CVE-2023-35311

8.8 HIGH

📋 TL;DR

This vulnerability allows attackers to bypass security features in Microsoft Outlook, potentially enabling them to execute malicious code or access restricted content. It affects users running vulnerable versions of Microsoft Outlook on Windows systems. The vulnerability exploits a flaw in how Outlook handles certain security mechanisms.

💻 Affected Systems

Products:
  • Microsoft Outlook
Versions: Microsoft Outlook 2016, 2019, 2021, and Microsoft 365 Apps for Enterprise
Operating Systems: Windows 10, Windows 11, Windows Server 2016, Windows Server 2019, Windows Server 2022
Default Config Vulnerable: ⚠️ Yes
Notes: Affects Outlook desktop applications, not Outlook on the web or mobile versions. Requires user interaction (opening/processing email).

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to full system compromise, data theft, or ransomware deployment through malicious email content.

🟠

Likely Case

Bypass of Outlook security warnings allowing malicious content to execute, potentially leading to malware installation or credential theft.

🟢

If Mitigated

Limited impact with proper email filtering, endpoint protection, and user awareness training in place.

🌐 Internet-Facing: HIGH - Attackers can exploit via email delivery which is internet-facing.
🏢 Internal Only: MEDIUM - Internal email systems could be used for lateral movement if initial access is gained.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Requires user interaction but exploitation is straightforward once malicious email is delivered. CISA has added to Known Exploited Vulnerabilities catalog.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: July 2023 security updates or later

Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35311

Restart Required: Yes

Instructions:

1. Apply July 2023 Microsoft security updates via Windows Update. 2. For enterprise environments, deploy updates through WSUS or Microsoft Endpoint Configuration Manager. 3. Restart systems after update installation.

🔧 Temporary Workarounds

Disable Outlook preview pane

windows

Prevents automatic processing of malicious email content in preview pane

File > Options > Trust Center > Trust Center Settings > Reading Pane > Uncheck 'Turn on the Reading Pane'

Enable enhanced security configurations

windows

Apply stricter security settings for Outlook

Group Policy: Computer Configuration > Administrative Templates > Microsoft Outlook 2016 > Security > Security Form Settings > Programmatic Security > Set to 'Always warn'

🧯 If You Can't Patch

  • Implement advanced email filtering to block suspicious attachments and links
  • Deploy endpoint detection and response (EDR) solutions to detect exploitation attempts

🔍 How to Verify

Check if Vulnerable:

Check Outlook version via File > Office Account > About Outlook. Vulnerable if version is before July 2023 updates.

Check Version:

wmic product where name='Microsoft Office' get version

Verify Fix Applied:

Verify Outlook version shows July 2023 or later updates installed. Check Windows Update history for KB5028182 or later.

📡 Detection & Monitoring

Log Indicators:

  • Outlook crash logs
  • Windows Event Logs with Outlook process anomalies
  • Security logs showing unexpected process execution

Network Indicators:

  • Unusual outbound connections from Outlook process
  • DNS queries to suspicious domains

SIEM Query:

source='windows' AND (process_name='outlook.exe' AND (parent_process!='explorer.exe' OR command_line CONTAINS suspicious_pattern))

🔗 References

📤 Share & Export