all InfoSec news
CVE-2023-23397 - Critical Elevation of Privilege zero-day in Microsoft Outlook, severity 9.8
March 16, 2023, 2:48 p.m. | /u/MartinZugec
cybersecurity www.reddit.com
[https://nvd.nist.gov/vuln/detail/CVE-2023-23397](https://nvd.nist.gov/vuln/detail/CVE-2023-23397)
* Exploited to steal NTLM hashes
* Used to target European organizations
* Leveraged for almost a year by APT28 (Russia)
* Reported by CERT-UA (Ukraine)
This is actively exploited, patch immediately. Microsoft also provided a script that checks Exchange items for malicious messaging items: [https://github.com/microsoft/CSS-Exchange/blob/a4c096e8b6e6eddeba2f42910f165681ed64adf7/docs/Security/CVE-2023-23397.md](https://github.com/microsoft/CSS-Exchange/blob/a4c096e8b6e6eddeba2f42910f165681ed64adf7/docs/Security/CVE-2023-23397.md)
apt28 cert cert-ua critical cve cve-2023-23397 cybersecurity exploited hashes microsoft microsoft outlook ntlm ntlm hashes organizations outlook privilege russia severity steal target ukraine zero-day
More from www.reddit.com / cybersecurity
Jobs in InfoSec / Cybersecurity
SOC 2 Manager, Audit and Certification
@ Deloitte | US and CA Multiple Locations
Information Security Engineers
@ D. E. Shaw Research | New York City
Program Associate, Cyber Risk
@ Kroll | Toronto, ONT, Canada
Cybersecurity Operations Engineer 2
@ Humana | Remote US
Vice President - Lead Security Engineer (SECS04)
@ JPMorgan Chase & Co. | Columbus, OH, United States
Security Specialist
@ BGIS | Markham, ON, Canada