Outlook attack works without a click!

B2B Cyber ​​Security ShortNews

Share post

Even the BSI warns of the CVE-2023-23397 vulnerability in Outlook, as it can be exploited without a single click from a user. Tenable experts tested a simple scenario in which the attack succeeds even though the email was only received and not clicked.

The youngest Reporting of Outlook vulnerability CVE-2023-23397 prompted Tenable to shed a little more light on the subject. A comment from Satnam Narang, Senior Staff Research Engineer at Tenable. While private users or single-user PCs are usually automatically protected by Windows updates, administrators have to check or roll out the patch themselves.

Dangerous zero-click vulnerability

“Within 24 hours of publication, MDSec researchers have already developed a functional proof-of-concept exploit for CVE-2023-23397, demonstrating how easy it is to exploit. In this example, they were able to exploit the vulnerability through an Outlook appointment reminder that appeared on the screen after the specially crafted message was received by the email server and downloaded by the Outlook client.

It required no user interaction, making this a zero-click vulnerability. Additionally, Microsoft confirmed that the flaw was exploited as a zero day as part of limited attacks by a Russia-based threat actor on target government, transport, energy, and military organizations in Europe.

Is the big attack yet to come?

Due to the ease with which this vulnerability can be exploited, we believe it is only a matter of time before it enters the playbooks of other threat actors, including ransomware groups. Tenable anticipates that CVE-2023-23397 will be one of the top vulnerabilities of 2023.

Like us in ours current Threat Landscape Report 2022 have highlighted, known vulnerabilities pose the greatest risk to organizations today. Now that CVE-2023-23397 has gone from a zero-day to a known vulnerability, we encourage all organizations using Microsoft—especially Outlook—to patch it Prioritize bugs sooner rather than later.”

More at Tenable.com

 


About Tenable

Tenable is a Cyber ​​Exposure company. Over 24.000 companies worldwide trust Tenable to understand and reduce cyber risk. Nessus inventors have combined their vulnerability expertise in Tenable.io, delivering the industry's first platform that provides real-time visibility into and secures any asset on any computing platform. Tenable's customer base includes 53 percent of the Fortune 500, 29 percent of the Global 2000, and large government agencies.


 

Matching articles on the topic

Report: 40 percent more phishing worldwide

The current spam and phishing report from Kaspersky for 2023 speaks for itself: users in Germany are after ➡ Read more

BSI sets minimum standards for web browsers

The BSI has revised the minimum standard for web browsers for administration and published version 3.0. You can remember that ➡ Read more

Stealth malware targets European companies

Hackers are attacking many companies across Europe with stealth malware. ESET researchers have reported a dramatic increase in so-called AceCryptor attacks via ➡ Read more

IT security: Basis for LockBit 4.0 defused

Trend Micro, working with the UK's National Crime Agency (NCA), analyzed the unpublished version that was in development ➡ Read more

MDR and XDR via Google Workspace

Whether in a cafe, airport terminal or home office – employees work in many places. However, this development also brings challenges ➡ Read more

Test: Security software for endpoints and individual PCs

The latest test results from the AV-TEST laboratory show very good performance of 16 established protection solutions for Windows ➡ Read more

FBI: Internet Crime Report counts $12,5 billion in damage 

The FBI's Internet Crime Complaint Center (IC3) has released its 2023 Internet Crime Report, which includes information from over 880.000 ➡ Read more

HeadCrab 2.0 discovered

The HeadCrab campaign against Redis servers, which has been active since 2021, continues to successfully infect targets with the new version. The criminals' mini-blog ➡ Read more