First published: Tue Aug 08 2023(Updated: )
Microsoft Outlook Spoofing Vulnerability
Credit: secure@microsoft.com secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Office LTSC 2021 for 32-bit editions | ||
Microsoft 365 Apps for Enterprise | ||
Microsoft Office 2019 for 64-bit editions | ||
Microsoft Office 2019 for 32-bit editions | ||
Microsoft Outlook 2013 RT | ||
Microsoft 365 Apps for Enterprise | ||
Microsoft Office LTSC 2021 for 64-bit editions | ||
Microsoft 365 Apps | ||
Microsoft Office | =2019 | |
Microsoft Office Long Term Servicing Channel | =2021 | |
Microsoft Outlook | =2013-sp1 | |
Microsoft Outlook | =2013-sp1 | |
Microsoft Outlook | =2016 | |
Microsoft Outlook 2013 | ||
Microsoft Outlook 2013 | ||
Microsoft Outlook 2016 | ||
Microsoft Outlook 2016 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-36893 is a Microsoft Outlook Spoofing Vulnerability.
The following software is affected: Microsoft 365 Apps for Enterprise, Microsoft Office 2019, Microsoft Outlook 2013 RT, and Microsoft Office LTSC 2021.
CVE-2023-36893 has a severity rating of 6.5 (high).
To fix CVE-2023-36893, apply the security updates provided by Microsoft for the affected software versions.
You can find more information about CVE-2023-36893 on the Microsoft Security Response Center website.