CVE-2023-36780

7.2 HIGH

📋 TL;DR

CVE-2023-36780 is a remote code execution vulnerability in Skype for Business that allows attackers to execute arbitrary code on affected systems by sending specially crafted requests. This affects organizations running vulnerable versions of Skype for Business Server. Successful exploitation could lead to complete system compromise.

💻 Affected Systems

Products:
  • Skype for Business Server
Versions: Specific versions as listed in Microsoft advisory (typically recent versions before patched release)
Operating Systems: Windows Server
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Skype for Business Server, not Skype for Business client applications. Requires attacker to be authenticated to the Skype for Business Server.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise allowing attacker to install programs, view/change/delete data, create new accounts with full user rights, and pivot to other systems in the network.

🟠

Likely Case

Attacker gains initial foothold in the network, potentially leading to data exfiltration, ransomware deployment, or lateral movement to other systems.

🟢

If Mitigated

Limited impact due to network segmentation, proper patching, and security controls preventing successful exploitation.

🌐 Internet-Facing: HIGH if Skype for Business Server is exposed to the internet without proper segmentation or patching.
🏢 Internal Only: MEDIUM as exploitation requires network access, but internal threats or compromised accounts could still exploit the vulnerability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires authentication to the Skype for Business Server. Microsoft has not reported active exploitation in the wild.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Microsoft Security Update Guide for specific patched versions

Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36780

Restart Required: Yes

Instructions:

1. Apply the latest security update from Microsoft for Skype for Business Server. 2. Restart the server as required. 3. Verify the patch was successfully applied.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict network access to Skype for Business Server to only trusted users and systems

Authentication Hardening

all

Implement strong authentication mechanisms and monitor for suspicious authentication attempts

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate Skype for Business Server from untrusted networks
  • Enable enhanced logging and monitoring for suspicious activities on the Skype for Business Server

🔍 How to Verify

Check if Vulnerable:

Check Skype for Business Server version against Microsoft's security advisory for affected versions

Check Version:

Get-CsServerVersion (PowerShell on Skype for Business Server)

Verify Fix Applied:

Verify that the security update has been applied and the server version matches patched versions listed in Microsoft advisory

📡 Detection & Monitoring

Log Indicators:

  • Unusual authentication patterns
  • Unexpected process execution
  • Suspicious network connections from Skype for Business Server

Network Indicators:

  • Anomalous traffic patterns to/from Skype for Business Server
  • Unexpected outbound connections from the server

SIEM Query:

source="SkypeForBusiness" AND (event_type="authentication_failure" OR process_execution="unusual")

🔗 References

📤 Share & Export