Taggart: ~# :idle: · @mttaggart
3212 followers · 4235 posts · Server fosstodon.org

Here it is, the code that successfully exploited remotely.

It turns out that the ReminderOverrideDefault, ReminderPlaySound, and ReminderSoundFile properties are available on straight-up emails, not just cal invites. Tasks also, but mail is easiest.

So load this function, then run the function as shown.

The result is you and the recipient will have hashes disclosed to the remote SMB server.

#cve202323397

Last updated 1 year ago

Taggart: ~# :idle: · @mttaggart
3209 followers · 4222 posts · Server fosstodon.org

I'm once again asking if _anyone_ has seen the PoCs for actually work against remote targets.

MDSec demo: local attack
Hammond's demo: local attack
My own testing: local attack

With both flavors of PoC right now, I can only get this thing to trigger on my own machine, but not recipients. The invite is received, but the SMB server is not contacted by the target. I'm wondering if we're missing something here.

#cve202323397 #infosec #threatintel #cybersecurity

Last updated 1 year ago

Taggart: ~# :idle: · @mttaggart
3209 followers · 4221 posts · Server fosstodon.org
Taggart: ~# :idle: · @mttaggart
3204 followers · 4201 posts · Server fosstodon.org

So the Outlook jawn.

Sending NTLMv2 hashes to the web sucks, but to me this is scarier as a post-exploit spearphishing tool. Imagine hanging out in a network with Inveigh/Responder, then being able to email the exact person whose hash you want.

#cve202323397 #infosec #cybersecurity

Last updated 1 year ago

Ján Trenčanský · @j91321
76 followers · 140 posts · Server infosec.exchange

Partial mitigation for CVE-2023-23397 if you are running ESET is to configure your trusted zone and enable "Deny NTLM authentication in SMB protocol for connecting a server outside the Trusted zone". (This is ESET firewall Trusted Zone not the Windows one)

While this won't stop the WebDAV authentication it's a good mitigation to consider.

Kudos to @donnymaasland@twitter.com for testing it. twitter.com/donnymaasland/stat

#cve202323397

Last updated 1 year ago

Joe Słowik · @jfslowik
2810 followers · 1798 posts · Server infosec.exchange

This article by me at Forbes has now been updated with analysis from Mandiant (now part of Google Cloud), which reports Fancy Bear (APT28) has been exploiting CVE-2023-23397 since April 2022.

"This will be a propagation event. This is an excellent tool for nation-state actors and criminals alike who will be on a bonanza in the short term" - John Hultquist, head of Mandiant Intelligence Analysis.

forbes.com/sites/daveywinder/2

#infosec #microsoft #outlook #zeroday #cve202323397 #mandiant #threatanalysis #news #russiaukrainewar

Last updated 1 year ago

Frehi · @frehi
72 followers · 820 posts · Server fosstodon.org

While my colleagues are updating Outlook and patching Exchange, I just added a Custom IOA rule in @crowdstrike to detect and block CVE-2023-23397 TCP/445 Emanating from Outlook.

reddit.com/r/crowdstrike/comme

#cve202323397 #atp #mitigation #microsoft #outlook #zeroday

Last updated 1 year ago