8.8

CVE-2023-35311

Warning

Microsoft Outlook Security Feature Bypass Vulnerability

Data is provided by the National Vulnerability Database (NVD)
Microsoft365 Apps Version- SwEditionenterprise
MicrosoftOffice Version2019
MicrosoftOutlook Version2013 Update- Edition- SwEdition- SwPlatform-
MicrosoftOutlook Version2013 Updatesp1 SwEditionrt
MicrosoftOutlook Version2016

11.07.2023: CISA Known Exploited Vulnerabilities (KEV) Catalog

Microsoft Outlook Security Feature Bypass Vulnerability

Vulnerability

Microsoft Outlook contains a security feature bypass vulnerability that allows an attacker to bypass the Microsoft Outlook Security Notice prompt.

Description

Apply updates per vendor instructions or discontinue use of the product if updates are unavailable.

Required actions
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 1.27% 0.786
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
134c704f-9b21-4f2e-91b3-4a467353bcc0 7.5 1.6 5.9
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
secure@microsoft.com 8.8 2.8 5.9
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
nvd@nist.gov 7.5 1.6 5.9
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
CWE-367 Time-of-check Time-of-use (TOCTOU) Race Condition

The product checks the state of a resource before using that resource, but the resource's state can change between the check and the use in a way that invalidates the results of the check. This can cause the product to perform invalid actions when the resource is in an unexpected state.