Ausnahme gefangen: SSL certificate problem: certificate is not yet valid 📌 Microsoft’s Urgent Fix: Bypassing Recent Patches for Critical Outlook Zero-Day Exploited in the Wild

🏠 Team IT Security News

TSecurity.de ist eine Online-Plattform, die sich auf die Bereitstellung von Informationen,alle 15 Minuten neuste Nachrichten, Bildungsressourcen und Dienstleistungen rund um das Thema IT-Sicherheit spezialisiert hat.
Ob es sich um aktuelle Nachrichten, Fachartikel, Blogbeiträge, Webinare, Tutorials, oder Tipps & Tricks handelt, TSecurity.de bietet seinen Nutzern einen umfassenden Überblick über die wichtigsten Aspekte der IT-Sicherheit in einer sich ständig verändernden digitalen Welt.

16.12.2023 - TIP: Wer den Cookie Consent Banner akzeptiert, kann z.B. von Englisch nach Deutsch übersetzen, erst Englisch auswählen dann wieder Deutsch!

Google Android Playstore Download Button für Team IT Security



📚 Microsoft’s Urgent Fix: Bypassing Recent Patches for Critical Outlook Zero-Day Exploited in the Wild


💡 Newskategorie: Hacking
🔗 Quelle: blackhatethicalhacking.com

Microsoft’s Urgent Fix: Bypassing Recent Patches for Critical Outlook Zero-Day Exploited in the Wild

Premium Content

Patreon
Subscribe to Patreon to watch this episode.
Reading Time: 3 Minutes

Microsoft Addresses Critical Outlook Zero-Day Bypass Vulnerability

Microsoft swiftly responded to a security vulnerability this week, addressing a flaw that allowed remote attackers to bypass recent patches targeting a critical zero-day security issue in Outlook. This zero-click bypass, known as CVE-2023-29324, impacts all supported versions of Windows and was brought to light by Akamai security researcher Ben Barnea.

Barnea explained, “All Windows versions are affected by the vulnerability. As a result, all Outlook client versions on Windows are exploitable.”

The previously patched Outlook zero-day bug, identified as CVE-2023-23397, is a privilege escalation flaw in the Outlook client for Windows. This flaw enables attackers to illicitly obtain NTLM hashes without user interaction in NTLM-relay attacks. Exploiting the bug involves sending messages with extended MAPI properties containing UNC paths to customized notification sounds, leading the Outlook client to connect to SMB shares under the attackers’ control.

Microsoft tackled the issue by implementing a MapUrlToZone call to ensure that UNC paths do not link to internet URLs. Additionally, they replaced the sounds with default reminders if such links were detected.

See Also: So you want to be a hacker?
Offensive Security, Bug Bounty Courses

Microsoft Warns of Critical Outlook Zero-Day Bypass Vulnerability Exploited by APT28 Hackers

During the analysis of the CVE-2023-23397 mitigation, Barnea discovered a way to change the URL in reminder messages, tricking the MapUrlToZone checks into accepting remote paths as local paths. This bypasses Microsoft’s patch, resulting in the Windows Outlook client connecting to the attacker’s server.

Barnea shed light on the matter, stating, “This issue seems to be a result of the complex handling of paths in Windows.”

In response to Barnea’s findings, Microsoft issued a warning, emphasizing the importance of installing updates for both CVE-2023-23397 and CVE-2023-29324 to ensure comprehensive protection.

While Internet Explorer has been retired, the vulnerable MSHTML platform is still utilized by certain applications through the WebBrowser control, as well as by the Internet Explorer mode in Microsoft Edge. Consequently, Microsoft urges customers to install the latest security updates and the IE Cumulative updates, specifically addressing the CVE-2023-29324 vulnerability, to remain fully protected.

The severity of this vulnerability became evident as Microsoft unveiled details from a private threat analytics report, revealing that it had been exploited by Russian APT28 state hackers, also known as STRONTIUM, Sednit, Sofacy, or Fancy Bear. These hackers targeted at least 14 government, military, energy, and transportation organizations between mid-April and December 2022.

APT28 is closely associated with Russia’s military intelligence service, the Main Directorate of the General Staff of the Armed Forces of the Russian Federation (GRU). Exploiting the flaw, the threat actors employed malicious Outlook notes and tasks to steal NTLM hashes, coercing their targets’ devices into authenticating with attacker-controlled SMB shares. The stolen credentials were then used for lateral movement within the victims’ networks and to manipulate Outlook mailbox permissions, facilitating the exfiltration of specific account emails.

To assist Exchange admins in identifying potential breaches, Microsoft released a script. However, they advised administrators to remain vigilant for other signs of exploitation, as threat actors may have taken steps to cover their tracks.

Are u a security researcher? Or a company that writes articles or write ups about Cyber Security, Offensive Security (related to information security in general) that match with our specific audience and is worth sharing?

If you want to express your idea in an article contact us here for a quote: info@blackhatethicalhacking.com

Source: bleepingcomputer.com

Source Link

Merch
The post Microsoft’s Urgent Fix: Bypassing Recent Patches for Critical Outlook Zero-Day Exploited in the Wild first appeared on Black Hat Ethical Hacking. ...



📌 When it comes to patches, how urgent is urgent? [Chet Chat Podcast 268]


📈 41.48 Punkte

📌 CISA Issues Urgent Warning: Adobe ColdFusion Vulnerability Exploited in the Wild


📈 35.79 Punkte

📌 Google ‘0Day In the Wild’ project tracks zero-days exploited in the Wild


📈 34.48 Punkte

📌 Microsoft Patches Outlook.com to Fix Recent Spam Flood


📈 33.34 Punkte

📌 Microsoft Patches Outlook.com to Fix Recent Spam Flood


📈 33.34 Punkte

📌 Tor Browser 8.5.2 release patches critical Firefox vulnerability exploited in the wild


📈 32.98 Punkte

📌 Citrix rolls out patches for critical ADC vulnerability exploited in the wild


📈 32.98 Punkte

📌 Apple Patches Two Zero-Days Exploited in the Wild


📈 32.42 Punkte

📌 Apple emits iOS, iPadOS, watchOS, macOS patches to fix three hijack-my-device flaws exploited in the wild


📈 32.13 Punkte

📌 Apple Ships Urgent iOS Patch for Newly Exploited Zero-Days


📈 32.04 Punkte

📌 Cuvva: Time-limit Bypassing, Rate-limit Bypassing and Spamming at https://ops.cuvva.co


📈 30.73 Punkte

📌 Apple critical patches fix in-the-wild iPhone exploits – update now!


📈 29.45 Punkte

📌 Ivanti Releases Urgent Fix for Critical Sentry RCE Vulnerability


📈 29.08 Punkte

📌 Microsoft patches Windows flaw exploited in the wild (CVE-2022-41033)


📈 28.41 Punkte

📌 Saudi Arabia Holds "Urgent" Talks Following Recent Cyber-Attacks


📈 27.31 Punkte

📌 Saudi Arabia Holds "Urgent" Talks Following Recent Cyber-Attacks


📈 27.31 Punkte

📌 Saudi Arabia Holds "Urgent" Talks Following Recent Cyber-Attacks


📈 27.31 Punkte

📌 Saudi Arabia Holds "Urgent" Talks Following Recent Cyber-Attacks


📈 27.31 Punkte

📌 Microsoft Warns of Critical Bugs Being Exploited in the Wild


📈 27.28 Punkte

📌 Microsoft June 2021 Patch Tuesday: 50 vulnerabilities patched, six zero-days exploited in the wild


📈 26.72 Punkte

📌 Four zero-days in Microsoft Exchange actively exploited in the wild


📈 26.72 Punkte

📌 Apple patches macOS Gatekeeper bypass vulnerability exploited in the wild


📈 26.48 Punkte

📌 Apple patches iOS, macOS, iPadOS, watchOS, kitchen-sinkOS bugs said to be exploited in the wild


📈 26.48 Punkte

📌 Adobe Patches ColdFusion Vulnerability Exploited in the Wild


📈 26.48 Punkte

📌 Adobe releases patches to address ColdFusion 0day exploited in the Wild


📈 26.48 Punkte

📌 Adobe releases patches to address ColdFusion 0day exploited in the Wild


📈 26.48 Punkte

📌 vBulletin Patches Vulnerability Exploited in the Wild


📈 26.48 Punkte

📌 Google Patches Chrome Vulnerability Exploited in the Wild


📈 26.48 Punkte

📌 Trend Micro Patches Two Vulnerabilities Exploited in the Wild


📈 26.48 Punkte

📌 0patch releases free unofficial patches for Windows 0days exploited in the wild


📈 26.48 Punkte

📌 Adobe Patches Reader Vulnerability Exploited in the Wild


📈 26.48 Punkte

📌 Urgent: Microsoft Issues Patches for 97 Flaws, Including Active Ransomware Exploit


📈 26.48 Punkte

📌 Microsoft Patch Tuesday updates fix CVE-2019-1429 flaw exploited in the wild


📈 26.44 Punkte

📌 Urgent: 5 CVEs being exploited right now by SVR | UpGuard


📈 26.11 Punkte











matomo