Zero-Click Outlook RCE Exploits: New Details and Disclosures

Security researchers have revealed technical details about two now-patched security flaws in Microsoft Windows that could be exploited by threat actors to achieve remote code execution on the Outlook email service without any user interaction. The vulnerabilities, CVE-2023-35384 and CVE-2023-36710, were addressed by Microsoft in August and October 2023, respectively. CVE-2023-35384 is a bypass for a critical security flaw that Microsoft patched in March 2023, and it can be used to steal NTLM credentials and conduct a relay attack. The vulnerabilities can be chained together to create a full zero-click remote code execution exploit against Outlook clients. Organizations are advised to use microsegmentation to block outgoing SMB connections to remote public IP addresses and to disable NTLM or add users to the Protected Users security group to mitigate the risks.
- Beware: Experts Reveal New Details on Zero-Click Outlook RCE Exploits The Hacker News
- Akamai finds new Outlook exploits that leverage sound file attachments SiliconANGLE News
- Windows Zero-click RCE Flaw - Attackers Exploit Outlook Clients CybersecurityNews
- Akamai discloses zero-click exploit for Microsoft Outlook TechTarget
Reading Insights
0
1
2 min
vs 3 min read
77%
559 → 130 words
Want the full story? Read the original article
Read on The Hacker News