First published: Tue Mar 14 2023(Updated: )
Microsoft Office Outlook contains a privilege escalation vulnerability that allows for a NTLM Relay attack against another service to authenticate as the user.
Credit: secure@microsoft.com secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft 365 Apps | ||
Microsoft Office | =2019 | |
Microsoft Office | =2021 | |
Microsoft Outlook | =2013-sp1 | |
Microsoft Outlook | =2013-sp1 | |
Microsoft Outlook | =2016 | |
Microsoft Office LTSC 2021 for 64-bit editions | ||
Microsoft Office 2019 for 64-bit editions | ||
Microsoft Office 2019 for 32-bit editions | ||
Microsoft 365 Apps for Enterprise | ||
Microsoft Office LTSC 2021 for 32-bit editions | ||
Microsoft 365 Apps for Enterprise | ||
Microsoft Outlook 2013 RT | ||
Microsoft Outlook 2016 | ||
Microsoft Outlook 2013 | ||
Microsoft Outlook 2016 | ||
Microsoft Outlook 2013 | ||
Microsoft Office Long Term Servicing Channel | =2021 | |
Microsoft Outlook | =2013-sp1 | |
Microsoft Office | ||
=2019 | ||
=2021 | ||
=2013-sp1 | ||
=2013-sp1 | ||
=2016 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-23397 is a privilege escalation vulnerability in Microsoft Office Outlook.
CVE-2023-23397 has a severity level of critical.
CVE-2023-23397 allows for an NTLM Relay attack against another service to authenticate as the user.
Microsoft Office versions including Office 2019, Office 365 Apps for Enterprise, and Office LTSC 2021 are affected by CVE-2023-23397.
To mitigate CVE-2023-23397, apply the security updates provided by Microsoft for the affected versions of Microsoft Office Outlook.