CVE-2023-36780
📋 TL;DR
CVE-2023-36780 is a remote code execution vulnerability in Skype for Business that allows attackers to execute arbitrary code on affected systems by sending specially crafted requests. This affects organizations running vulnerable versions of Skype for Business Server. Successful exploitation could lead to complete system compromise.
💻 Affected Systems
- Skype for Business Server
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Full system compromise allowing attacker to install programs, view/change/delete data, create new accounts with full user rights, and pivot to other systems in the network.
Likely Case
Attacker gains initial foothold in the network, potentially leading to data exfiltration, ransomware deployment, or lateral movement to other systems.
If Mitigated
Limited impact due to network segmentation, proper patching, and security controls preventing successful exploitation.
🎯 Exploit Status
Exploitation requires authentication to the Skype for Business Server. Microsoft has not reported active exploitation in the wild.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Check Microsoft Security Update Guide for specific patched versions
Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36780
Restart Required: Yes
Instructions:
1. Apply the latest security update from Microsoft for Skype for Business Server. 2. Restart the server as required. 3. Verify the patch was successfully applied.
🔧 Temporary Workarounds
Network Segmentation
allRestrict network access to Skype for Business Server to only trusted users and systems
Authentication Hardening
allImplement strong authentication mechanisms and monitor for suspicious authentication attempts
🧯 If You Can't Patch
- Implement strict network segmentation to isolate Skype for Business Server from untrusted networks
- Enable enhanced logging and monitoring for suspicious activities on the Skype for Business Server
🔍 How to Verify
Check if Vulnerable:
Check Skype for Business Server version against Microsoft's security advisory for affected versions
Check Version:
Get-CsServerVersion (PowerShell on Skype for Business Server)
Verify Fix Applied:
Verify that the security update has been applied and the server version matches patched versions listed in Microsoft advisory
📡 Detection & Monitoring
Log Indicators:
- Unusual authentication patterns
- Unexpected process execution
- Suspicious network connections from Skype for Business Server
Network Indicators:
- Anomalous traffic patterns to/from Skype for Business Server
- Unexpected outbound connections from the server
SIEM Query:
source="SkypeForBusiness" AND (event_type="authentication_failure" OR process_execution="unusual")