• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
beware: experts reveal new details on zero click outlook rce exploits

Beware: Experts Reveal New Details on Zero-Click Outlook RCE Exploits

You are here: Home / General Cyber Security News / Beware: Experts Reveal New Details on Zero-Click Outlook RCE Exploits
December 18, 2023

Technical details have emerged about two now-patched security flaws in Microsoft Windows that could be chained by danger actors to reach remote code execution on the Outlook email provider sans any person interaction.

“An attacker on the internet can chain the vulnerabilities collectively to create a full, zero-click remote code execution (RCE) exploit towards Outlook customers,” Akamai security researcher Ben Barnea, who found out the vulnerabilities, stated in a two-component report shared with The Hacker News.

The security issues, which ended up tackled by Microsoft in August and Oct 2023, respectively, are shown under –

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


  • CVE-2023-35384 (CVSS score: 5.4) – Windows HTML Platforms Security Element Bypass Vulnerability
  • CVE-2023-36710 (CVSS score: 7.8) – Windows Media Basis Core Remote Code Execution Vulnerability

CVE-2023-35384 has been described by Akamai as a bypass for a critical security flaw that Microsoft patched in March 2023. Tracked as CVE-2023-23397 (CVSS score: 9.8), the flaw relates to a scenario of privilege escalation that could final result in the theft of NTLM qualifications and allow an attacker to conduct a relay attack.

Before this month, Microsoft, Proofpoint, and Palo Alto Networks Device 42 disclosed that a Russian menace actor recognised as APT29 has been actively weaponizing the bug to get unauthorized entry to victims’ accounts inside of Exchange servers.

It is worth noting that CVE-2023-35384 is also the second patch bypass immediately after CVE-2023-29324, which was also found by Barnea and subsequently remediated by Redmond as part of May perhaps 2023 security updates.

“We discovered a further bypass to the unique Outlook vulnerability — a bypass that as soon as again permitted us to coerce the consumer to join to an attacker-managed server and down load a malicious audio file,” Barnea said.

Cybersecurity

CVE-2023-35384, like CVE-2023-29324, is rooted in the parsing of a route by the MapUrlToZone perform that could be exploited by sending an email that contains a malicious file or a URL to an Outlook client.

“A security feature bypass vulnerability exists when the MSHTML platform fails to validate the appropriate Security Zone of requests for precise URLs. This could enable an attacker to lead to a person to entry a URL in a much less restricted Internet Security Zone than supposed,” Microsoft observed in its advisory.

In accomplishing so, the vulnerability can not only be utilised to leak NTLM credentials, but can also be chained with the sound parsing flaw (CVE-2023-36710) to down load a tailor made seem file that, when autoplayed using Outlook’s reminder audio function, can direct to a zero-click code execution on the victim device.

CVE-2023-36710 impacts the Audio Compression Manager (ACM) part, a legacy Windows multimedia framework which is utilised to deal with audio codecs, and is the outcome of an integer overflow vulnerability that occurs when taking part in a WAV file.

“Finally, we managed to result in the vulnerability using the IMA ADP codec,” Barnea spelled out. “The file sizing is close to 1.8 GB. By executing the math restrict operation on the calculation we can conclude that the smallest doable file dimensions with IMA ADP codec is 1 GB.”

To mitigate the risks, it is really suggested that businesses use microsegmentation to block outgoing SMB connections to remote public IP addresses. On top of that, it also suggested to possibly disable NTLM, or increase buyers to the Shielded Buyers security group, which helps prevent the use of NTLM as an authentication mechanism.

Found this posting attention-grabbing? Follow us on Twitter  and LinkedIn to study more special written content we submit.


Some sections of this report are sourced from:
thehackernews.com

Previous Post: «top 7 trends shaping saas security in 2024 Top 7 Trends Shaping SaaS Security in 2024
Next Post: Double-Extortion Play Ransomware Strikes 300 Organizations Worldwide double extortion play ransomware strikes 300 organizations worldwide»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • BREAKING: 7,000-Device Proxy Botnet Using IoT, EoL Systems Dismantled in U.S. – Dutch Operation
  • OtterCookie v4 Adds VM Detection and Chrome, MetaMask Credential Theft Capabilities
  • Initial Access Brokers Target Brazil Execs via NF-e Spam and Legit RMM Trials
  • Deploying AI Agents? Learn to Secure Them Before Hackers Strike Your Business
  • Malicious npm Packages Infect 3,200+ Cursor Users With Backdoor, Steal Credentials
  • Beyond Vulnerability Management – Can You CVE What I CVE?
  • Google Rolls Out On-Device AI Protections to Detect Scams in Chrome and Android
  • Chinese Hackers Exploit SAP RCE Flaw CVE-2025-31324, Deploy Golang-Based SuperShell
  • 38,000+ FreeDrain Subdomains Found Exploiting SEO to Steal Crypto Wallet Seed Phrases
  • SonicWall Patches 3 Flaws in SMA 100 Devices Allowing Attackers to Run Code as Root

Copyright © TheCyberSecurity.News, All Rights Reserved.