The vulnerability was discovered by Ben Barnea, a security researcher at Akamai. He explains that the victim could trigger the vulnerability with no user interaction. An unauthenticated attacker on the internet could use the vulnerability to coerce an Outlook client to connect to an attacker-controlled server. This results in NTLM credentials theft. To resolve the issue, Microsoft added a call to the MapUrlToZone Windows API function to check that the path is not referring to an internet URL and replace the sound with a default reminder if it does.
While analyzing the patch for CVE-2023-23397, Barnea discovered that MapUrlToZone could be tricked into thinking that a remote path is a local one, by sending a crafted URL in the reminder message. This would bypass Microsoft’s mitigations and cause the Outlook client to connect to the remote server. The vulnerable MSHTML platform, which contains the security flaw, continues to be used in Windows by the Internet Explorer mode in Microsoft Edge and by other applications through the WebBrowser control. To fully resolve the issue, the tech giant recommends installing patches for both CVE-2023-23397 and CVE-2023-29324. Users who install Security-Only updates should install the IE Cumulative updates to mitigate the bug.
Overall, the incident highlights the importance of regular software patching, vulnerability management, and threat intelligence sharing. In the first five months of 2023, Microsoft has addressed more than 450 issues, and it is likely that there are still many undiscovered vulnerabilities that can lead to critical data breaches. Organizations need to prioritize patch management, software updates, and security intelligence to protect their assets and keep current with the latest cybersecurity risks. As a New York Times recommendation, organizations should also implement appropriate security controls such as user authentication, data encryption, and access control to minimize the risks of a zero-day attack.
<< photo by Zen Chung >>
You might want to read !
- “New Free Tool Offers Hope in Decrypting Ransomware Attacks”
- “Uncovering the BEC Scheme: How Israeli Connection Paved the Way to Attack Multinational Companies”
- Apple Releases Critical Update to Fix Bluetooth Vulnerability in AirPods and Beats
- “Microsoft’s Swift Response: Patching Two Critical Zero-Day Vulnerabilities”
- SquareX Launches Innovative Solution to Combat Browser-Based Cyberattacks
- Malware Misdirection: Attackers Using Popular CDNs as Cover
- Mandiant CEO claims China has redefined its approach to cyberattacks
- US investigates potential cybersecurity threats posed by Rockwell Automation’s China operations
- “Apple’s Swift Response to Security Threats: A New Era of Timely Protection”
- “Intel Boot Guard Key Leak Raises Long-Term Security Concerns”
- “Uncovering the Dark Side of Genomic Technology: The Alarming Vulnerability of DNA Sequencing Equipment to Cyber Attacks”