Comments on: Outlook Elevation of Privilege Vulnerability Leaks Credentials via NTLM https://practical365.com/cve-2023-23397-ntlm-vulnerability/ Practical Office 365 News, Tips, and Tutorials Wed, 17 Jan 2024 19:28:32 +0000 hourly 1 https://wordpress.org/?v=6.6.1 By: <div class="apbct-real-user-wrapper"> <div class="apbct-real-user-author-name">Tony Redmond</div> <div class="apbct-real-user-badge" onmouseover=" let popup = document.getElementById('apbct_trp_comment_id_257938'); popup.style.display = 'inline-flex'; "> <div class="apbct-real-user-popup" id="apbct_trp_comment_id_257938"> <div class="apbct-real-user-title"> <p class="apbct-real-user-popup-header">The Real Person!</p> <p class="apbct-real-user-popup-text">Author <b>Tony Redmond</b> acts as a real person and passed all tests against spambots. Anti-Spam by CleanTalk.</p> </div> </div> </div> </div> https://practical365.com/cve-2023-23397-ntlm-vulnerability/#comment-257938 Thu, 30 Mar 2023 09:17:54 +0000 https://practical365.com/?p=58228#comment-257938 In reply to Sheldon Davidson.

Hi Sheldon,

I’ve checked the text and can’t find anything that says that the Outlook subscription client is not vulnerable. Could you point me to the words that you are worried about? Given the dynamic nature of this incident, I applied several updates to the text as new information emerged. There was some confusion initially about if Office 365 was exposed and I added a chunk of text to explain why I think the issue is less likely to appear there, but there’s no doubt that someone could be exposed if they used an old client and their credentials were transmitted to an attacker. Even if their account was protected by MFA, the attacker might be able to use the credentials to access a service that doesn’t use MFA.

]]>
By: Sheldon Davidson https://practical365.com/cve-2023-23397-ntlm-vulnerability/#comment-257903 Thu, 30 Mar 2023 00:36:09 +0000 https://practical365.com/?p=58228#comment-257903 Hey Tony. As of 2/29 this post is still misleading in saying that 365 outlook client is not vulnerable because it doesnt use ntlm.

Here is how I understand that it works:

-If you are using Any windows outlook client you are vulnerable including the 365 apps

-Once the outlook client is exploited, your NTLM Hashes get dumped to the remote attacker

-Once the hashes are cracked (or are they plaintext credentials? I dont remember and it doesnt matter in this explanation) then the attacker can use your credentials for anything that you use your credentials for which includes things like RPC if its enabled.

So it doesnt matter if the 365 client doesnt use NTLM or not, they get dumped regardless and can be used in any way the attacker wants. Please forgive me if this is incorrect, but thats how I currently understand how it works

]]>
By: <div class="apbct-real-user-wrapper"> <div class="apbct-real-user-author-name">Tony Redmond</div> <div class="apbct-real-user-badge" onmouseover=" let popup = document.getElementById('apbct_trp_comment_id_257461'); popup.style.display = 'inline-flex'; "> <div class="apbct-real-user-popup" id="apbct_trp_comment_id_257461"> <div class="apbct-real-user-title"> <p class="apbct-real-user-popup-header">The Real Person!</p> <p class="apbct-real-user-popup-text">Author <b>Tony Redmond</b> acts as a real person and passed all tests against spambots. Anti-Spam by CleanTalk.</p> </div> </div> </div> </div> https://practical365.com/cve-2023-23397-ntlm-vulnerability/#comment-257461 Sat, 25 Mar 2023 12:16:15 +0000 https://practical365.com/?p=58228#comment-257461 In reply to Jose Ramos.

No, there is a patch listed for Microsoft 365 apps on the CVE page. I must say that I didn’t use it because the version of the Microsoft 365 apps I use is version 2303 and the fix is in that.

]]>
By: Jose Ramos https://practical365.com/cve-2023-23397-ntlm-vulnerability/#comment-257243 Thu, 23 Mar 2023 17:29:37 +0000 https://practical365.com/?p=58228#comment-257243 In reply to Tony Redmond.

I also looked in the section where we have the KB’s, but there´s no link to download the patch, it just forwards to the link: https://learn.microsoft.com/en-us/officeupdates/microsoft365-apps-security-updates

]]>
By: Jose Ramos https://practical365.com/cve-2023-23397-ntlm-vulnerability/#comment-257216 Thu, 23 Mar 2023 13:20:24 +0000 https://practical365.com/?p=58228#comment-257216 In reply to Tony Redmond.

Correct, the patch was wrong and I was trying to install the 64-bit one. I installed the 32-bit and it worked, thanks. I questioned this to the customer and he said he uses it for RPA automation, but I totally agree with you Tony. We shouldn’t have Office installed on servers. Now, I have a problem that 3 servers on the list are using Microsoft Apps 365 and, from what I’ve seen, we don’t have a patch for that version, is it correct?

]]>
By: John https://practical365.com/cve-2023-23397-ntlm-vulnerability/#comment-257162 Thu, 23 Mar 2023 03:03:18 +0000 https://practical365.com/?p=58228#comment-257162 In reply to Tony Redmond.

Hi Tony,
So they really cannot access my local Windows domain (hosted on a local onprem server) even if they have the username and password, is that correct? Is there anything else that they can do from this exploit?

]]>
By: Tony Redmond https://practical365.com/cve-2023-23397-ntlm-vulnerability/#comment-257126 Wed, 22 Mar 2023 18:23:32 +0000 https://practical365.com/?p=58228#comment-257126 In reply to Jose Ramos.

Why is Office installed on a server? Generally speaking, this is a bad idea.

In any case, AFAIK, all Outlook versions are vulnerable unless patched. Perhaps you’re using an incorrect patch OR the patch doesn’t run on a Windows server.

]]>
By: Jose Ramos https://practical365.com/cve-2023-23397-ntlm-vulnerability/#comment-257120 Wed, 22 Mar 2023 17:46:03 +0000 https://practical365.com/?p=58228#comment-257120 Good afternoon, all.
Tom, I received a list of 20 servers from the security team at the company I do consulting and they are Server 2016 (64-bits). They all have Office 2016 Standard installed and I downloaded (KB5002254) to start the installation tests on a Test server. When I run setup, I get a message like this: “There are no products affected by this package installed on this system”.

Even if I have Outlook 2016 installed, can I say that this server is safe from the CVE-2023-23397 threat?

Best Regards and thanks for the excellent article!

]]>
By: Tony Redmond https://practical365.com/cve-2023-23397-ntlm-vulnerability/#comment-257114 Wed, 22 Mar 2023 16:54:39 +0000 https://practical365.com/?p=58228#comment-257114 In reply to Nathan.

The updates are available in the Security Updates section of the page. There are links to the individual Knowledge Base articles for each version of Outlook.

]]>
By: Nathan https://practical365.com/cve-2023-23397-ntlm-vulnerability/#comment-257113 Wed, 22 Mar 2023 16:52:03 +0000 https://practical365.com/?p=58228#comment-257113 Microsoft 365 Windows Outlook app is vulnerable, but so far I cannot find an actual PATCH to apply for it.

https://msrc.microsoft.com/update-guide/en-us/vulnerability/CVE-2023-23397

This article just goes in circles.

]]>