CVE-2023-23397: Microsoft Office Outlook Privilege Escalation Vulnerability
Common Information
Type Value
UUID 94aaedcb-8a5f-4033-a168-80ab5f97ed86
Fingerprint ac196d347bfe8ce7
Analysis status DONE
Considered CTI value 2
Text language
Published March 18, 2023, 10 a.m.
Added to db March 18, 2023, 11:53 a.m.
Last updated Nov. 17, 2024, 11:40 p.m.
Headline CVE-2023-23397: Microsoft Office Outlook Privilege Escalation Vulnerability
Title CVE-2023-23397: Microsoft Office Outlook Privilege Escalation Vulnerability
Detected Hints/Tags/Attributes 47/2/21
RSS Feed
Attributes
Details Type #Events CTI Value
Details CVE 176
cve-2023-23397
Details Domain 452
msrc.microsoft.com
Details Domain 641
nvd.nist.gov
Details Domain 3
practical365.com
Details Domain 261
blog.talosintelligence.com
Details Domain 1
cve-2023-23397.md
Details Domain 4128
github.com
Details Domain 4
microsoft.github.io
Details Github username 48
microsoft
Details sha1 5
a4c096e8b6e6eddeba2f42910f165681ed64adf7
Details Threat Actor Identifier - APT 783
APT28
Details Url 2
https://msrc.microsoft.com/update-guide/vulnerability/cve-2023-23397.
Details Url 1
https://nvd.nist.gov/vuln/detail/cve-2023-23397.
Details Url 1
https://practical365.com/cve-2023-23397-ntlm-vulnerability/.
Details Url 1
https://blog.talosintelligence.com/outlook-privilege-escalation-vulnerability-cve-2023-23397/.
Details Url 1
https://github.com/microsoft/css-exchange.
Details Url 2
https://microsoft.github.io/css-exchange/security/cve-2023-23397/.
Details Url 1
https://www.mdsec.co.uk/2023/03/exploiting-cve-2023-23397-microsoft-outlook-elevation-of-privilege-vulnerability/.
Details Url 1
https://learn.microsoft.com/en-us/office/client-developer/outlook/mapi/pidlidreminderfileparameter-canonical-property
Details Url 1
https://www.bigtechwire.com/2023/03/16/microsoft-patches-zero-day-flaw-in-outlook-exploited-by-russian-hackers/.
Details Url 2
https://research.kudelskisecurity.com/2023/03/15/cve-2023-23397-microsoft-outlook-privilege-elevation-critical-vulnerability/.