New Zero-Click Outlook RCE Exploits Revealed
Two newly discovered security flaws in Microsoft Windows could allow threat actors to achieve remote code execution on Outlook clients without any user interaction. The first vulnerability, CVE-2023-35384, is a bypass of a critical security flaw patched in March 2023, which could result in the theft of NTLM credentials and enable an attacker to conduct a relay attack. The second vulnerability, CVE-2023-36710, is an integer overflow vulnerability in the Audio Compression Manager (ACM) component, which could be exploited to download a custom sound file that, when autoplayed using Outlook's reminder sound feature, can lead to a zero-click code execution on the victim machine. To mitigate the risks, organizations are advised to use microsegmentation.
Related reads
- Outlook Plays Attacker Tunes: Vulnerability Chain Leading to Zero-Click RCE
- Beware: Experts Reveal New Details on Zero-Click Outlook RCE Exploits - The Hacker News
- Akamai discloses zero-click exploit for Microsoft Outlook
- Akamai finds new Outlook exploits that leverage sound file attachments
- New Windows Zero-click RCE Flaw Let Attackers Exploit Outlook Clients