8.8

CVE-2023-35311

Warnung

Microsoft Outlook Security Feature Bypass Vulnerability

Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Microsoft365 Apps Version- SwEditionenterprise
MicrosoftOffice Version2019
MicrosoftOutlook Version2013 Update- Edition- SwEdition- SwPlatform-
MicrosoftOutlook Version2013 Updatesp1 SwEditionrt
MicrosoftOutlook Version2016

11.07.2023: CISA Known Exploited Vulnerabilities (KEV) Catalog

Microsoft Outlook Security Feature Bypass Vulnerability

Schwachstelle

Microsoft Outlook contains a security feature bypass vulnerability that allows an attacker to bypass the Microsoft Outlook Security Notice prompt.

Beschreibung

Apply updates per vendor instructions or discontinue use of the product if updates are unavailable.

Erforderliche Maßnahmen
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 1.27% 0.786
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
134c704f-9b21-4f2e-91b3-4a467353bcc0 7.5 1.6 5.9
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
secure@microsoft.com 8.8 2.8 5.9
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
nvd@nist.gov 7.5 1.6 5.9
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
CWE-367 Time-of-check Time-of-use (TOCTOU) Race Condition

The product checks the state of a resource before using that resource, but the resource's state can change between the check and the use in a way that invalidates the results of the check. This can cause the product to perform invalid actions when the resource is in an unexpected state.