = { 90 DA D8 6E 0B 45 1B 10 98 DA 00 AA 00 3F 13 05 }
		$psetid_task = { 03 20 06 00 00 00 00 00 C0 00 00 00 00 00 00 46 }
		$rfp = { 1F 85 00 00 }
		$u1 = { 00 00 5C 00 5C 00 }
		$fp_msi1 = { 84 10 0C 00 00 00 00 00 C0 00 00 00 00 00 00 46 }
	condition:
		uint32be(0) == 0xD0CF11E0 and uint32be(4) == 0xA1B11AE1 and 1 of ($psetid*) and $rfp and $u1 and not 1 of ($fp*)
}
Details Yara rule 2
rule EXPL_SUSP_Outlook_CVE_2023_23397_Exfil_IP_Mar23 {
	meta:
		description = "Detects suspicious .msg file with a PidLidReminderFileParameter property exploiting CVE-2023-23397 (modified delivr.to rule - more specific = less FPs but limited to exfil using IP addresses, not FQDNs)"
		author = "delivr.to, Florian Roth, Nils Kuhnert, Arnim Rupp, marcin@ulikowski.pl"
		date = "2023-03-15"
		modified = "2023-03-18"
		score = 75
		reference = "https://www.mdsec.co.uk/2023/03/exploiting-cve-2023-23397-microsoft-outlook-elevation-of-privilege-vulnerability/"
		hash = "47fee24586cd2858cfff2dd7a4e76dc95eb44c8506791ccc2d59c837786eafe3"
		hash = "582442ee950d546744f2fa078adb005853a453e9c7f48c6c770e6322a888c2cf"
		hash = "6c0087a5cbccb3c776a471774d1df10fe46b0f0eb11db6a32774eb716e1b7909"
		hash = "7fb7a2394e03cc4a9186237428a87b16f6bf1b66f2724aea1ec6a56904e5bfad"
		hash = "eedae202980c05697a21a5c995d43e1905c4b25f8ca2fff0c34036bc4fd321fa"
		hash = "e7a1391dd53f349094c1235760ed0642519fd87baf740839817d47488b9aef02"
	strings:
		$psetid_app = { 02 20 06 00 00 00 00 00 C0 00 00 00 00 00 00 46 }
		$psetid_meeting = { 90 DA D8 6E 0B 45 1B 10 98 DA 00 AA 00 3F 13 05 }
		$psetid_task = { 03 20 06 00 00 00 00 00 C0 00 00 00 00 00 00 46 }
		$rfp = { 1F 85 00 00 }
		$u1 = { 5C 00 5C 00 ( 3? 00 2E | 3? 00 3? 00 2E | 3? 00 3? 00 3? 00 2E ) 00 ( 3? 00 2E | 3? 00 3? 00 2E | 3? 00 3? 00 3? 00 2E ) 00 ( 3? 00 2E | 3? 00 3? 00 2E | 3? 00 3? 00 3? 00 2E ) 00 ( 3? 00 3? 00 3? 00 | 3? 00 3? 00 | 3? 00 ) }
		$u2 = { 00 5C 5C ( 3? 2E | 3? 3? 2E | 3? 3? 3? 2E ) ( 3? 2E | 3? 3? 2E | 3? 3? 3? 2E ) ( 3? 2E | 3? 3? 2E | 3? 3? 3? 2E ) ( 3? 3? 3? | 3? 3? | 3? ) }
		$fp_msi1 = { 84 10 0C 00 00 00 00 00 C0 00 00 00 00 00 00 46 }
	condition:
		(uint16(0) == 0xCFD0 and 1 of ($psetid*) or uint32be(0) == 0x789F3E22) and any of ($u*) and $rfp and not 1 of ($fp*)
}