Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

msrc логотип

CVE-2024-20670

Опубликовано: 09 апр. 2024
Источник: msrc
CVSS3: 8.1
EPSS Низкий

Описание

Outlook for Windows Spoofing Vulnerability

FAQ

What type of information could be disclosed by this vulnerability?

Exploiting this vulnerability could allow the disclosure of NTLM hashes.

How could an attacker exploit this vulnerability?

External attackers could send specially crafted emails that will cause a connection from the victim to an untrusted location of attackers' control. This will leak the Net-NTLMv2 hash of the victim to the untrusted network which an attacker can then relay to another service and authenticate as the victim.

According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

An attacker would have to send the victim a malicious URL that the victim would have to execute.

Обновления

ПродуктСтатьяОбновление
Outlook for Windows

Показывать по

Возможность эксплуатации

Publicly Disclosed

No

Exploited

No

Latest Software Release

Exploitation Less Likely

DOS

N/A

EPSS

Процентиль: 90%
0.05117
Низкий

8.1 High

CVSS3

Связанные уязвимости

CVSS3: 8.1
nvd
почти 2 года назад

Outlook for Windows Spoofing Vulnerability

CVSS3: 8.1
github
почти 2 года назад

Outlook for Windows Spoofing Vulnerability

CVSS3: 8.1
fstec
почти 2 года назад

Уязвимость почтового клиента Microsoft Outlook для операционных систем Windows, позволяющая нарушителю осуществлять спуфинг-атаки

EPSS

Процентиль: 90%
0.05117
Низкий

8.1 High

CVSS3