First published: Tue Jul 11 2023(Updated: )
Microsoft Outlook contains a security feature bypass vulnerability that allows an attacker to bypass the Microsoft Outlook Security Notice prompt.
Credit: secure@microsoft.com secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Outlook | ||
Microsoft 365 Apps | ||
Microsoft Office | =2019 | |
Microsoft Office Long Term Servicing Channel | =2021 | |
Microsoft Outlook | =2013 | |
Microsoft Outlook | =2013-sp1 | |
Microsoft Outlook | =2016 | |
Microsoft Office 2019 for 32-bit editions | ||
Microsoft Outlook 2013 | ||
Microsoft 365 Apps for Enterprise | ||
Microsoft Office LTSC 2021 for 32-bit editions | ||
Microsoft Outlook 2016 | ||
Microsoft Office LTSC 2021 for 64-bit editions | ||
Microsoft Outlook 2013 | ||
Microsoft Outlook 2016 | ||
Microsoft Office 2019 for 64-bit editions | ||
Microsoft 365 Apps for Enterprise | ||
Microsoft Outlook 2013 RT | ||
Microsoft Office | =2021 |
Apply updates per vendor instructions or discontinue use of the product if updates are unavailable.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-35311 is a security feature bypass vulnerability in Microsoft Outlook.
The severity of CVE-2023-35311 is high, with a CVSS score of 8.8.
CVE-2023-35311 allows an attacker to bypass the Microsoft Outlook Security Notice prompt.
CVE-2023-35311 affects Microsoft Outlook 2013, 2016, and the corresponding 32-bit and 64-bit editions.
To fix CVE-2023-35311, update Microsoft Outlook to the latest version and apply the recommended security updates.