First published: Tue Mar 14 2023(Updated: )
Microsoft Office Outlook contains a privilege escalation vulnerability that allows for a NTLM Relay attack against another service to authenticate as the user.
Credit: secure@microsoft.com secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Outlook 2013 RT | ||
Microsoft Outlook 2013 | ||
Microsoft Outlook 2016 | ||
Microsoft Outlook 2016 | ||
Microsoft Outlook 2013 | ||
Microsoft Office 2019 for Mac | ||
Microsoft Office LTSC 2021 | ||
Microsoft Office 2019 for Mac | ||
Microsoft Office LTSC 2021 | ||
Microsoft Office | ||
Microsoft 365 Apps for Enterprise | ||
Microsoft 365 Apps for Enterprise | ||
Microsoft 365 Apps for enterprise | ||
Microsoft Office | =2019 | |
Microsoft Office Long Term Servicing Channel | =2021 | |
Microsoft Outlook | =2013-sp1 | |
Microsoft Outlook | =2013-sp1 | |
Microsoft Outlook | =2016 | |
Microsoft Office | =2021 | |
Microsoft Outlook | =2013-sp1 | |
=2019 | ||
=2021 | ||
=2013-sp1 | ||
=2013-sp1 | ||
=2016 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-23397 is a privilege escalation vulnerability in Microsoft Office Outlook.
CVE-2023-23397 has a severity level of critical.
CVE-2023-23397 allows for an NTLM Relay attack against another service to authenticate as the user.
Microsoft Office versions including Office 2019, Office 365 Apps for Enterprise, and Office LTSC 2021 are affected by CVE-2023-23397.
To mitigate CVE-2023-23397, apply the security updates provided by Microsoft for the affected versions of Microsoft Office Outlook.