Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

msrc логотип

CVE-2023-35311

Опубликовано: 11 июл. 2023
Источник: msrc
CVSS3: 8.8
EPSS Низкий

Описание

Microsoft Outlook Security Feature Bypass Vulnerability

FAQ

Is the Preview Pane an attack vector for this vulnerability?

Yes. The Preview Pane is an attack vector, but additional user interaction is required.

According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

The user would have to click on a specially crafted URL to be compromised by the attacker.

What kind of security feature could be bypassed by successfully exploiting this vulnerability?

The attacker would be able to bypass the Microsoft Outlook Security Notice prompt.

After I installed the July 2023 security updates for Outlook, I can no longer access UNC, SMB, or file:// type URLs from my Outlook. How do I prevent this from happening?

The July 2023 Outlook security updates limit access to UNC, SMB, and file:// type URLs to only those the system identifies as Local, Intranet, or Trusted Sites. Additionally, when you click a link for one of these UNC, SMB, or file:// type URLs, a confirmation dialog will be displayed. To ensure continued access, add the URL, UNC, or FQDN path to the Trusted Site Zone as described in Intranet site is identified as Internet site - Windows Client | Microsoft Learn.

For more information see Outlook blocks opening FQDN and IP address hyperlinks after installing protections for Microsoft Outlook Security Feature Bypass Vulnerability released July 11, 2023.

Обновления

ПродуктСтатьяОбновление
Microsoft Outlook 2013 (32-bit editions)
Microsoft Outlook 2013 (64-bit editions)
Microsoft Outlook 2013 RT Service Pack 1
-
Microsoft Outlook 2016 (32-bit edition)
Microsoft Outlook 2016 (64-bit edition)
Microsoft Office 2019 for 32-bit editions
-
Microsoft Office 2019 for 64-bit editions
-
Microsoft 365 Apps for Enterprise for 32-bit Systems
-
Microsoft 365 Apps for Enterprise for 64-bit Systems
-
Microsoft Office LTSC 2021 for 64-bit editions
-

Показывать по

Возможность эксплуатации

Publicly Disclosed

No

Exploited

Yes

Latest Software Release

Exploitation Detected

DOS

N/A

EPSS

Процентиль: 64%
0.00475
Низкий

8.8 High

CVSS3

Связанные уязвимости

CVSS3: 8.8
nvd
больше 2 лет назад

Microsoft Outlook Security Feature Bypass Vulnerability

CVSS3: 8.8
github
больше 2 лет назад

Microsoft Outlook Security Feature Bypass Vulnerability

CVSS3: 8.8
fstec
больше 2 лет назад

Уязвимость почтового клиента Microsoft Outlook, связанная с недостаточной проверкой входных данных, позволяющая нарушителю обойти существующие ограничения безопасности

EPSS

Процентиль: 64%
0.00475
Низкий

8.8 High

CVSS3