Advertisement

Security News

The Latest ‘Critical’ Microsoft Outlook Vulnerability: 5 Things To Know

Kyle Alspach

Security researchers say the vulnerability is unusually dangerous and should be prioritized for patching.

Patch Not Sufficient?

Microsoft released a patch for the Outlook vulnerability on Tuesday as part of its monthly release of bug fixes, known as Patch Tuesday. However, some security researchers have determined that the patch is not enough. Chell, of MDSec, said in a tweet that “following some additional testing of #CVE-2023-23397 - I can confirm MS have only partially fixed this. You can still trigger auth to systems in trusted zones - ie other [Active Directory] joined systems, which can then be relayed for privilege escalation.”

Security researcher Will Dormann has reported having confirmed Chell’s findings as well. In order to exploit the flaw for privilege elevation on a patched system, an attacker would have to trigger the vulnerability via a local hostname in the network, Hammond said.

In response to an inquiry by CRN about the researchers’ findings Friday, Microsoft said in a statement that “the security update CVE-2023-23397 we released in March protects customers against the leak of NTLM hashes outside of their network. The technique described requires an attacker to already have gained access to internal networks. We encourage customers to apply the update to remain secure.”

 
Kyle Alspach

Kyle Alspach is a Senior Editor at CRN focused on cybersecurity. His coverage spans news, analysis and deep dives on the cybersecurity industry, with a focus on fast-growing segments such as cloud security, application security and identity security.  He can be reached at kalspach@thechannelcompany.com.

Advertisement
Advertisement
Sponsored Post
Advertisement

NEWSLETTER

Advertisement